• The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵。

    youdao

  • This article discusses the work principles and attack technology and defending policies on Trojan Horse.

    本文介绍了木马的攻击原理、常用攻击技术以及防范策略

    youdao

  • The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.

    实验结果表明蠕虫木马可以网络攻防发挥积极作用

    youdao

  • NVS is based on Trojan horse architecture and facing to network attack.

    基础之上,本文提出了一个基于木马体系结构漏洞扫描模型。

    youdao

  • NVS is based on Trojan horse architecture and facing to network attack.

    基础之上,本文提出了一个基于木马体系结构漏洞扫描模型。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定