• The proposed algorithm can not only effectively deal with all types of conventional signal processing attacks, but also can prevent most of the malicious attacks on watermarks.

    算法不仅可以有效地应对各种常规信号处理攻击而且可以防止大部分恶意水印攻击。

    youdao

  • The first step says you need to identify critical system assets-tangible and intangible-that are most likely vulnerable to malicious attacks.

    一步表示需要识别(有形无形的)关键系统资产,这些资产罪可能受到恶意攻击。

    youdao

  • The first step is to identify critical system assetsintangible or tangiblethat are vulnerable to malicious attacks.

    一步确定易遭到恶意攻击的关键系统资产——无形或者有形

    youdao

  • Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.

    测试额外安全性可攻击性问题例如所部署应用程序上会间接伤害数据中心其他应用程序的恶意攻击

    youdao

  • Because a signature alone does not guarantee that the sender is who they say they are, the message transmission is vulnerable to techniques such as replay attacks by some malicious third party.

    因为仅仅数字签名无法保证发送方就是他们自己声称消息传输容易遭受恶意第三诸如再现攻击等技术的袭击。

    youdao

  • However, the fact remains that any data that is online is susceptible to data corruption, malicious attacks, and even accidental deletion.

    然而事实上所有在线数据容易遭受数据损坏恶意攻击甚至意外删除。

    youdao

  • As you've seen in the XSS examples, most of the attacks exploit server-side vulnerabilities by injecting malicious scripts.

    正如我们XSS示例看到大多数攻击都利用了服务器端的弱点注入恶意脚本

    youdao

  • The malicious program quickly found its way into computers controlling industrial processes the world over, demonstrating how vulnerable control systems are to such attacks.

    提及的恶性程序能很快发现进入控制世界工业过程计算机组,这说明控制系统面对这种攻击时是多么不堪一击

    youdao

  • There are no other access points (like a command line shell), thus decreasing the surface area for malicious attacks.

    除此之外没有其他访问比如命令shell),因此减少出现恶意攻击的机率。

    youdao

  • Cross-site scripting attacks allow hackers to embed a malicious script on your visitor's browser and then execute the script in order to gather data.

    跨站点脚本攻击使黑客能够恶意脚本嵌入访问者浏览器中然后执行脚本收集数据

    youdao

  • This requires us to be able to do a precise analysis of the normal flow of business or malicious attacks.

    就需要我们正常业务流还是恶意攻击做到精准分析

    youdao

  • We learn through automation, the normal operation of the business model data flow out, the existence of malicious attacks to identify the statement.

    我们通过自动化学习正常业务态化数据流分离出来,把存在恶意攻击语句识别出来

    youdao

  • CNET reports that "Over 60 percent of attacks come from notifications from malicious third-party applications on Facebook's developer platform, the study found."

    CNET援引这份研究数据称有60%以上的攻击来自Facebook开发者平台第三方应用通知

    youdao

  • But the latest spate of attacks on Banks in Bangladesh and Southeast Asia would be the first time, security researchers say, that a nation has used malicious code to steal purely for financial profit.

    不过安全研究人员表示,近期涌现针对孟加拉国东南亚国家银行攻击首次一个国家使用恶意代码来纯粹窃取钱财

    youdao

  • To prevent malicious attacks or stale connections, the accepting thread should occasionally check the sockets outstanding in AcceptEx by calling getsockopt and SO_CONNECT_TIME.

    预防此类攻击接受连接线程应该不时地通过调用getsockopt()函数(选项参数为SO_CONNECT_TIME)来检查AcceptEx()里守候字。

    youdao

  • Property potentially could invite certain malicious attacks or cause undesired data to be sent through the response header.

    属性类型有可能招致某些恶意攻击通过响应标头发的不希望得到的数据

    youdao

  • In the malicious attack statement, two kinds of attacks, SQL injection and middleware channel multiplexing, are hard and heavy.

    恶意攻击语句中,SQL注入中间件通道复用攻击中难,同时也是中重。

    youdao

  • The cryptographic technique provides mobile Agent with a defense against attacks from malicious hosts by maintaining the confidentiality of carryied messages and safeguarding them against tampering.

    摘要密码应用可使移动代理免受运行主机上恶意软件攻击保持携带信息机密性并不受撺扰。

    youdao

  • Compared with other algorithms, the algorithm can effectively fight the denial of service attacks from malicious authorized entities in the networks.

    其他算法相比算法有效对抗来自网络恶意授权实体拒绝服务攻击

    youdao

  • The cryptographic technique provides mobile Agent with a defense against attacks from malicious hosts by maintaining the confidentiality of carried messages and safeguarding them against tampering.

    密码应用可使移动代理免受运行主机上恶意软件攻击保持携带信息机密性并不受撺扰

    youdao

  • Often these attacks come from malicious code that executes with the permissions of the user running the code.

    这些攻击往往来自恶意程序码,而这些程序码常借由执行程序码使用者权限而执行。

    youdao

  • This helps prevent malicious denial-of-service attacks that could cause the application to refuse requests because data storage is filled.

    有助于防止恶意拒绝服务攻击,而造成应用程序拒绝要求因为填满资料储存体。

    youdao

  • In particular, an important aspect that must be solved for them-commerce scenario is the mobile agent protection from manipulation attacks performed by malicious hosts.

    具体而言,一个重要方面必须加以解决移动商务方案移动代理免受攻击手法进行恶意主机

    youdao

  • The face of malicious attacks, how to deal with?

    面对恶意攻击如何处置

    youdao

  • They know them as I was only one case, I do not mean malicious attacks, I just sake of discussion, is to help enterprises solve the problem.

    他们知道只是他们当做一个案例,我并没有恶意攻击的意思,我只是就事事,帮助企业解决问题

    youdao

  • The flaw seems to affect all advisory pages and can be used by ill-intentioned individuals to distribute malware, launch phishing campaigns, or instrument various malicious attacks.

    这个安全漏洞似乎影响到所有咨询网页可以使用个人发布恶意软件,进行钓鱼各种不同恶意攻击

    youdao

  • And the site's database can be a backup to prevent malicious attacks caused huge losses.

    并且可以网站数据库进行备份防止恶意攻击造成巨大损失

    youdao

  • As time synchronization-based services become more prevalent, the synchronization infrastructure will become the target of malicious attacks.

    随着时间同步服务盛行,它越来越成为恶意攻击目标

    youdao

  • This algorithm accomplishes the distortion detection by gathering the tamper areas to distinguish malicious attacks from incidental distortions.

    同时还采用了聚合篡改区域方法来完成失真检测能够区分出恶意攻击和一般的图像处理。

    youdao

  • This algorithm accomplishes the distortion detection by gathering the tamper areas to distinguish malicious attacks from incidental distortions.

    同时还采用了聚合篡改区域方法来完成失真检测能够区分出恶意攻击和一般的图像处理。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定