英语人>网络例句>蠕虫的 相关的搜索结果
网络例句

蠕虫的

与 蠕虫的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Just this Monday, the online community was abuzz with news of a worm rapidly spreading through Yahoo! Messenger.

就在这个星期一,网上社区是充斥著新闻传播的蠕虫病毒迅速通过雅虎通。

Any of numerous velvety-skinned wormlike carnivorous animals common in tropical forests having characteristics of both arthropods and annelid worms.

许多皮肤柔软蠕虫样食肉动物,常见于热带森林,有节肢动物和环节动物的特征。

Arthropoda, Class Crustacea, Subclass Copepoda are beyond the present scope. The parasitic helminth faunas of rabbit fish, cutless fish, spotted mackerel, horse mackerel, grey mullet, and cobia were investigated.

本研究之对象为台湾海鱼蠕虫类寄生虫,包括:扁形动物门之单殖吸虫纲,吸虫纲内之复殖吸虫亚纲和绦虫纲;俗称线虫或圆虫之圆形动物门;棘头虫动物门中之始新棘头虫纲等;但不包含属於外寄生性之节肢动物门甲壳纲中的桡足亚纲。

This paper reviews the progresses on the biosynthetic gene clusters of nature products from the symbiotic bacteria including marine sponge, ascidian, bryozoan, deep-sea tube worm and deep-sea sediments.

本文综述了来源于海绵、海鞘、苔藓虫、深海管状蠕虫和深海沉积物中共附生微生物天然产物生物合成基因簇的研究进展。

The harm of worms' outbreak becomes greater and greater. Such make worm detection and defense technology face an increasingly tough challenge. Attack Signature Automatically Generation technology is one of the key technologies, this paper focuses on the ASAG technology for research, its main jobs include: 1)Analyzed the research status of ASAG technology from the overall, described its design goals and evaluation criteria, and the current approaches' limitations is given. 2) After deeply researching and analyzing a various of ASAG systems, a basic framework for the network ASAG system is presented, and the detailed analysis of the main function of the components in the framework is also presented. 3)An attack capture model based on distributed honey-pots system is presented. This mode integrates the anomaly detection which based on the mode of dubiety score in the honey-pots, can do a second filter for the samples in honey-pots, and improve the purity of the samples captured. 4) A simple noise-resilience ASAG algorithm is presented, which used the behavioral characteristics of the worm outbreak to generate efficient signatures of samples in the suspicious dataset, which contains large amounts of noisy data, under the complex environment.

攻击特征自动提取技术是网络蠕虫防御技术的关键技术,本文围绕攻击特征自动提取技术开展研究工作,其主要工作包括: 1)对攻击特征自动提取技术的研究现状进行了综述,介绍其设计目标与评价标准,并指出了现有方法存在的局限性; 2)在深入研究与分析各种攻击特征提取系统的基础上,提出基于网络的攻击特征自动提取系统的基本框架,并详细分析框架中各部件的主要功能; 3)提出了基于分布式蜜罐系统的攻击样本捕获模型,该模型在分布式蜜罐系统的基础上,结合基于可疑度模型的异常检测,对蜜罐中的样本进行二次过滤,较好地提高了捕获样本的纯净度; 4)提出一种简单抗噪的攻击特征自动提取算法,该算法利用蠕虫爆发时的行为特征,在复杂环境下含有大量噪声数据的可疑样本训练集中提取有效的特征,降低对样本纯净度的依赖。

Trojan Guarder will start a system called Ghost monitoring program to monitor all system memory to run the program, all open local files, real-time search Trojans and worms, Trojan horses and worms in time, it will hide other programs, immediately the eradication of the virus.

Trojan Guarder 将会启动一个名为Grard Ghost的系统监控程序来监控所有在系统内存中运行的程序,所有打开的本地文件,实时的搜索特洛伊木马及蠕虫病毒,当特洛伊木马及蠕虫病毒出现的时候,它将会隐藏其它程序,立即把病毒消灭。

Once a trojan or worm appears, even it is hidden in other programs, Trojan Guarder will display a signal for warning and eliminate it consequently.

Trojan Guarder 将会启动一个名为Grard Ghost的系统监控程序来监控所有在系统内存中运行的程序,所有打开的本地文件,实时的搜索特洛伊木马及蠕虫病毒,当特洛伊木马及蠕虫病毒出现的时候,它将会隐藏其它程序,立即把病毒消灭。

The silkworms, which propagate themselves by ova, grow in the from of larvae and when mature after 4 times of exuviations (about 25 days), they begin to spin silk 0.35g Per worm into cocoons, On completion of this, the worms, having sloughed once again are transformed into chrysalises in the cocoons.

从古代开始,在茂密的桑树中,蚕便一如既往的产卵繁殖,随着一个个完全不同的形态学特征的出现,蚕经历了从蚕卵到幼虫再到成虫的艰辛的成长过程,在整个过程中,蚕将蜕 4 次皮(大约每隔 25 天一次),接着他们开始土丝来完成茧,当蠕虫与茧达到 0.35 克之后,艰难爬行的蠕虫变成为在茧中的蝶蛹。

Content based detection method employs Libpcap to sniffer the suspicious traffic from the scanning hosts, reassembles the TCP streams and extracts longest common substrings from those streams using suffix tree algorism.

基于扫描行为特征的检测技术、基于限速和阻断的蠕虫控制技术是基于Linux 2.4.x内核的Netfilter防火墙架构实现,通过在内核层加载钩子函数截获数据包,根据不同的控制策略对可疑的数据包进行不同力度的控制;基于内容的检测技术在网络链路层使用Libpcap监听可疑主机的数据包,通过分析TCP状态建立TCP连接表对数据包进行流重组,使用后缀树在多个数据流中寻找最长公共子串的方法提取蠕虫特征码。

Our study proves that large–scale worm propagation threatening still exists in IPv6 and IPv4-IPv6 networks, which gives an important pespetive for future studies on the worms spreading in IPv6 networks.

本文的工作证明了IPv6网络以及IPv4-IPv6混合网络下同样存在大规模蠕虫感染和传播的威胁,对于IPv6网络下蠕虫传播的研究工作具有前瞻性的意义。

第10/42页 首页 < ... 6 7 8 9 10 11 12 13 14 ... > 尾页
推荐网络例句

Finally, according to market conditions and market products this article paper analyzes the trends in the development of camera technology, and designs a color night vision camera.

最后根据市场情况和市面上产品的情况分析了摄像机技术的发展趋势,并设计了一款彩色夜视摄像机。

Only person height weeds and the fierce looks stone idles were there.

只有半人深的荒草和龇牙咧嘴的神像。

This dramatic range, steeper than the Himalayas, is the upturned rim of the eastern edge of Tibet, a plateau that has risen to 5 km in response to the slow but un stoppable collision of India with Asia that began about 55 million years ago and which continues unabated today.

这一引人注目的地域范围,比喜马拉雅山更加陡峭,是处于西藏东部边缘的朝上翻的边框地带。响应启始于约5500万年前的、缓慢的但却不可阻挡的印度与亚洲地壳板块碰撞,高原已上升至五千米,这种碰撞持续至今,毫无衰退。