• 网络脆弱性分析解决网络安全问题有效手段之一

    Network vulnerability analysis is one of the effective solutions for network security problem.

    youdao

  • 最后作为网络漏洞扫描技术补充简要介绍讨论了系统脆弱性分析技术。

    Finally, as a complement to the leak scan technology, vulnerability analysis technology is also introduced and discussed briefly in the paper.

    youdao

  • 接着采用程序化分析方法协议可能遭受猜测攻击进行了分析即协议的脆弱性分析

    Then a systematic procedure analysis was used to analyze protocols subject to guessing attacks-Vulnerability of protocols.

    youdao

  • 网络扫描DNMAI数据采集方法种,扫描结果也是脆弱性分析基础数据之一。

    Network scanning is one of the methods of data acquisition in DNMAI, scanning result is some fundamental data for vulnerability analysis.

    youdao

  • 现有脆弱性分析方法进行分析比较提出基于可靠性理论分布式系统脆弱性模型

    After the analysis and comparison of the existing vulnerability analysis methods, a new vulnerability model of distributed systems based on reliability theory is proposed.

    youdao

  • 脆弱性分析框架提出脆弱性分析主要是从脆弱性度量脆弱因素识别等方面进行分析

    This theoretical framework proposes an analysis of vulnerability mainly from the measurement of vulnerability and the recognition of vulnerability factors.

    youdao

  • 网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    youdao

  • 现有网络脆弱性分析领域的几种先进模型技术进行分析比较综述详细讨论了各种技术优缺点

    Several existing advanced vulnerability analysis methods and models are compared and summarized. Advantages and disadvantages of each technique are discussed in detail.

    youdao

  • 生态系统脆弱性分析评价适应减缓气候变化关键基础已成为近年来气候变化领域生态学领域的研究热点

    Vulnerability analysis and assessment are the key and basis for adapting and mitigating climate change, being the highlight in the research fields of climate change and ecology in recent years.

    youdao

  • 攻击分类研究对于系统分析计算机系统脆弱性攻击利用技术方法有着重要的意义,这有助于构造高效入侵检测方法

    The study of attack classification has a significant role to analyze computer system vulnerability and technique used for attack and can help to build effective detection methods.

    youdao

  • 全面分析脆弱性必须研究脆弱性分类技术因为分类系统研究基础

    It is need to research vulnerability taxonomy technology for the purpose of analyzing vulnerabilities completely, because the taxonomy is the foundation of system research.

    youdao

  • 着重分析生态环境脆弱性概念不同观点此基础上提出一些看法认识。

    More attention is paid to analyze various opinions of vulnerability of ecology and environment so that authors show themselves views.

    youdao

  • 通过分析不同干旱程度下各区脆弱度的形成变化原因提出了具有针对性降低农业旱灾脆弱性具体措施。

    Through analyzing reasons of the formation and changes of vulnerability in different drought degrees, the specific countermeasures are put forward to lower the vulnerability.

    youdao

  • 然后银行体系脆弱性生成机理进行深入分析

    Then it has carried on the thorough analysis to the bank system fragility production mechanism.

    youdao

  • 接着论文我国银行体系脆弱性现状及其影响因素进行深入分析

    Then the paper has carried on the thorough analysis to our country Bank system fragility present situation and the influencing factor.

    youdao

  • 最后,通过气象灾害相关资料进行脆弱性实证分析

    Last, give an empirical analysis of vulnerability in meteorological disaster.

    youdao

  • 比较国际不良贷款处置模式之后,目前国内银行采取外资银行入股化解国有银行金融脆弱性做了回归分析

    After comparing international model disposal of bad loans, innovative on the current domestic Banks take foreign Banks acquiring state-owned Banks to resolve financial fragility has been analyzed.

    youdao

  • 分析结果来看我国银行体系脆弱性整体上升下降

    Judging from the results of the analysis, on the overall, the vulnerability of China's banking system rise in first, after the decline.

    youdao

  • 实验证明脆弱性关联模型正确性及其优越描述性能基于模型的威胁分析方法更为合理有效

    The experiment proves the correctness and performance of vulnerability relation model, and the threat analysis method based on the model is more reasonable and effective.

    youdao

  • 以DRAST IC模型为基础建立了评价含水层污染性难程度模糊分析理论方法应用沧州市区地下水系统脆弱性评价。

    Based on the DRASTIC model, the fuzzy analysis theory and method which are suitable for evaluating aquifer vulnerability are established and have been used in Cangzhou City.

    youdao

  • 笔者平原为研究区,采用统计分析方法分析地下水防污地下水资源脆弱性随地下水位埋深之间变化关系

    The statistical analysis method was used to analyze the relationship between the aquifer sensitivity and the groundwater vulnerability with groundwater depth in Hufu plain.

    youdao

  • 脆弱性研究主要方面基于能量函数电压脆弱性基于复杂网络理论结构脆弱性进行了分析

    The main research aspects, such as the energy function based voltage vulnerability and the complex networks theory based structure vulnerability, are analyzed.

    youdao

  • 国内外有关地下水脆弱性概念不同定义入手,通过分析研究提出了地下水固有脆弱性特殊脆弱性的定义。

    Based on the analysis and studying different concepts on groundwater vulnerability at home and abroad, put forward the inherent vulnerability and special vulnerability.

    youdao

  • 金属临界状态通过三种方法分析得出供应危机、供应制约的脆弱性(VSR)以及环境影响

    Metal criticality is analysed in three ways - supply risk, vulnerability to supply restriction (VSR) and environmental implications.

    youdao

  • 本文主要通过入侵检测技术研究,分析脆弱性

    In this article we will find out the frangibility of technology of Intrusion Detection and analyze the frangibility.

    youdao

  • 脆弱性评估气候变化政策研究主要分析工具适应性管理提供参考依据。

    Vulnerability assessment is a tool for analyzing research of climate change policy, and will serve as an reference for adaptation management.

    youdao

  • 脆弱性评估气候变化政策研究主要分析工具适应性管理提供参考依据。

    Vulnerability assessment is a tool for analyzing research of climate change policy, and will serve as an reference for adaptation management.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定