• The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.

    针对计算机系统安全故障方法网络信息系统攻击方法应用了这一安全分析建模工作。

    youdao

  • The security analysis of the network file service system is able to validate the security of model.

    通过网络文件服务系统安全性分析验证模型的安全性。

    youdao

  • Through the analysis of an example, demonstrated algorithm model to be capable of comprehensive network security analysis and the potential attackers' behavior characteristic analysis.

    通过实例分析证明了算法模型适合全面分析网络安全性攻击可能采取行为方式

    youdao

  • In the fourth chapter, there are a new model of artificial immune system for network security and some analysis about the model.

    第四提出了人工免疫网络安全模型其进行一定的理论分析

    youdao

  • This dissertation is based on the analysis of common architecture of active network and the security problems of SENCOMM, and discusses its hidden dangers, needs and trusts model.

    本文基于主动网络通用体系SENCOMM安全缺陷分析探讨安全隐患需求信任模型

    youdao

  • The research of security analysis needed a systemic security analysis model that was from the system resource and security factor of computer network.

    安全性分析研究工作需要计算机网络安全相关系统资源安全因素抽取出来建立一种面向安全性分析的安全模型

    youdao

  • An infiltration model-based attack path analysis method was proposed which can simulate network security state changes and give out attack paths that may lead to certain attack goals.

    基于渗透模型的网络攻击路径挖掘方法,通过匹配知识库定义的基本渗透过程,模拟攻击过程中网络安全状态变迁,挖掘可能达到特定攻击目标的攻击路径

    youdao

  • It gives the definition and model, clarifies the classification and implementation method, and explains the effect of correlation in network security information analysis...

    给出关联分析的定义模型,对关联分析的分类实施方法进行了阐述结合相应事例说明了关联分析网络安全信息分析中的作用

    youdao

  • This paper makes the security analysis from the sight of the active network node, put forward a series of security measures and build a new security model of active network node based on them.

    本文主动节点角度进行安全性分析提出一系列安全防范措施此基础设计了一种主动网络节点的安全体系模型

    youdao

  • Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.

    本文通过大量网络弱点分析,结合网络的特性建立安全性分析模型生成网络攻击

    youdao

  • Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.

    本文通过大量网络弱点分析,结合网络的特性建立安全性分析模型生成网络攻击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定