Have studied the vulnerability of the network and security countermeasure of vulnerability and established the foundation further for the online security respect.
为网络安全方面进一步研究网络脆弱性以及脆弱性的安全对策奠定了基础。
If the decrease of the value of maximum flow by the destruction is large, the degree of influence of the edge on the vulnerability of the network is considered to be large.
若某条边被破坏后使最大流减少,可以说它对网络脆弱性的影响较大。
A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.
漏洞扫描器类似于其他类型的扫描器——例如,端口扫描器有助于保障端口上的网络和系统的安全。
Having a network of social support and outlets for expressing emotion seem to be protective. Personality traits, on the other hand, play a surprisingly small part in predicting vulnerability.
有着社交支持和宣泄情感的渠道的人防此病的能力强,而性格特点在预测脆弱性上却只起一小部分作用。
Study the association relation between the vulnerabilities is the focus of the network vulnerability assessment theory.
研究弱点间的关联关系是目前网络弱点评估的重点。
Econolite’s StrongPoint network security appliance was recently the subject of an ITS network vulnerability assessment and penetration test performed by Sword & Shield Enterprise Security.
美国Econolite公司开发的StrongPoint网络安全装置最近接受了Sword&Shield企业安全公司的智能交通系统(ITS)易损性评估和渗透性试验。
In this paper, a scalable network vulnerability scanner system is presented, which can respond quickly to the latest discovered security holes, and greatly improve the defense capability of systems.
提出一种可扩展的网络弱点扫描系统能够在较短的时间内对新发现的安全问题迅速做出反应,极大地提高了系统的安全防御能力。
Vulnerability is the inherent nature of the complex network and the focus of network attack and defense.
脆弱性是复杂网络系统的固有本性,是网络攻防的焦点。
This article studies the system structure, the integrated way and the design of IDSS knowledge base at first, and then deeply discusses the system vulnerability and network attack modeling.
本文首先研究了智能决策支持系统的体系结构、集成方式和知识库设计,然后对系统漏洞和网络攻击模式进行了深入探讨。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
The dissertation studied the management information modeling method based on CIM, then presented a CIM model of network vulnerability scanner.
本文对基于CIM的管理信息建模方法进行了研究,提出了一个网络漏洞扫描系统的CIM管理信息模型。
Secondly, the dissertation analyzed and induced network vulnerability scanners' functions, and presented a CIM model of the scanner.
在分析和归纳网络漏洞扫描系统功能的基础上,构建了其对应的CIM通用模型。
You may not probe, scan or test the vulnerability of the Site or any network connected to the Site, nor breach the security or authentication measures on the Site or any network connected to the Site.
您不可以探查、扫描或测试网站或连接到网站的任何网络的漏洞,也不可以违反网站或连接到网站的任何网络上的安全性或身份验证措施。
The greater the availability of the network, the greater its vulnerability to threats from within and outside the organization.
网络的应用范围越广,来自内部和外部组织的对网络脆弱性的袭击就越大。
The existing technology and system of vulnerability detecting, however, have difficulties on dealing with network crossing, interceptor crossing and bottle-neck effect, etc.
然而,现有的脆弱性检测技术和检测系统存在无法跨网跨拦截器检测、瓶颈效应等问题。
The audit trail not only highlights points of vulnerability on a network, but can also identify the password and equipment used to invade the system during an inside job.
审计线索不仅突出了网络上脆弱之处,而且还能识别出一次内部作业中用于入侵系统的口令和设备。
Based on the structure preserving model, according to the variation of transient energy in power network, line vulnerability index and outset vulnerability index are defined.
在结构保持模型的基础上,根据网络中暂态能量的变化规律,定义了支路及割集的脆弱性指标。
Network scanning is one of the methods of data acquisition in DNMAI, scanning result is some fundamental data for vulnerability analysis.
网络扫描是DNMAI中数据采集方法的一种,扫描结果也是脆弱性分析的基础数据之一。
Study on network resilience is about the characteristics of robustness and vulnerability in random failing of nodes and intended attacking on nodes.
网络弹性研究的是网络在节点失效或被有意攻击下所表现出来的特征。
With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.
随着等级保护的应用和普及,网络安全漏洞扫描需充分考虑执行效率和功能的扩展性问题。
In order to safeguard the security of network information system, the network vulnerability detecting system is worth of thorough research.
为了保障网络信息系统的安全,必须对网络漏洞探测系统进行深入的研究。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
Network vulnerability index calculation, pays attention to the method and the model of network vulnerability index calculation.
网络脆弱性指数计算,主要研究网络脆弱性指数计算方法和脆弱性指数计算模型。
Network vulnerability index calculation, pays attention to the method and the model of network vulnerability index calculation.
网络脆弱性指数计算,主要研究网络脆弱性指数计算方法和脆弱性指数计算模型。
应用推荐