• To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.

    模型透明计算机系统基础,利用透明计算技术计算机内部安全问题进行控制。

    youdao

  • The security model carried on an application in the detection of computer virus, for this purpose, we also developed a simple simulation program based on binary coding.

    将该安全模式计算机病毒检测进行了应用,实现了一个简单基于二进制编码的计算机病毒检测模拟系统。

    youdao

  • With the popularity of EFI, this model has a good prospect in achieving security on computer system.

    随着EFI普及实现安全计算机系统具有好的应用前景

    youdao

  • Starting from the computer network security and the commercial trade security, basing on the technology of network security and commerce security, this paper is presenting the security system model.

    电子商务系统计算机网络安全,商务交易安全性出发,在分析网络安全技术交易安全技术基础上,给出了一种保证电子商务安全的体系结构。

    youdao

  • A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    youdao

  • The research of security analysis needed a systemic security analysis model that was from the system resource and security factor of computer network.

    安全性分析研究工作需要计算机网络安全相关系统资源安全因素抽取出来建立一种面向安全性分析的安全模型

    youdao

  • The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.

    针对计算机系统安全故障方法网络信息系统攻击方法应用了这一安全分析建模工作。

    youdao

  • In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again.

    计算机安全学安全模型规则客体被置为不活动后,不能被访问直至被置为活动

    youdao

  • Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.

    本文通过大量网络弱点分析,结合网络的特性建立安全性分析模型生成网络攻击

    youdao

  • Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.

    本文通过大量网络弱点分析,结合网络的特性建立安全性分析模型生成网络攻击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定