The algorithm has been used successfully in fighter aircraft vulnerability analysis.
该算法可以有效地应用于飞机易损性分析计算中。
Vulnerability researches consist of vulnerability exploiting and vulnerability analysis.
漏洞研究包括漏洞挖掘与漏洞分析。
As with any vulnerability analysis, start by identifying the components and their external communication paths.
与任何漏洞分析一样,我们从确定组件及其外部通信路径开始。
As with any vulnerability analysis, we start by identifying the components and their external communication paths.
与任何漏洞分析一样,我们从确定组件及其外部通信路径开始。
Research Interest: Information security, Vulnerability analysis and detection, Malware analysis and prevention.
主要研究方向:信息安全,软件漏洞分析与检测,恶意代码分析与防范。
This paper makes an E-R model for the comprehensive vulnerability analysis model, and establishes IMS vulnerability knowledge base.
并对脆弱性综合分析模型进行了E-R建模,建立了脆弱性知识库。
The main factors of road seismic damage are summed up, and the vulnerability analysis method of road system is introduced especially.
总结道路震害的主要因素,着重介绍道路系统易损性分析方法。
Network scanning is one of the methods of data acquisition in DNMAI, scanning result is some fundamental data for vulnerability analysis.
网络扫描是DNMAI中数据采集方法的一种,扫描结果也是脆弱性分析的基础数据之一。
Finally, as a complement to the leak scan technology, vulnerability analysis technology is also introduced and discussed briefly in the paper.
最后,作为对网络漏洞扫描技术的补充,简要介绍和讨论了系统脆弱性分析技术。
The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.
Nessus漏洞扫描器提供几个重要的扫描特性,比如高速发现、资产概况和漏洞分析。
The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.
Nessus漏洞扫描器提供几个重要的扫描特性,比如高速探测、资产分析和漏洞分析。
The collapse-vulnerability analysis based on collapse probability is the most reasonable method to evaluate the collapse resistant capacity of structures.
基于倒塌率的结构倒塌易损性分析是目前评价结构抗倒塌能力最合理的方法。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
Security requirement analysis is a very important part of software vulnerability analysis technology, it points out the analysis direction and improves efficiency.
安全需求分析是软件漏洞分析中极重要的一个环节,能够指明分析的方向,提高分析的效率。
Vulnerability analysis is to analyze further the known vulnerability to figure out their causes with the aim to offer technical support for exploiting or saving them.
漏洞分析是指对已发现漏洞的细节进行深入分析,澄清漏洞成因,为漏洞利用、补救提供技术支持。
Several existing advanced vulnerability analysis methods and models are compared and summarized. Advantages and disadvantages of each technique are discussed in detail.
对现有网络脆弱性分析领域的几种先进模型和技术进行分析、比较和综述,详细讨论了各种技术的优缺点。
In aircraft vulnerability analysis, it is necessary to calculate the projection areas of the aircraft and its critical components facing against the attacked direction.
在进行飞机易损性分析时,需要计算飞机及各部件在垂直于来袭方向的投影面积。
After the analysis and comparison of the existing vulnerability analysis methods, a new vulnerability model of distributed systems based on reliability theory is proposed.
对现有的脆弱性分析方法进行分析和比较,提出基于可靠性理论的分布式系统脆弱性模型。
The result of the seismic vulnerability analysis is presented as a map of seismic vulnerability analysis. The total index m is the base for compiling a map of vulnerability analysis.
地震易损性分析的结果是地震易损性分析图,总的易损性指数M是编制易损性分析图的依据。
Vulnerability analysis and assessment are the key and basis for adapting and mitigating climate change, being the highlight in the research fields of climate change and ecology in recent years.
生态系统脆弱性分析和评价是适应和减缓气候变化的关键和基础,已成为近年来气候变化领域和生态学领域的研究热点。
Then a systematic procedure analysis was used to analyze protocols subject to guessing attacks-Vulnerability of protocols.
接着,采用程序化分析方法对协议可能遭受到的猜测攻击进行了分析即协议的脆弱性分析。
The main problem of existing static vulnerability detection methods based source code analysis is their high false positive and false negative rates.
现有的采用基于源代码分析的漏洞静态检测方法中存在的主要问题是误报率和漏报率较高。
In this paper, the vulnerability of pattern matching is analyzed, and an effective detection method which is called protocol analysis is proposed.
本文揭示了模式匹配技术的弱点,分析了一种新的、有效的检测方法,即协议分析技术。
The vulnerability assessment of water resources is comprehensive analysis of water resources ecosystem, including the supply and demand of water resources.
气候变化下水资源脆弱性评估是水资源系统的综合评估,主要包括水资源供给与需求平衡的评估。
This paper analyzes the seismic vulnerability of multistory dwelling brick buildings by Latin Hypercube Sampling technique and nonlinear seismic time history response analysis.
本文采用概率方法借助于拉丁超立方采样技术和非线性地震反应时程分析对多层住宅砖房的地震易损性进行分析。
This theoretical framework proposes an analysis of vulnerability mainly from the measurement of vulnerability and the recognition of vulnerability factors.
该脆弱性分析框架提出脆弱性分析主要是从脆弱性的度量和脆弱因素的识别等方面进行分析。
Based on the analysis of a perfect security vulnerability collection module, this article presents that exploiting a new software-security vulnerability auto-collection software is necessary.
本文在对一种完善的安全漏洞收集模型分析的基础上,指出了开发一种新的软件——安全漏洞自动收集软件的必要性。
Based on the DRASTIC model, the fuzzy analysis theory and method which are suitable for evaluating aquifer vulnerability are established and have been used in Cangzhou City.
以DRAST IC模型为基础,建立了评价含水层污染性难易程度的模糊分析理论与方法,并将其应用于沧州市区地下水系统脆弱性评价。
Based on the analysis and studying different concepts on groundwater vulnerability at home and abroad, put forward the inherent vulnerability and special vulnerability.
从国内外有关对地下水脆弱性概念的不同定义入手,通过分析和研究,提出了地下水固有脆弱性和特殊脆弱性的定义。
Based on the analysis and studying different concepts on groundwater vulnerability at home and abroad, put forward the inherent vulnerability and special vulnerability.
从国内外有关对地下水脆弱性概念的不同定义入手,通过分析和研究,提出了地下水固有脆弱性和特殊脆弱性的定义。
应用推荐