您要查找的是不是:
- A new network vulnerability analysis model is given by use of layered analysis in this paper. 摘要在被动网络节点脆弱性分析方法的基础上提出了一种新的基于主动攻击的网络脆弱性分析模型。
- In recent years, more and more attention is paid to the network security. Network intrusion detection and network vulnerability analysis are active solution for network security problems, and they are too much important. 网络安全问题越来越受到人们的重视,网络入侵检测和网络脆弱性分析是主动的网络安全解决方案,是解决这一问题的重要手段之一。
- network vulnerability analysis 网络脆弱性分析
- At last, applied vulnerability theory and risk evaluation measures of water supply network to the material projects of vulnerability analysis and risk evaluation of water supply network. 最后,将给水管网脆弱性理论和供水系统风险评估方法应用于给水管网脆弱性分析及风险评估的具体工程中。
- A NT weight allotment scheme is given to quantify the network vulnerability in addition. 实验结果表明网络中不同位置节点的脆弱性对整个网络脆弱性的影响不同。
- As with any vulnerability analysis, we start by identifying the components and their external communication paths. 与任何漏洞分析一样,我们从确定组件及其外部通信路径开始。
- Computer network vulnerability assessment is the important part of the computer security domain, it is very important to improve oneself security level of computer network. 摘要计算机网络脆弱性评估是计算机安全领域的重要组成部分,对于提高计算机网络自身的安全水平至关重要。
- In this paper, the prevailing technices and tools of port scanners and network vulnerability scanners are analyzed and compared, and all kinds of these tools are tested. 摘要主要分析、比较和介绍了当前流行的端口扫描和网络弱点扫描技术及工具,并针对不同类型的扫描工具进行了测试比较工作。
- Adopted layered analysis system, using vulnerability analysis function of water node to estimate the index value of the water node. 采用分层的分析体系,利用用水节点的脆弱性分析函数量化各节点的指标值。
- A simple and efficient high-resolution hydrocode is presented for air explosion loading assessments in ship structure vulnerability analysis and prediction. 摘要给出了一种舰船结构空中爆炸载荷的高精度数值计算程序。
- Finally, the simulation experiments, using specific examples once again show that the vulnerability analysis and risk assessment, and certification of the new assignment method is effective. 最后,通过仿真试验,用具体例证再次说明了漏洞分析与风险评估的关系,并验证了新赋值方法的有效性。
- It is a certain reference and important reality signification that the vulnerability analysis and lethality model of space tar get are researched, to strengthen our space defence ability. 该文的研究对加强我国的空间防御能力,具有一定的参考价值和重要的现实意义。
- Participant rural appraisal (PRA), capacity and vulnerability analysis (CVA), sustainable livelihoods approach (SLA) and SWOT analyses are adopted in the paper. 采用“能力与脆弱性(CVA)分析框架”和“可持续生计(SLA)分析框架”相结合的模式进行分析;
- Function Analysis and CIM Modeling of Network Vulnerability Scanners 网络漏洞扫描系统的功能分析与CIM建模
- Vulnerability Analysis and Mapping Unit; 弱点分析和绘图股;
- Evaluation Approaches For Network Vulnerability Scanners Product 网络脆弱性扫描产品测评方法
- Clandestine Vulnerability Analysis 秘密弱点分析
- This fact makes 802.11 networks vulnerable to eavesdropping. 这一种事实对偷听使 802.;11个网络易受伤害。
- ISS specializes in software, appliances and services that help IT shops monitor and manage network vulnerabilities. 国际空间站的专门软件,家用电器和服务,帮助它店监测和管理网络的脆弱性。
- Design and Implementation of Agent-based Network Vulnerability Scanning System 基于Agent的网络漏洞扫描系统的设计与实现