您要查找的是不是:
- Port scan detection with automatic blackholing. 端口扫描关于自动黑洞探测?这里不太理解。
- Research about technology of port scan and port scan detect 网络端口扫描及其防御技术研究
- port scan detection 端口扫描检测
- This paper introduces the port scan and Trojan horse detection model pieces in it. 这里主要介绍其中的端口扫描和木马检测两个模块。
- Firewalking is a method of disguising port scans. 趟火墙是一种伪装端口扫描的方法。
- Port port scan computer program applications and the role of development, for reference. 计算机端口扫描端口程序应用和开发的作用;供参考.
- distributed detection of port scan 分布式端口扫描检测
- The full text explain in detail with principle of the TCP connection, principle of the WINSOCK, the basic principle of the port scan and the scan method . 全文对TCP建立连接的原理,WINSOCK原理,端口扫描技术的基本原理和扫描方式都进行了比较详细的介绍。
- Scanning Detection System of UPT-Based Immunoassay Test Strip[J]. 引用该论文 卢健;周蕾;赵永凯;黄立华;刘蕾;杨瑞馥;黄惠杰.
- The pattern shows itself in various ways, such as a port scan to a range of hosts or modified TCP packets that are distributed throughout a victim network. 攻击模式有多种的表现形式。例如:扫描主机一个范围的端口,或是在受害网络上传播的经过修改的TCP包。
- Combined coded remote-administrative service with SSL secure port scan, anonymous routing and third-party plugin inbuilt for quick and automatic "scan and install" process. 集成了远程管理服务,服务带有SSL安全端口扫描、匿名路由,用于快速自动“扫描并安装”处理的内嵌的第三方插件。易于使用,能穿过防火墙工作,使用1024位强密码。
- Port scanner, superfast, subminute scan tens of thousands of ports. 说明:端口扫描器,速度超快,分分钟可以扫描数万个端口。
- In this case, a CT scan detected the problem. Doctors repaired the man's heart and saed his life. 该个案病例中,CT扫描发现了心外膜下动脉瘤。医生们迅速采取措施修复了患者的心脏,挽救了他的生命。
- A light-weight port scanner with BSD-derived operating systems in mind. 一台轻量级端口扫描器想着BSD获得的操作系统。
- This source code is the local and remote machines Dongdong good port scanner. 这个源代码是本机和远程机器的端口扫瞄的好东东。
- The simplest form of a TCP port scan is to open a connection to all ports on a host. TCP端口扫描的最简单形式是打开一个到主机所有端口的连接。
- Self-adaptive distributed detection method of port scan 自适应分布式端口扫描检测方法
- It is very useful and necessary to research the ports scan technology for cope with net inbreak effectively. 为了有效地对付网络入侵行为,对端口扫描进行研究是非常有益和必要的。
- If the scanner detects the signature,it warns you that you are infected. 如果扫描到了这样的编码,就会警告你已经被感染了。
- If the scanner detects the signature, it warns you that you are infected. 如果扫描到了这样的编码,就会警告你已经被感染了。