• Some interesting programs installed include those related to network security assessment.

    我还安装了一些网络安全评估有关的有趣软件

    youdao

  • This paper works out with a new method of network security assessment based on Bayesian privilege graph which is a combination of graph theory and probability.

    本文在上述几类网络安全评估方法基础之上,结合以及概率学的知识,提出了基于贝叶斯网权限图的网络安全评估方法。

    youdao

  • The combination of analysis covering different kinds of knowledge makes the network security assessment more accurate, more precise and suits to the changes of networks.

    涵盖各个领域量化分析结合在一起使得基于贝叶斯权限图网络安全评估方法更加准确精确,更加能够适应动态变化网络。

    youdao

  • Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.

    网络安全评价复杂系统工程现有安全评估工具大都只是用于对网络系统安全漏洞进行扫描检测

    youdao

  • Risk, training, and culture: Conduct risk assessment and physical security of your facility that houses the computer and network infrastructure.

    风险培训文化执行风险评估容纳计算机网络基础结构设施物理安全性评估。

    youdao

  • Econolite’s StrongPoint network security appliance was recently the subject of an ITS network vulnerability assessment and penetration test performed by Sword & Shield Enterprise Security.

    美国Econolite公司开发StrongPoint网络安全装置最近接受Sword&Shield企业安全公司的智能交通系统(ITS易损性评估渗透性试验

    youdao

  • Analyzing the essential characteristic of the network security situation assessment, and the reasoning model is proposed.

    分析网络安全态势估计问题的本质特征,构造了网络安全态势推理评估求解模型。

    youdao

  • The investigation results show that this model can be used to a comprehensive assessment of network security levels effectively.

    研究结果表明模型有效地网络安全等级进行综合评价

    youdao

  • In the field of network security, the secure performance analysis assessment based host is becoming highlighting.

    计算机网络安全领域针对目标主机安全性能分析评估当前的研究热点

    youdao

  • In order to avoid the occurrence of security incidents, risk assessment on the network is of important significance.

    为了避免安全事件发生网络进行风险评估就有着重要的意义。

    youdao

  • The threat-assessment pattern analyzed the threat level to network security through multi-sensor fusion technology with the result of early warning analysis.

    威胁评估模块将预警分析结果(攻击预测)作为输入,利用多属性融合技术定量分析网络安全威胁程度

    youdao

  • An security risk assessment model in Intranet is established, because of the network assessment problems.

    针对内网安全评估问题构建了内网安全风险评估系统模型

    youdao

  • In this paper we analyze and compare the existing network security model and quantitative assessment methods.

    网络安全性量化评估问题是目前网络安全领域的研究热点之一。

    youdao

  • The next generation network security situation assessment system (NGNSSA) is a special risk assessment tool for NGN.

    下一代网络安全态势评估系统(NGNSSA)一个专门针对下一代网络的安全态势评估工具

    youdao

  • BP neural network, the method is nonlinear method, is applied to risk assessment model of information security. The subjectivity and man-made is overcome. It's an effective method.

    建立信息安全风险评估体系采用BP神经网络方法是一非线性方法,不带有明显的主观成分人为因素,使评价结果更有效、更客观。

    youdao

  • BP neural network, the method is nonlinear method, is applied to risk assessment model of information security. The subjectivity and man-made is overcome. It's an effective method.

    建立信息安全风险评估体系采用BP神经网络方法是一非线性方法,不带有明显的主观成分人为因素,使评价结果更有效、更客观。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定