- detect attack
- Макаров: обнаруживать наступление
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
detect — 01. Grandma said she was feeling okay, but I think I could [detect] a bit of depression in the way she was speaking. 02. Some diseases are [detectable] at birth, and can be dealt with right away. 03. The early [detection] of skin cancer has saved … Grammatical examples in English
detect — [[t]dɪte̱kt[/t]] detects, detecting, detected 1) VERB To detect something means to find it or discover that it is present somewhere by using equipment or making an investigation. [V n] ...a sensitive piece of equipment used to detect radiation … English dictionary
Denial-of-service attack — DoS redirects here. For other uses, see DOS (disambiguation). DDoS Stacheldraht Attack diagram. A denial of service attack (DoS attack) or distributed denial of service attack (DDoS attack) is an attempt to make a computer resource unavailable to … Wikipedia
Mixed threat attack — A mixed threat attack is an attack that uses different tactics to infiltrate a computer user s environment. A mixed threat attack might include an infected file that comes in by way of spam or can be received by way of Internet download. The… … Wikipedia
Rapid Attack Identification Detection Reporting System — The Rapid Attack Identification Detection Reporting System, also known as RAIDRS is a ground based space control system that provides near real time event detection.MissionRAIDRS will be a family of systems being designed to detect, report,… … Wikipedia
Hit inflation attack — is a kind of fraudulent skill used by some advertisement publishers to earn unjustified revenue on the traffic they drive to the advertisers’ Web sites. It is more sophisticated and hard to detect than simple Inflation Attack This process… … Wikipedia
Shark attack — For the film, see Shark Attack (film). Shark attack Classification and external resources A sign warning about the presence of sharks off Salt Rock, South Africa … Wikipedia
Collision attack — In cryptography, a collision attack on a cryptographic hash tries to find two arbitrary inputs that will produce the same hash value, i.e. a hash collision. In contrast to a preimage attack, neither the hash value nor one of the inputs is… … Wikipedia
Heart attack — The death of heart muscle due to the loss of blood supply. The loss of blood supply is usually caused by a complete blockage of a coronary artery, one of the arteries that supplies blood to the heart muscle. Death of the heart muscle, in turn,… … Medical dictionary
Spoofing attack — In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. Man in the middle attack and internet… … Wikipedia
Passive attack — A passive attack on a cryptosystem is one in which the cryptanalyst cannot interact with any of the parties involved, attempting to break the system solely based upon observed data (i.e. the ciphertext). This can also include known plaintext… … Wikipedia