| 1. | Application - based external attacks 基于应用程序的外部攻击 |
| 2. | The first scenario involves a fairly common form of external attack known as web site defacing 第一种方案涉及一种很常见的外部攻击形式,称为网站涂改。 |
| 3. | External attackers are those who must traverse your " defense in depth " to try and break into your systems 外部攻击者是那些必须透过您的“深度防御”试图闯入您系统的人。 |
| 4. | 1989 , 25 : 1002 - 1003 . 8 harn l . group - oriented threshold digital signature scheme and digital multisignature Michels和horster将对于多重数字签名方案的攻击分为两类:外部攻击和内部攻击。 |
| 5. | Unnecessary services can be used by an outside attacker to execute code on the server , such as by using buffer overflows see 外部攻击者可以利用不必要的服务在服务器上执行代码,比如通过缓存溢出(参见 |
| 6. | Among all of friendship quality factors , intimate communication and affirming value can positively predict relational aggressive behavior and overt aggressive behavior separately 友谊质量中,亲密交流和肯定价值分别是关系攻击和外部攻击的积极预测源。 |
| 7. | In information and communications security first international conference , 1997 , pp . 217 - 222 . 10 park s , park s , kim k et al . two efficient rsa multisignature schemes 但是chen等人提出的方案是不安全的,他们只考虑了外部攻击者的行为,而没有考虑内部攻击者的主动攻击行为。 |
| 8. | The specific nature of the security hole , such as whether it makes the vulnerable to outsiders or allows virus - like code to enter the operating system , was not made clear 上述安全漏洞的性质,诸如其是否会导致计算机易受外部攻击,或是使得诸如蠕虫病毒的代码进入操作系统,现在还不得而知。 |
| 9. | As a key measure of network dynamic defense , intrusion detection system ( ids ) can detect interior misuse and exterior attacks , and solve problem faced by network security better 入侵检测系统作为网络动态防御的主要手段,可以提供对内部误用与外部攻击的实时检测,较好地解决了网络安全面临的问题。 |