您要查找的是不是:
- This paper introduces the port scan and Trojan horse detection model pieces in it. 这里主要介绍其中的端口扫描和木马检测两个模块。
- Finally, a behavior mode is put forward, which is mapped from the using situation of process systematic resource to the process systematic call, and by this means, a Trojan horse detection model based on artificial immunity mechanism is set up. 并同时提出了依据进程的系统资源使用状况来映射进程的系统调用的行为模式,以此建立了基于人工免疫机制的木马检测模型。
- By the introduction to the current detection methods of Trojan Horse, we then present a Trojan Horse detection algorithm on the basis of correlated analysis of time-frequency, and make a test of the algorithm to the real Trojan horse. 论文在介绍木马检测现状的基础上,提出了基于时频联合分析的木马检测算法,并针对真实的木马对算法做了模拟测试,取得较好的效果;
- Trojan Horse Detection by Process Tracing 通过进程监视检测木马攻击
- Research on Trojan Horse Detection Based-on Heuristic Analysis 基于启发式分析的木马检测技术研究
- Trojan Horse Detection Model Based on File's Static Attributes 基于文件静态信息的木马检测模型
- Reboot your machine and delete the trojan horse. 重新启动你的电脑,删除木马文件。
- I wonder whether he is a Trojan Horse. 我不知道他是否是个内奸。
- Identify the trojan horse file on your hard disk. 确定你磁盘中的木马文件。
- Trojan horse detection 木马检测
- The senior civil servant they arrested for spying turned out to be a Trojan horse, planted by enemy intelligence twenty years previously. 他们逮捕的那位因进行间谍活动的高级文职人员,原来是20年前敌人情报机构安插的特洛伊木马。
- There is no evidence of a Trojan horse on your system. 在您的系统中没有发现木马.
- The ingeniously engineered Trojan horse was also his idea. 那个天才的特洛伊木马同样也是他的主意。
- Initial experiment shows this method is able to detection IceRiver trojan horse and Broadcasting girl trojan hores. 初步实验结果表明,该方法可以有效发现冰河木马病毒和广外女生木马病毒。
- For example, a trojan horse or a virus is considered malware. 例如,一个木马或病毒被认为是恶意软件。
- This thesis is lucubrated on the part of Trojan horse hiding. 本文在木马隐藏部分做了研究。
- In very gradual, complex ways, Britain may prove to be, not the Trojan horse of American influence which France has always feared, but, on the contrary, a counterpoise to the American tide. 虽然过程缓慢,方式也很复杂,可英国也许能够证明他们并非是法国总是害怕的那种美国势力的潜在危险。恰恰相反,他们是与美国潮流抗衡的力量。
- Ghost in the Machine: A Trojan horse flashes insulting messages on the screen. 一种特洛伊木马,它会在屏幕上闪烁一些侮辱性消息。
- Trojan horses detection 木马检测
- If this is a worm or Trojan horse the length represents the size of the file. 如果这是一个蠕虫或特洛依木马则长度表示为该文件的长度。