Chinese translation for "攻击程序"
|
- attacker
exploit
Related Translations:
首先攻击: cast the first stone 攻击目标: attack a targethit targetsobject of attack 全天候攻击: all-weather engagement
- Example Sentences:
| 1. | Attackers can use this fact to " slip through " data validators to attack programs 攻击者可以利用这一点来“骗过”数据验证来攻击程序。 | | 2. | And one of the most common ways to attack programs is to exploit how they make requests to other programs 攻击程序使用的最常见方式之一就是利用这些程序向其他程序发出请求的方式。 | | 3. | On the one hand , the combination of information techenology with governmant management , finance , public service , education , medical treatment , traditional business brings a big new market ; on the other hand , although the computerization brings high efficiency and friendly service , it also brings the threat , risk and duty . the information on web is often to be wiretapped , to be tampered or to be destroyed . all kinds of network attack programs are to be diffused 一方面,信息技术与政府管理、金融、公共服务、教育、医疗和传统商务的结合带来了一个巨大的新市场;另一方面,信息化在带来高效率和友好服务的同时,也带来了威胁、风险和责任,网上信息被窃、被篡改、被破坏的事件时有发生,各种网络攻击程序的广泛传播更使人们忧心忡忡。 | | 4. | The characteristic of anomaly traffics is that it breaks out without any omen and can destroy networks and computers in a short time ( for instance , the outburst of traffic behavior caused by specific attack programs or worm burst ) . therefore , to detect anomaly rapidly and accurately is one of the precondition of ensuring the efficient network operation and detection of anomalous traffic has become the attractive and valuable subject in the present academic and industrial circles 异常流量的特点是发作突然,先兆特征未知,可以在短时间内给网络或网络上的计算机带来极大的危害(例如由特定的攻击程序或蠕虫爆发所引起的突发流量行为) ,因此准确、快速地检测网络流量的异常行为,并做出合理的响应是保证网络有效运行的前提之一,也是目前学术界和工业界共同关注的前沿课题之一。 |
- Similar Words:
- "攻击病毒标准" Chinese translation, "攻击波" Chinese translation, "攻击簿" Chinese translation, "攻击部队" Chinese translation, "攻击部位" Chinese translation, "攻击持球" Chinese translation, "攻击冲动" Chinese translation, "攻击传统观念或风俗的人" Chinese translation, "攻击传讯素" Chinese translation, "攻击闯入" Chinese translation
|
|
|