• The algorithm has been used successfully in fighter aircraft vulnerability analysis.

    算法可以有效地应用飞机易损性分析计算中。

    youdao

  • Vulnerability researches consist of vulnerability exploiting and vulnerability analysis.

    漏洞研究包括漏洞挖掘漏洞分析

    youdao

  • As with any vulnerability analysis, start by identifying the components and their external communication paths.

    任何漏洞分析一样,我们从确定组件及其外部通信路径开始

    youdao

  • As with any vulnerability analysis, we start by identifying the components and their external communication paths.

    任何漏洞分析一样我们确定组件及其外部通信路径开始

    youdao

  • Research Interest: Information security, Vulnerability analysis and detection, Malware analysis and prevention.

    主要研究方向信息安全软件漏洞分析检测恶意代码分析与防范

    youdao

  • This paper makes an E-R model for the comprehensive vulnerability analysis model, and establishes IMS vulnerability knowledge base.

    脆弱性综合分析模型进行E-R建模建立了脆弱性知识库

    youdao

  • The main factors of road seismic damage are summed up, and the vulnerability analysis method of road system is introduced especially.

    总结道路震害主要因素着重介绍道路系统易损性分析方法

    youdao

  • Network scanning is one of the methods of data acquisition in DNMAI, scanning result is some fundamental data for vulnerability analysis.

    网络扫描DNMAI数据采集方法种,扫描结果也是脆弱性分析基础数据之一。

    youdao

  • Finally, as a complement to the leak scan technology, vulnerability analysis technology is also introduced and discussed briefly in the paper.

    最后作为网络漏洞扫描技术补充简要介绍讨论了系统脆弱性分析技术。

    youdao

  • The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.

    Nessus漏洞扫描器提供几个重要扫描特性比如高速发现资产概况漏洞分析

    youdao

  • The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.

    Nessus漏洞扫描器提供几个重要扫描特性比如高速探测资产分析漏洞分析

    youdao

  • The collapse-vulnerability analysis based on collapse probability is the most reasonable method to evaluate the collapse resistant capacity of structures.

    基于倒塌结构倒塌易损性分析目前评价结构倒塌能力合理方法

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • Security requirement analysis is a very important part of software vulnerability analysis technology, it points out the analysis direction and improves efficiency.

    安全需求分析软件漏洞分析重要一个环节,能够指明分析的方向提高分析的效率。

    youdao

  • Vulnerability analysis is to analyze further the known vulnerability to figure out their causes with the aim to offer technical support for exploiting or saving them.

    漏洞分析指对已发现漏洞细节进行深入分析,澄清漏洞成因漏洞利用、补救提供技术支持

    youdao

  • Several existing advanced vulnerability analysis methods and models are compared and summarized. Advantages and disadvantages of each technique are discussed in detail.

    现有网络脆弱性分析领域的几种先进模型技术进行分析、比较综述详细讨论了各种技术优缺点

    youdao

  • In aircraft vulnerability analysis, it is necessary to calculate the projection areas of the aircraft and its critical components facing against the attacked direction.

    进行飞机易损性分析时,需要计算飞机部件在垂直于来方向投影面积

    youdao

  • After the analysis and comparison of the existing vulnerability analysis methods, a new vulnerability model of distributed systems based on reliability theory is proposed.

    现有脆弱性分析方法进行分析比较提出基于可靠性理论分布式系统脆弱性模型

    youdao

  • The result of the seismic vulnerability analysis is presented as a map of seismic vulnerability analysis. The total index m is the base for compiling a map of vulnerability analysis.

    地震易损性分析结果地震易损性分析图总的易损性指数M编制易损性分析图依据

    youdao

  • Vulnerability analysis and assessment are the key and basis for adapting and mitigating climate change, being the highlight in the research fields of climate change and ecology in recent years.

    生态系统脆弱性分析评价适应减缓气候变化关键基础已成为近年来气候变化领域生态学领域的研究热点

    youdao

  • Then a systematic procedure analysis was used to analyze protocols subject to guessing attacks-Vulnerability of protocols.

    接着采用程序化分析方法协议可能遭受猜测攻击进行了分析即协议的脆弱性分析。

    youdao

  • The main problem of existing static vulnerability detection methods based source code analysis is their high false positive and false negative rates.

    现有采用基于源代码分析漏洞静态检测方法中存在的主要问题漏报率较高

    youdao

  • In this paper, the vulnerability of pattern matching is analyzed, and an effective detection method which is called protocol analysis is proposed.

    本文揭示了模式匹配技术弱点分析一种新的、有效检测方法协议分析技术

    youdao

  • The vulnerability assessment of water resources is comprehensive analysis of water resources ecosystem, including the supply and demand of water resources.

    气候变化下水资源脆弱性评估水资源系统综合评估,主要包括水资源供给需求平衡的评估。

    youdao

  • This paper analyzes the seismic vulnerability of multistory dwelling brick buildings by Latin Hypercube Sampling technique and nonlinear seismic time history response analysis.

    本文采用概率方法借助于拉丁立方采样技术非线性地震反应分析多层住宅砖房地震易损性进行分析

    youdao

  • This theoretical framework proposes an analysis of vulnerability mainly from the measurement of vulnerability and the recognition of vulnerability factors.

    脆弱性分析框架提出脆弱性分析主要是从脆弱性度量脆弱因素识别等方面进行分析。

    youdao

  • Based on the analysis of a perfect security vulnerability collection module, this article presents that exploiting a new software-security vulnerability auto-collection software is necessary.

    本文在对完善的安全漏洞收集模型分析基础指出开发一种新的软件——安全漏洞自动收集软件的必要性。

    youdao

  • Based on the DRASTIC model, the fuzzy analysis theory and method which are suitable for evaluating aquifer vulnerability are established and have been used in Cangzhou City.

    以DRAST IC模型为基础建立了评价含水层污染性难程度模糊分析理论方法应用沧州市区地下水系统脆弱性评价。

    youdao

  • Based on the analysis and studying different concepts on groundwater vulnerability at home and abroad, put forward the inherent vulnerability and special vulnerability.

    国内外有关地下水脆弱性概念不同定义入手,通过分析研究提出了地下水固有脆弱性和特殊脆弱性的定义。

    youdao

  • Based on the analysis and studying different concepts on groundwater vulnerability at home and abroad, put forward the inherent vulnerability and special vulnerability.

    国内外有关地下水脆弱性概念不同定义入手,通过分析研究提出了地下水固有脆弱性和特殊脆弱性的定义。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定