代码搜索:Detects

找到约 419 项符合「Detects」的源代码

代码结果 419
www.eeworm.com/read/163233/5511062

cc segbreakdet.cc

// // SegBreakDet - detects all the possible segmant breaks (which are // the freeman bvectors 0,1, and 2. // Input - reads HWRawDataC records from standard in, w/ freeman vect events. // Output - wr
www.eeworm.com/read/439112/1808292

nasl osticket_backdoored.nasl

# # This script was written by Noam Rathaus # # GPLv2 # # From: Guy Pearce # Date: 21.6.2004 08:01 # Subject: Multiple osTicket exploits! # This script detects those osTicket
www.eeworm.com/read/473927/6822342

txt 119-15.txt

Rule: -- Sid: 119-15 -- Summary: This event is generated when the pre-processor http_inspect detects network traffic that may constitute an attack. -- Impact: Unknown. This may indicate an at
www.eeworm.com/read/473927/6822725

txt 111-4.txt

Rule: -- Sid: 111-4 -- Summary: This event is generated when the pre-processor stream4 detects network traffic that may constitute an attack. -- Impact: Unknown. -- Detailed Information: The
www.eeworm.com/read/473927/6822736

txt 119-3.txt

Rule: -- Sid: 119-3 -- Summary: This event is generated when the pre-processor http_inspect detects network traffic that may constitute an attack. -- Impact: Unknown. This may be an attempt
www.eeworm.com/read/473927/6823909

txt 119-16.txt

Rule: -- Sid: 119-16 -- Summary: This event is generated when the pre-processor http_inspect detects network traffic that may constitute an attack. -- Impact: Unknown. This may be an attempt
www.eeworm.com/read/473927/6824295

txt 119-12.txt

Rule: -- Sid: 119-12 -- Summary: This event is generated when the pre-processor http_inspect detects network traffic that may constitute an attack. -- Impact: Unkown. -- Detailed Information
www.eeworm.com/read/473927/6824806

txt 120-1.txt

Rule: -- Sid: 120-1 -- Summary: This event is generated when the pre-processor http_inspect detects network traffic that may constitute an attack. -- Impact: Unknown. -- Detailed Information
www.eeworm.com/read/473927/6824971

txt 122-14.txt

Rule: -- Sid: 122-14 -- Summary: This event is generated when the pre-processor sfPortscan detects network traffic that may constitute an attack. Specifically an ip filtered decoy protocol scan wa
www.eeworm.com/read/375764/9350133

c siftfeat.c

/* This program detects image features using SIFT keypoints. For more info, refer to: Lowe, D. Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision, 60,