人可利用脆弱性对系统进行罪恶的攻击。
A human who exploits a vulnerability perpetrates an attack on the system.
脆弱性基金将利用现有机制快速和灵活地提供资金,同时通过监控和安全措施来保证资金的正确使用,佐利克说。
The Vulnerability Fund would use existing mechanisms to deliver the funds fast and flexibly, backed by monitoring and safeguards so the money is well spent, says Zoellick.
软件脆弱性的本质是利用该脆弱性可以影响系统的安全。
The essence of software vulnerability is to exploit and affect system security.
攻击分类研究对于系统地分析计算机系统脆弱性和攻击利用的技术方法有着重要的意义,这有助于构造高效的入侵检测方法。
The study of attack classification has a significant role to analyze computer system vulnerability and technique used for attack and can help to build effective detection methods.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
地下水资源脆弱性具有时变性,制定地下水合理利用模式时应当结合现状实际地下水资源脆弱性。
The advices to exploit properly groundwater should be based on current groundwater resource vulnerability because of its changes with time.
一次完整的攻击过程通常会包括一系列单独的攻击行为,每个攻击行为是对某个系统漏洞(脆弱性)的一次利用。
A complete attack process usually includes a series of attack actions, and every attack action is a use of system vulnerability.
本文对IMS中RTP脆弱性利用方法展开研究和实现。
In this paper, RTP vulnerabilities and its exploitation in IMS will be studied and implemented.
软件脆弱性的危险程度是对软件脆弱性被利用来攻击系统的潜在危险的度量。
The criticality of software vulnerability is the measurement of the potential risk of which the software vulnerability may be taken advantage for attacking the system.
然后综合分析IMS网络脆弱性利用行为特点和当前脆弱性利用工具的特点,从功能、可扩展性等方面总结IMS网络脆弱性利用系统必须具备的六大特点。
This paper first researches the security mechanism and then makes a comprehensive analysis of the IMS vulnerability exploitation and the current fragility of exploitation tools.
研究了如何利用神经元网络的生成能力来获取新的不确定性规则,使知识系统具有知识自动获取能力,并使原有规则系统的脆弱性得以改善。
A method of acquiring new uncertainty rules by the generating ability of the neural network is also discussed. Hence the knowledge system is enabled to acquire knowledge automatically and...
研究了如何利用神经元网络的生成能力来获取新的不确定性规则,使知识系统具有知识自动获取能力,并使原有规则系统的脆弱性得以改善。
A method of acquiring new uncertainty rules by the generating ability of the neural network is also discussed. Hence the knowledge system is enabled to acquire knowledge automatically and...
应用推荐