• 为此提出基于服务器端-客户端协作的跨站脚本攻击防御方法

    According to the problem proposed above, this paper makes a research on the server-client cooperation XSS defense method.

    youdao

  • 客体要件民事诉讼权利包括当事人提出攻击防御方法当事人提出程序事项异议权。

    The object element is rights of civil action, including parties to put forward methods of attack and defense and raise objections to procedural matters.

    youdao

  • 另外这种治疗方法增加细胞血液供应,保护了正常细胞,使癌细胞易于机体自然防御系统所攻击

    It could also improve blood flow in cells, which protects healthy cells but leaves cancer cells vulnerable to the body's natural defences.

    youdao

  • ModSecurity能够立即针对WEB应用系统进行攻击防御三种通用方法

    ModSecurity can also act immediately to prevent attacks from reaching your web applications. There are three commonly used approaches.

    youdao

  • 为了评定一个布置诱饵雷达阵地抗反辐射导弹(ARM)攻击防御效能提出了采用马尔可夫链的转移概率矩阵进行计算方法

    To evaluate the defense effectiveness of a radar site with decoys against the attack of ARM, a calculation method based on the transfer probability matrix of the Markov link is given.

    youdao

  • 本文分析ARP协议及其工作原理现有的ARP欺骗攻击防御方法以及防御和检测特点

    This paper analyzes the ARP protocol and its working principle and the existing defense against ARP spoofing attack prevention and detection methods and characteristics.

    youdao

  • 鉴于提出一种统计攻击特征方法,可以弥补ACC的不足,实验数据证明,此机制很好的防御效果

    Based on this, I propose a method to summarize the character of attacks and meet the gap of ACC. With the approval of experiment, it shows a good defense efficacy.

    youdao

  • 该文通过分析缓冲区溢出攻击原理,提出数组边界检查方法来对缓冲区溢出攻击进行防御

    In this paper, by analyzing the principles of buffer overflow attacks, the array of border checkpoints and other methods to defend buffer overflow attacks.

    youdao

  • 文章分析ARP协议工作原理安全缺陷攻击原理攻击方式基础,详细论述基于ARP协议攻击防御方法

    This paper gives a general analysis of the working principle of the ARP, the security vulnerabilities of the ARP, the way of the attack and the protecting method.

    youdao

  • 几种攻击实现容易防范困难研究攻击机制防御方法具有重大现实意义。

    These attacks were easy to achieve and difficulty to prevent, Research to these attacks on their defense mechanisms and methods is of great practical significance.

    youdao

  • 针对常见IP地址欺骗、IP路由欺骗、ICM P重定向欺骗、IP劫持网络攻击给予了分析过滤管理模块中给出了防御方法

    Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.

    youdao

  • 网络攻击行为频度复杂性使安全防御难度越来越大。网络攻击行为分析方法因而引起人们关注

    The frequency and complexity of network attack behaviors make securities withstand more difficult the method of analysis on network attack behaviors have been given more attention by people.

    youdao

  • 本文介绍了缓冲区溢出攻击基本原理关键技术总结了现有缓冲区溢出防御方法不足

    This thesis summarizes the deficiency of contemporary methods for defending the existing buffer overflow attacks and introduces the principle and major technology of buffer overflow attacks.

    youdao

  • 如果方法没有声音唯一防御潜在攻击无法发现方法

    If the approach is not sound, your only defense is the inability of the potential attacker to discover your method.

    youdao

  • 不同网络环境条件下综合使用三种防范ARP攻击方法南京工业大学有效防御ARP攻击

    Under diverse network environment circumstances, Nanjing University of Technology effectively guard against the ARP attack with the integrated use of three approaches to preventing the ARP attack.

    youdao

  • 不同网络环境条件下综合使用三种防范ARP攻击方法南京工业大学有效防御ARP攻击

    Under diverse network environment circumstances, Nanjing University of Technology effectively guard against the ARP attack with the integrated use of three approaches to preventing the ARP attack.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定