• 利用脆弱性系统进行罪恶的攻击

    A human who exploits a vulnerability perpetrates an attack on the system.

    youdao

  • 脆弱性基金利用现有机制快速灵活地提供资金,同时通过监控安全措施来保证资金的正确使用,佐利克

    The Vulnerability Fund would use existing mechanisms to deliver the funds fast and flexibly, backed by monitoring and safeguards so the money is well spent, says Zoellick.

    youdao

  • 软件脆弱性本质利用脆弱性可以影响系统安全

    The essence of software vulnerability is to exploit and affect system security.

    youdao

  • 攻击分类研究对于系统分析计算机系统脆弱性攻击利用技术方法有着重要的意义,这有助于构造高效入侵检测方法

    The study of attack classification has a significant role to analyze computer system vulnerability and technique used for attack and can help to build effective detection methods.

    youdao

  • 攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    youdao

  • 地下水资源脆弱性具有变性,制定地下水合理利用模式时应当结合现状实际地下水资源脆弱性

    The advices to exploit properly groundwater should be based on current groundwater resource vulnerability because of its changes with time.

    youdao

  • 完整攻击过程通常会包括一系列单独的攻击行为每个攻击行为某个系统漏洞(脆弱性)的一次利用

    A complete attack process usually includes a series of attack actions, and every attack action is a use of system vulnerability.

    youdao

  • 本文IMSRTP脆弱性利用方法展开研究实现

    In this paper, RTP vulnerabilities and its exploitation in IMS will be studied and implemented.

    youdao

  • 软件脆弱性危险程度软件脆弱性利用攻击系统潜在危险的度量

    The criticality of software vulnerability is the measurement of the potential risk of which the software vulnerability may be taken advantage for attacking the system.

    youdao

  • 然后综合分析IMS网络脆弱性利用行为特点当前脆弱性利用工具特点,从功能、可扩展性等方面总结IMS网络脆弱性利用系统必须具备的六大特点。

    This paper first researches the security mechanism and then makes a comprehensive analysis of the IMS vulnerability exploitation and the current fragility of exploitation tools.

    youdao

  • 研究了如何利用神经元网络生成能力获取新的不确定性规则使知识系统具有知识自动获取能力,并使原有规则系统的脆弱性得以改善。

    A method of acquiring new uncertainty rules by the generating ability of the neural network is also discussed. Hence the knowledge system is enabled to acquire knowledge automatically and...

    youdao

  • 研究了如何利用神经元网络生成能力获取新的不确定性规则使知识系统具有知识自动获取能力,并使原有规则系统的脆弱性得以改善。

    A method of acquiring new uncertainty rules by the generating ability of the neural network is also discussed. Hence the knowledge system is enabled to acquire knowledge automatically and...

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定