• 研究实现基于网络行为分析未知恶意代码检测系统有效地对未知恶意代码进行检测

    To research and implement the unknown malicious code detection system based on network behavior analysis, in order to detect unknown malicious code effectively.

    youdao

  • 由于主题安装博客拥有者会把一段从来没有经过检测代码安装到WordPress所在服务器上,一点也没有意识隐藏恶意代码在里边。

    Because of the ease of theme installation, blog owners who’d never install untested code on a server are deploying themes on their blogs, not realizing that hidden code is coming along for the ride.

    youdao

  • 随之出现的恶意代码分析检测技术包括特征码扫描等一定程度上进行分析检测工作,无法避免各自缺陷

    Followed with malicious code analysis and detection technology, for example, the signature scanning, can analysis and detect a certain extent, but still could not avoid their defects.

    youdao

  • 出现的计算机安全机构提取出特征加入特征中的恶意代码检测不是成功

    Emerging computer security agencies have not yet been extracted and added to the signature features of the library's new malicious code detection is not yet very successful.

    youdao

  • 本文研究恶意代码种类特征充分讨论各种分析检测方法缺陷不足

    This paper studies the types and features of malicious code, discusses the deficiencies and shortcomings of some analysis and detection methods.

    youdao

  • 现有检测恶意代码方法软件发现恶意代码时,恶意代码往往已经入侵到了机器中。

    The current method of detection of malicious code or software, the discovery of malicious code, malicious code often has invaded into the machine.

    youdao

  • 基于进程行为入侵检测技术主机防范入侵和检测恶意代码重要技术手段之一

    Intrusion Detection based on process 'behaviors is one of the mainstream techniques for defend against intrusion and malicious code.

    youdao

  • 主要研究方向信息安全软件漏洞分析检测恶意代码分析与防范

    Research Interest: Information security, Vulnerability analysis and detection, Malware analysis and prevention.

    youdao

  • 测试结果表明经过模糊变换恶意代码能够逃避大部分基于误用检测恶意代码对抗工具。

    The results show that malicious code using obfuscating transformation can be free of most of malicious code detecting tools who adopt the misuse intrusion detection.

    youdao

  • 恶意代码大量快速繁衍使得恶意代码自动化检测成为必然趋势,加壳程序识别恶意代码分析的一个必要步骤

    The proliferation of malicious code makes automatic malicious code detection an inevitable trend. Packed Portable Executable (PE) files identification is a necessary step of malicious code analysis.

    youdao

  • 对于恶意代码提出了可实施检测系统方案删除的方法

    An executable examining project and method of cleaning viciousness code are presented.

    youdao

  • 同时当前恶意代码发现技术还是以特征码扫描为主,辅助启发式扫描,行为检测检测方法为辅

    At the same time, the current technology or malicious code was found to signature-based scanning, supplemented by heuristic scanning, behavior detection, supplemented by other detection methods.

    youdao

  • 通过行为分析检测是否是恶意代码

    Detect whether a executable code is malicious code through the analysis of behavior.

    youdao

  • 基于以上想法技术论文设计了一个恶意代码的主动发现系统来进行恶意代码检测

    Based on the above ideas and technology, this paper, an active found systems for malicious code is designed for malicious code detection.

    youdao

  • 于是迫切需要一种恶意代码分析检测手段恶意代码进行详尽的分析。

    Thus, there is urgent need for a malicious code analysis and detection means to carry out a detailed analysis of malicious code.

    youdao

  • 恶意代码检测技术主要分为基于主机基于网络节点的检测本文主要研究针对基于主机的高隐藏性木马检测技术。

    Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.

    youdao

  • 恶意代码检测技术主要分为基于主机基于网络节点的检测本文主要研究针对基于主机的高隐藏性木马检测技术。

    Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定