相比已有的安全态势评估和预测方法,该模型的结构更加完整,结果更为准确有效。
Compared with the existing security evaluation and forecast methods, the proposed model is more integrated, effective and accurate.
下一代网络安全态势评估系统(NGNSSA)是一个专门针对下一代网络的安全态势评估工具。
The next generation network security situation assessment system (NGNSSA) is a special risk assessment tool for NGN.
在大规模网络安全事件应急响应过程中,一个网络安全态势评估系统可以起到很好的辅助决策作用。
When processing large-scale network security events, a network security situation evaluation system can be useful and help user to deal with these security events.
提出了一种计算网络安全危害指数的方法,并在这种方法基础上设计实现了一个大规模网络安全态势评估系统。
This paper proposes an approach that computes network security disaster index and designs a security situation evaluation system for large scale network.
文章分析和比较了目前的安全态势评估方法,提出了一种基于日志审计与性能修正算法的网络安全态势评估模型。
This paper analyzes and compares the existing situational awareness methods and proposes a network security situational awareness model based on log audit and performance correction algorithm.
本文主要针对当前网络安全态势知识不易获得的问题,提出了自己的网络化系统安全态势评估模型并定义了攻击要素。
Facing the current increasingly serious network scrutiny situation, Model of networked system security situation evaluation and definition of attack factors is presented based on the problems.
应用威力场理论对战斗机安全距离控制、态势评估和战斗机引导控制等进行了分析。
Combat power field theory is applied in analysis of fighter safe distance control, situation evaluation and fighter guidance control.
分析了网络安全态势估计问题的本质特征,构造了网络安全态势推理评估的求解模型。
Analyzing the essential characteristic of the network security situation assessment, and the reasoning model is proposed.
摘要冲击地压态势评估是煤矿安全监测预警领域的热点及难题之一。
Abstract: Rock burst situation assessment is one of the key and difficult issues in the safety monitoring and early warning field of coal mining.
其中层次较高的威胁评估是根据网络安全态势感知结果,推测或判断威胁程度以及可能的行动方案。
The threat assessment, which is the highest order process of data fusion, inference or detect on intrusion threats or malicious activity according to the cyber-space situation assessment.
其中层次较高的威胁评估是根据网络安全态势感知结果,推测或判断威胁程度以及可能的行动方案。
The threat assessment, which is the highest order process of data fusion, inference or detect on intrusion threats or malicious activity according to the cyber-space situation assessment.
应用推荐