Examples of using To evade detection in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Flu checks its biological clock to evade detection.
The jets are designed to evade detection and have the latest electronics suite that can allow them to be effective even in well defended airspace.
When combined with on-site inspections,no country would be able to evade detection.
Fast flux attacks refer to techniques used by cybercriminals to evade detection by rapidly modifying IP addresses and/or name servers.
The FDA has alsofound that distributors often re-label products to evade detection.
To evade detection, MoneyTaker employs SSL certificates generated using names of well-known brands such as Bank of America, Federal Reserve Bank, Microsoft, and Yahoo.
However, tumors also employ strategies to evade detection by the immune system.
Adversaries constantly probe classifiers with new inputs/payloads in an attempt to evade detection.
Self-protection: Chamois tried to evade detection using obfuscation and anti-analysis techniques, but our systems were able to counter them and detect the apps accordingly.
The trucks and train cars are easily moved andare designed to evade detection by inspectors".
In January, nearly 10 percent of phishing sites were hosted on non-Port80 HTTP servers in an apparent attempt to evade detection.
From its stealth technology to its fighter capabilities,the F-35 will allow pilots to evade detection and fly at supersonic speeds while conducting air defense;
The United States's position is that thisgreatly improved the ability of Soviet submarines to evade detection.
Consequently, the Democratic People's Republic of Korea has had to adapt,explore and perfect ways to evade detection and circumvent constraints on the financing of prohibited programmes and activities.
Of more than 29,000 phish kits analyzed,more than a third used techniques to evade detection.
They also use legitimate remote administration software to evade detection by antivirus solutions.
The hackers had most likely configured themining software to keep the usage low to evade detection.
They also use legitimate remote administration software to evade detection by antivirus solutions.
Operatives can learn techniques such as the manufacture of explosives, the use of armaments,and ways to evade detection.
DUX4 is normally expressed in early development,when embryonic cells need to evade detection by the maternal immune system.
Cheat Engine is mostly used for cheating in computer games,and is sometimes modified and recompiled to evade detection.
Attackers in the future will go to lower level assaults” such as this to evade detection, he says.
He weaponized this knowledge by adding an invisible firstmultipart that contained many reputable domains in an attempt to evade detection.
The S bacteria werelethal because they had a smooth capsule that enabled them to evade detection by the immune system.
TreasureHunt was first discovered by researchers at the SANS Institute whonoticed the malware generating mutex names to evade detection.
For example, there was a trend towards greater specialization and decentralization of the illicit manufacture of methamphetamine, in orderto evade detection, and more non-controlled substances were being used.
TreasureHunt was first discovered by researchers at the SANS Institute whonoticed the malware generating mutex names to evade detection.
If you are building a fraud model,the fraudsters will adapt their methods to evade detection by your model.
Nils Lonberg, senior vice president of Oncology Biology Discovery,says three biological mechanisms affect cancer's ability to evade detection and grow out of control:.