• Have studied the vulnerability of the network and security countermeasure of vulnerability and established the foundation further for the online security respect.

    网络安全方面进一步研究网络脆弱性以及脆弱性安全对策奠定了基础

    youdao

  • If the decrease of the value of maximum flow by the destruction is large, the degree of influence of the edge on the vulnerability of the network is considered to be large.

    某条破坏后使最大流减少,可以说它网络脆弱性影响较大

    youdao

  • A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.

    漏洞扫描器类似其他类型扫描器——例如端口扫描器有助于保障端口上网络系统的安全

    youdao

  • Having a network of social support and outlets for expressing emotion seem to be protective. Personality traits, on the other hand, play a surprisingly small part in predicting vulnerability.

    有着社交支持宣泄情感的渠道的人防此病的能力强,而性格特点预测脆弱性却只一小部分作用

    youdao

  • Study the association relation between the vulnerabilities is the focus of the network vulnerability assessment theory.

    研究弱点关联关系目前网络弱点评估重点

    youdao

  • Econolite’s StrongPoint network security appliance was recently the subject of an ITS network vulnerability assessment and penetration test performed by Sword & Shield Enterprise Security.

    美国Econolite公司开发StrongPoint网络安全装置最近接受Sword&Shield企业安全公司的智能交通系统(ITS易损性评估渗透性试验

    youdao

  • In this paper, a scalable network vulnerability scanner system is presented, which can respond quickly to the latest discovered security holes, and greatly improve the defense capability of systems.

    提出一种可扩展网络弱点扫描系统能够在较短的时间内发现安全问题迅速做出反应极大地提高系统的安全防御能力

    youdao

  • Vulnerability is the inherent nature of the complex network and the focus of network attack and defense.

    脆弱性复杂网络系统固有本性,是网络攻防焦点

    youdao

  • This article studies the system structure, the integrated way and the design of IDSS knowledge base at first, and then deeply discusses the system vulnerability and network attack modeling.

    本文首先研究智能决策支持系统体系结构集成方式知识库设计然后系统漏洞网络攻击模式进行了深入探讨

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • The dissertation studied the management information modeling method based on CIM, then presented a CIM model of network vulnerability scanner.

    本文基于CIM管理信息建模方法进行了研究提出一个网络漏洞扫描系统的CIM管理信息模型

    youdao

  • Secondly, the dissertation analyzed and induced network vulnerability scanners' functions, and presented a CIM model of the scanner.

    分析归纳网络漏洞扫描系统功能基础上,构建了其对应的CIM通用模型

    youdao

  • You may not probe, scan or test the vulnerability of the Site or any network connected to the Site, nor breach the security or authentication measures on the Site or any network connected to the Site.

    可以探查扫描测试网站连接网站任何网络漏洞也不可以违反网站或连接到网站的任何网络安全性身份验证措施

    youdao

  • The greater the availability of the network, the greater its vulnerability to threats from within and outside the organization.

    网络应用范围广,来自内部外部组织的网络脆弱性的袭击越大

    youdao

  • The existing technology and system of vulnerability detecting, however, have difficulties on dealing with network crossing, interceptor crossing and bottle-neck effect, etc.

    然而现有脆弱性检测技术检测系统存在无法拦截器检测、瓶颈效应问题

    youdao

  • The audit trail not only highlights points of vulnerability on a network, but can also identify the password and equipment used to invade the system during an inside job.

    审计线索不仅突出网络脆弱处,而且识别出一次内部作业用于入侵系统口令设备

    youdao

  • Based on the structure preserving model, according to the variation of transient energy in power network, line vulnerability index and outset vulnerability index are defined.

    结构保持模型基础上,根据网络暂态能量变化规律,定义了支路割集的脆弱性指标

    youdao

  • Network scanning is one of the methods of data acquisition in DNMAI, scanning result is some fundamental data for vulnerability analysis.

    网络扫描DNMAI数据采集方法种,扫描结果也是脆弱性分析基础数据之一。

    youdao

  • Study on network resilience is about the characteristics of robustness and vulnerability in random failing of nodes and intended attacking on nodes.

    网络弹性研究网络节点失效被有意攻击下所表现出来的特征

    youdao

  • With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.

    随着等级保护应用普及网络安全漏洞扫描充分考虑执行效率和功能扩展性问题。

    youdao

  • In order to safeguard the security of network information system, the network vulnerability detecting system is worth of thorough research.

    为了保障网络信息系统安全,必须网络漏洞探测系统进行深入研究

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

  • Network vulnerability index calculation, pays attention to the method and the model of network vulnerability index calculation.

    网络脆弱性指数计算,主要研究网络脆弱性指数计算方法脆弱性指数计算模型

    youdao

  • Network vulnerability index calculation, pays attention to the method and the model of network vulnerability index calculation.

    网络脆弱性指数计算,主要研究网络脆弱性指数计算方法脆弱性指数计算模型

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定