英語 での To avoid detection の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
It is shaped to avoid detection by enemy radar.
The location of the bank was frequently changed to avoid detection.
But sometimes cancers are able to avoid detection and destruction by the immune system.
Malware is constantly finding new ways to avoid detection.
To avoid detection of this steroid, you may need to wait up to a year and a half.
Training took place at night to avoid detection by enemy planes.
The virus maydelete itself once it has finished its task in order to avoid detection.
For example, a person who wants to avoid detection will sometimes deposit a large sum as multiple smaller sums within a brief period of time.
The unknown hackers also employed a number of techniques to avoid detection.
Because an attacker could tweak malicious code to avoid detection, a counterstrike would be more effective in neutralizing future attacks.
Your order will start to be delivered within 24 hours,sending is done at a slow speed to avoid detection.
This makes the suspension thechoice for athletes who may be trying to avoid detection and only need a testosterone bump for the short-term.
It was agreed between the three Japanese soldiers that theyshould limit their contact with each other as to avoid detection.
The scammers attempted to avoid detection by using virtual offices, including more than 80 different domain names and 130 different phone numbers.
This virus is probably based on VCL-created code,modified to avoid detection by some scanners.
It also uses some string obfuscation techniques to avoid detection, for example it requires the construction of the"User-Agent" from different variables.
Butler's force arrived near Cherry Valley late on November 10,and established a cold camp to avoid detection.
The worm has been continually updated to avoid detection and now more than half a million systems have been infected worldwide creating a botnet, the report says.
Knowing that it stays active in your system for about three times that long is helpful,especially if you are trying to avoid detection.
We analyzed malicious apps based on Chamois,and found that they employed several methods to avoid detection and tried to trick users into clicking ads by displaying deceptive graphics.
The three of them also hacked into a credit card companyinvestigating their payment processing business in an effort to avoid detection.
Symantec has identified increased attacks aimed at client-side applications,increased use of evasive tactics to avoid detection, and that large, widespread Internet worms have given way to smaller, more targeted attacks focusing on fraud, data theft, and criminal activity.
Although fantasy and ritual were extremely important to him he remained in complete control and was fully aware of his actions andhis need to avoid detection.
This virus is probably based on VCL-created code,and has just been modified to avoid detection by some of the most popular scanners.
Doing some google-fu revealed that this phishing scheme has been going on for a while, and the attacker has, in fact,changed the domains a few times already in order to avoid detection.
Their high-volume infrastructure attacks have hadsignatures that appear to be specially crafted to avoid detection by DDoS mitigation technology.
The recent NotPetya and WannaCry ransomware-based massive attacks, IoT malware like Mirai andbanking Trojans implement new sophisticated techniques to avoid detection and to rapidly spread.
The Thirteen Families and their associates used tactics like putting purchases in the names of family members, business associates, dead people, fictitious people,and even pets to avoid detection and to exceed the allowed amount which they had agreed upon themselves.
October 9 this year to keep the temple was to take advantage of people Luo Guiming conversation with the machine, fleeing into the temple, the beams hung around the lobby of a pair of wooden lanterns Republic stolen,but fortunately the police in a timely manner to avoid detection before the Temple was evil.
The Thirteen Families and their associates used tactics like putting purchases in the names of family members, business associates, dead people, fictitious people,and even pets to avoid detection and to exceed the allowed amount which they had agreed upon themselves.