• The paper presents a scanner color management model based on BP neural network and the analysis of color rendering principle of scanning objects.

    本文分析扫描呈色原理基础提出基于BP神经网络扫描仪色彩管理模型

    youdao

  • The network vulnerability scanner based on port scanning and plugin is proposed in this article.

    本文提出了基于端口扫描插件网络漏洞扫描器模型

    youdao

  • The dissertation studied the management information modeling method based on CIM, then presented a CIM model of network vulnerability scanner.

    本文基于CIM管理信息建模方法进行了研究提出一个网络漏洞扫描系统的CIM管理信息模型

    youdao

  • Then, the security scan technologies based on host and network were further researched, and the contrast of these two technologies and then introduces the popular scanner were analyzed.

    然后深入研究基于网络安全扫描基于主机的安全扫描两技术分析了两种技术的对比,对两种技术中流行的安全扫描工具进行了研究。

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定