为此,提出基于服务器端-客户端协作的跨站脚本攻击防御方法。
According to the problem proposed above, this paper makes a research on the server-client cooperation XSS defense method.
客体要件为民事诉讼权利,包括当事人提出攻击防御方法权和当事人提出程序事项异议权。
The object element is rights of civil action, including parties to put forward methods of attack and defense and raise objections to procedural matters.
另外,这种治疗方法增加了细胞的血液供应,保护了正常细胞,使癌细胞更易于被机体的自然防御系统所攻击。
It could also improve blood flow in cells, which protects healthy cells but leaves cancer cells vulnerable to the body's natural defences.
ModSecurity能够立即针对你的WEB应用系统进行攻击防御,有三种通用的方法。
ModSecurity can also act immediately to prevent attacks from reaching your web applications. There are three commonly used approaches.
为了评定一个布置有诱饵的雷达阵地抗反辐射导弹(ARM)攻击的防御效能,提出了采用马尔可夫链的转移概率矩阵进行计算的方法。
To evaluate the defense effectiveness of a radar site with decoys against the attack of ARM, a calculation method based on the transfer probability matrix of the Markov link is given.
本文分析了ARP协议及其工作原理和现有的ARP欺骗攻击的防御方法以及防御和检测特点。
This paper analyzes the ARP protocol and its working principle and the existing defense against ARP spoofing attack prevention and detection methods and characteristics.
鉴于此,提出了一种统计攻击流特征的方法,可以很好弥补ACC的不足,实验数据证明,此机制有很好的防御效果。
Based on this, I propose a method to summarize the character of attacks and meet the gap of ACC. With the approval of experiment, it shows a good defense efficacy.
该文通过分析缓冲区溢出攻击的原理,提出数组边界检查等方法来对缓冲区溢出攻击进行防御。
In this paper, by analyzing the principles of buffer overflow attacks, the array of border checkpoints and other methods to defend buffer overflow attacks.
文章在分析ARP协议工作原理、安全缺陷、攻击原理和攻击方式的基础上,详细论述了基于ARP协议攻击的防御方法。
This paper gives a general analysis of the working principle of the ARP, the security vulnerabilities of the ARP, the way of the attack and the protecting method.
这几种攻击实现容易,防范困难,研究其攻击机制和防御方法具有重大的现实意义。
These attacks were easy to achieve and difficulty to prevent, Research to these attacks on their defense mechanisms and methods is of great practical significance.
针对常见的IP地址欺骗、IP源路由欺骗、ICM P重定向欺骗、IP劫持等网络攻击给予了分析并在过滤管理模块中给出了防御的方法。
Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.
网络攻击行为的频度和复杂性使安全防御的难度越来越大。网络攻击行为分析方法因而引起人们的关注。
The frequency and complexity of network attack behaviors make securities withstand more difficult the method of analysis on network attack behaviors have been given more attention by people.
本文介绍了缓冲区溢出攻击的基本原理及关键技术,总结了现有的缓冲区溢出防御方法的不足。
This thesis summarizes the deficiency of contemporary methods for defending the existing buffer overflow attacks and introduces the principle and major technology of buffer overflow attacks.
如果方法没有声音,你唯一的防御是潜在的攻击者无法发现你的方法。
If the approach is not sound, your only defense is the inability of the potential attacker to discover your method.
在不同网络环境条件下,综合使用三种防范ARP攻击的方法,南京工业大学有效的防御了ARP攻击。
Under diverse network environment circumstances, Nanjing University of Technology effectively guard against the ARP attack with the integrated use of three approaches to preventing the ARP attack.
在不同网络环境条件下,综合使用三种防范ARP攻击的方法,南京工业大学有效的防御了ARP攻击。
Under diverse network environment circumstances, Nanjing University of Technology effectively guard against the ARP attack with the integrated use of three approaches to preventing the ARP attack.
应用推荐