Malicious behavior judgment 恶意行为判别
Malicious behavior analysis 恶意行为分析
malicious code behavior 恶意代码行为
The model can prevent the malicious behavior which is done by the users who achieve high trust degree by small trade but cheat in big trade.
模型可以有效预防恶意节点通过小额交易获得高信任度而在大额交易上进行欺骗的恶意行为。
参考来源 - 基于域的P2P电子商务信任模型研究But the disadvantages also occur, such as high security risks due to the wireless medium of communication and the difficulty of monitoring the network to detect malicious behavior etc.
但是随之而来也带来了诸多不利因素,例如无线的通信媒介和网络中难于监控的恶意行为导致了Ad Hoc网络存在更高的安全风险。
参考来源 - 基于簇的移动Ad Hoc网络模糊入侵检测系统的研究·2,447,543篇论文数据,部分数据来源于NoteExpress
Malicious behavior is even harder to control, if a member of staff decides to smuggle a virus out of a facility.
如果一名工作人员决意把病毒偷偷带出实验室,那么这种恶意行为就会更加难以控制。
The protocols are efficient and provable secure and can tolerate the malicious behavior of up to half of the proxies.
该协议是有效的、可证安全的,并且可以容忍至多一半代理的恶意行为。
On the study of malicious code, the automatic generation of malicious behavior speciation is still a difficult problem.
在对恶意代码的研究上,恶意行为规范的自动生成仍然是一个难题。
应用推荐