• Next, in order to prevent the discovery and attack by malicious code, we utilize the Hardware Virtualization Technology to design the self-hidden module for LAHF.

    接着为了防止恶意代码发现攻击,本文利用硬件虚拟技术LAHF设计自隐藏模块

    youdao

  • If attack exists, state information management module will dynamically allocate and manage the firewall rules to filter the related data packets based on the control message.

    如果存在攻击状态信息管理模型根据接收的控制信息添加阻断规则以实现动态响应。

    youdao

  • At last, the thesis USES a simulation experiment which simulates the real environment of malicious voice attack to test the SPIT filter performance of the reputation module.

    最后仿真实验模拟了现实环境恶意用户攻击过程,测试信誉模型防御SPIT攻击的性能情况

    youdao

  • At last, the thesis USES a simulation experiment which simulates the real environment of malicious voice attack to test the SPIT filter performance of the reputation module.

    最后仿真实验模拟了现实环境恶意用户攻击过程,测试信誉模型防御SPIT攻击的性能情况

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定