The proposed algorithm can not only effectively deal with all types of conventional signal processing attacks, but also can prevent most of the malicious attacks on watermarks.
该算法不仅可以有效地应对各种常规的信号处理攻击,而且还可以防止大部分的恶意水印攻击。
The first step says you need to identify critical system assets-tangible and intangible-that are most likely vulnerable to malicious attacks.
第一步表示您需要识别(有形或无形的)关键系统资产,这些资产罪可能受到恶意攻击。
The first step is to identify critical system assets — intangible or tangible — that are vulnerable to malicious attacks.
第一步是确定易遭到恶意攻击的关键系统资产——无形的或者有形的。
Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.
测试额外的安全性和可攻击性问题;例如,所部署应用程序上会间接伤害数据中心中其他应用程序的恶意攻击。
Because a signature alone does not guarantee that the sender is who they say they are, the message transmission is vulnerable to techniques such as replay attacks by some malicious third party.
因为仅仅有数字签名并无法保证发送方就是他们自己所声称的人,消息的传输很容易遭受恶意第三方诸如再现攻击等技术的袭击。
However, the fact remains that any data that is online is susceptible to data corruption, malicious attacks, and even accidental deletion.
然而,事实上所有的在线数据都极容易遭受数据损坏、恶意攻击甚至意外删除。
As you've seen in the XSS examples, most of the attacks exploit server-side vulnerabilities by injecting malicious scripts.
正如我们在XSS示例中所看到的,大多数的攻击都利用了服务器端的弱点,注入恶意脚本。
The malicious program quickly found its way into computers controlling industrial processes the world over, demonstrating how vulnerable control systems are to such attacks.
提及的恶性程序能很快发现并进入控制世界上工业过程的计算机组,这说明控制系统在面对这种攻击时是多么的不堪一击。
There are no other access points (like a command line shell), thus decreasing the surface area for malicious attacks.
除此之外没有其他的访问点(比如命令行shell),因此减少了出现恶意攻击的机率。
Cross-site scripting attacks allow hackers to embed a malicious script on your visitor's browser and then execute the script in order to gather data.
跨站点脚本攻击使黑客能够将恶意脚本嵌入到访问者的浏览器中,然后执行该脚本收集数据。
This requires us to be able to do a precise analysis of the normal flow of business or malicious attacks.
这就需要我们能对正常的业务流还是恶意的攻击流做到精准的分析。
We learn through automation, the normal operation of the business model data flow out, the existence of malicious attacks to identify the statement.
我们通过自动化学习,把正常的业务模态化数据流分离出来,把存在恶意攻击的语句识别出来。
CNET reports that "Over 60 percent of attacks come from notifications from malicious third-party applications on Facebook's developer platform, the study found."
CNET援引这份研究的数据称有60%以上的攻击来自Facebook开发者平台上的第三方应用通知。
But the latest spate of attacks on Banks in Bangladesh and Southeast Asia would be the first time, security researchers say, that a nation has used malicious code to steal purely for financial profit.
不过,安全研究人员表示,近期涌现的针对孟加拉国与东南亚国家银行的攻击,是首次由一个国家使用恶意代码来纯粹窃取钱财。
To prevent malicious attacks or stale connections, the accepting thread should occasionally check the sockets outstanding in AcceptEx by calling getsockopt and SO_CONNECT_TIME.
要预防此类攻击,接受连接的线程应该不时地通过调用getsockopt()函数(选项参数为SO_CONNECT_TIME)来检查AcceptEx()里守候的套接字。
Property potentially could invite certain malicious attacks or cause undesired data to be sent through the response header.
属性的类型有可能招致某些恶意攻击,或通过响应标头发送的不希望得到的数据。
In the malicious attack statement, two kinds of attacks, SQL injection and middleware channel multiplexing, are hard and heavy.
在恶意攻击语句中,SQL注入和中间件通道复用两种攻击是难中难,同时也是重中重。
The cryptographic technique provides mobile Agent with a defense against attacks from malicious hosts by maintaining the confidentiality of carryied messages and safeguarding them against tampering.
摘要密码的应用可使移动代理免受运行主机上恶意软件的攻击,保持其携带信息的机密性并不受撺扰。
Compared with other algorithms, the algorithm can effectively fight the denial of service attacks from malicious authorized entities in the networks.
与其他算法相比,该算法能有效对抗来自网络的恶意授权实体的拒绝服务攻击。
The cryptographic technique provides mobile Agent with a defense against attacks from malicious hosts by maintaining the confidentiality of carried messages and safeguarding them against tampering.
密码的应用可使移动代理免受运行主机上恶意软件的攻击,保持其携带信息的机密性并不受撺扰。
Often these attacks come from malicious code that executes with the permissions of the user running the code.
这些攻击往往来自恶意程序码,而这些程序码常借由执行程序码的使用者权限而执行。
This helps prevent malicious denial-of-service attacks that could cause the application to refuse requests because data storage is filled.
这有助于防止恶意的拒绝服务攻击,而造成应用程序拒绝要求,因为在填满资料储存体。
In particular, an important aspect that must be solved for them-commerce scenario is the mobile agent protection from manipulation attacks performed by malicious hosts.
具体而言,一个重要方面,必须加以解决的移动商务方案是移动代理免受攻击手法进行恶意主机。
They know them as I was only one case, I do not mean malicious attacks, I just sake of discussion, is to help enterprises solve the problem.
他们知道我只是把他们当做一个案例,我并没有恶意攻击的意思,我只是就事论事,是在帮助企业解决问题。
The flaw seems to affect all advisory pages and can be used by ill-intentioned individuals to distribute malware, launch phishing campaigns, or instrument various malicious attacks.
这个安全漏洞似乎影响到所有咨询网页,可以使用个人发布的恶意软件,进行钓鱼或各种不同的恶意攻击。
And the site's database can be a backup to prevent malicious attacks caused huge losses.
并且可以对网站的数据库进行备份,防止恶意攻击造成巨大损失。
As time synchronization-based services become more prevalent, the synchronization infrastructure will become the target of malicious attacks.
随着时间同步服务的盛行,它越来越成为恶意攻击的目标。
This algorithm accomplishes the distortion detection by gathering the tamper areas to distinguish malicious attacks from incidental distortions.
同时还采用了聚合篡改区域方法来完成失真检测,能够区分出恶意攻击和一般的图像处理。
Experimental results show that the robust watermark can provide high robustness to conventional attacks, and malicious tampering, it has good accuracy of tamper localization.
实验结果表明,该算法能有效抵抗各种常规攻击,区分常规攻击与恶意篡改,并能对恶意篡改进行定位。
Experimental results show that the robust watermark can provide high robustness to conventional attacks, and malicious tampering, it has good accuracy of tamper localization.
实验结果表明,该算法能有效抵抗各种常规攻击,区分常规攻击与恶意篡改,并能对恶意篡改进行定位。
应用推荐