• 漏洞研究包括漏洞挖掘漏洞分析

    Vulnerability researches consist of vulnerability exploiting and vulnerability analysis.

    youdao

  • 任何漏洞分析一样我们确定组件及其外部通信路径开始

    As with any vulnerability analysis, we start by identifying the components and their external communication paths.

    youdao

  • 任何漏洞分析一样,我们从确定组件及其外部通信路径开始

    As with any vulnerability analysis, start by identifying the components and their external communication paths.

    youdao

  • 主要研究方向信息安全软件漏洞分析检测恶意代码分析防范

    Research Interest: Information security, Vulnerability analysis and detection, Malware analysis and prevention.

    youdao

  • Nessus漏洞扫描器提供几个重要扫描特性比如高速发现资产概况漏洞分析

    The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.

    youdao

  • Nessus漏洞扫描器提供几个重要扫描特性比如高速探测资产分析漏洞分析

    The Nessus vulnerability scanner provides several important scanning features, such as high-speed discovery, asset profiling, and vulnerability analysis.

    youdao

  • 安全需求分析软件漏洞分析重要一个环节,能够指明分析的方向,提高分析效率

    Security requirement analysis is a very important part of software vulnerability analysis technology, it points out the analysis direction and improves efficiency.

    youdao

  • 漏洞分析指对已发现漏洞细节进行深入分析,澄清漏洞成因漏洞利用、补救提供技术支持

    Vulnerability analysis is to analyze further the known vulnerability to figure out their causes with the aim to offer technical support for exploiting or saving them.

    youdao

  • 如图1中所示,需要风险分析协调器更新SOA资产威胁漏洞组成的存储库不断增长的复杂性

    As shown in Figure 1, you need the Risk analysis orchestrator to update ever-growing complexity of repositories of assets, threats, and vulnerabilities across the SOAs.

    youdao

  • 相反的,研究确实发现代码长度静态分析漏洞数量线形关系

    By contrast, research did find a strong linear relationship between code base size and static analysis defect count.

    youdao

  • 然而罗的分析漏洞自相矛盾有染

    Yet Mr Hiro's analysis is marred by gaps and inconsistencies.

    youdao

  • 这一货币分析存在某些漏洞

    The currency theory also has holes in it.

    youdao

  • 可以通过利用PureCoverage来有规律地分析这个测试覆盖特定子系统覆盖水平寻找漏洞

    You can stay on top of this by using PureCoverage to analyze the test coverage routinely and watch for drops in the coverage level of a given subsystem.

    youdao

  • 随着攻击进化会有工具辅助代码分析,代码分析提供信息帮助找到存在漏洞的代码

    As these attacks evolve there will be tools to assist with code analysis that will give information to help you find the lines of code where the vulnerabilities exist.

    youdao

  • 特别的是,静态分析能够寻找编码形式相关的编码,识别基本代码漏洞

    More specifically, static analysis is able to look for coding generally concerned with coding style to identify rudimentary bugs.

    youdao

  • 分析不会揭示内部应用程序漏洞揭示其他大多数漏洞

    This analysis doesn't uncover internal application vulnerabilities, but does expose most others.

    youdao

  • 图表分析师成为自身行为漏洞的牺牲品:他们四处寻找模式的“证实”,就好像他们从所持的咖啡期货看出的花样。

    Chartists fall prey to their own behavioural flaw, finding "confirmation" of patterns everywhere, as if they were reading clouds in their coffee futures.

    youdao

  • 只有漏洞生命周期进行研究并且分析一定规律才能达到真正解决漏洞危害目的

    Only the life cycle of loopholes research and analysis of the certain laws, to achieve the purpose of real solutions loophole harm.

    youdao

  • 没有专门安全分析团队一般Web开发人员似乎这些漏洞束手无策

    Without a specialized team of security analysts, it may seem impossible for the average Web developer to fight against these vulnerabilities.

    youdao

  • 上所述,通过河南省老干部乒乓球运动参与现状研究分析力求弥补以往研究漏洞

    In summary, through to the Henan Province old cadre ping pong movement participation present situation research and the analysis, the Endeavour atonement formerly studied the loophole.

    youdao

  • 第三在当前理论实践基础总结分析现行权利担保制度漏洞

    Chapter Three analyzes the flaws of the current legal system of security of right basing on the summary of the current theories and practices.

    youdao

  • 网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    youdao

  • 通过逐分析程序源代码发现软件潜在的安全漏洞

    It can find out secure vulnerabilities in software by analyzing source programs line by line.

    youdao

  • 研究DHCP协议漏洞分析采用DHCP技术网络DHCP所面临的威胁针对不同的威胁提出消除威胁解决方案

    It will research the holes of DHCP protocol, analyze DHCP threats in network applying DHCP technology and design the solution to eliminate them according to different threats.

    youdao

  • 现有采用基于源代码分析漏洞静态检测方法中存在的主要问题漏报率较高

    The main problem of existing static vulnerability detection methods based source code analysis is their high false positive and false negative rates.

    youdao

  • 传统信息系统安全风险评估系统运行维护环境出发,分析漏洞威胁

    Traditional risk assessment of information system security goes from the environment of system operating and preservation, analyzing its loopholes and threats.

    youdao

  • 最后作为网络漏洞扫描技术补充简要介绍讨论了系统脆弱性分析技术。

    Finally, as a complement to the leak scan technology, vulnerability analysis technology is also introduced and discussed briefly in the paper.

    youdao

  • 提出了一个静态分析动态验证安全漏洞检测模型

    Propose a security vulnerabilities detection model which use static analysis and dynamic verification strategy.

    youdao

  • 提出了一个静态分析动态验证安全漏洞检测模型

    Propose a security vulnerabilities detection model which use static analysis and dynamic verification strategy.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定