• The network vulnerability scanner based on port scanning and plugin is proposed in this article.

    本文提出了基于端口扫描插件网络漏洞扫描器模型

    youdao

  • Secondly, the dissertation analyzed and induced network vulnerability scanners' functions, and presented a CIM model of the scanner.

    分析归纳网络漏洞扫描系统功能基础上,构建了其对应的CIM通用模型

    youdao

  • The dissertation studied the management information modeling method based on CIM, then presented a CIM model of network vulnerability scanner.

    本文基于CIM管理信息建模方法进行了研究提出一个网络漏洞扫描系统的CIM管理信息模型

    youdao

  • In this paper, a scalable network vulnerability scanner system is presented, which can respond quickly to the latest discovered security holes, and greatly improve the defense capability of systems.

    提出一种可扩展网络弱点扫描系统能够在较短的时间内发现安全问题迅速做出反应极大地提高系统的安全防御能力

    youdao

  • A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.

    漏洞扫描器类似其他类型扫描器——例如端口扫描器有助于保障端口上网络系统的安全

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

  • In network security, the vulnerability scanner will find the hidden vulnerability.

    网络安全漏洞扫描起着发现安全隐患的作用。

    youdao

  • In network security, the vulnerability scanner will find the hidden vulnerability.

    网络安全漏洞扫描起着发现安全隐患的作用。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定