• SCAP can be used to quickly find known vulnerabilities and to automate activities such as ongoing security monitoring, vulnerability management and security policy compliance evaluation reporting.

    SCAP可以用来快速查找已知漏洞,以及持续的安全监测脆弱性管理安全政策承诺评价报告自动操作。

    youdao

  • In the face of these accident, setting up one intact security evaluation system to guide equipment management of enterprise become an urgent problem to be solved.

    面对这些事故建立套完整安全评估体系用于指导企业设备管理成为迫切需要解决的问题

    youdao

  • Power system state estimation is the core of electric energy management system and the bases of dispatch, control, security evaluation and so on.

    电力系统状态估计电力系统调度控制安全评估等方面基础,也是电能管理系统的核心组成部分。

    youdao

  • Through searching the problem of network security evaluation, this paper presents an algorithm to evaluate network security.

    网络系统安全评估问题进行了研究提出一种评估网络系统安全的新算法

    youdao

  • The main research content of this paper is network information detection technology and network security evaluation method.

    本文主要研究内容网络信息探测技术建立在信息探测基础上的安全评估方法

    youdao

  • Due to the absence of evaluation theory, most of the security evaluation is informal, random, and low efficient in practice.

    由于当前评估理论匮乏,导致实际中相当多的安全评估规范,随意效率

    youdao

  • Recently, there has been an effort to consolidate these best practices as the Common Criteria for IT Security Evaluation (CC).

    最近,业界已经作出了很大的努力,这些最佳实践合并作为IT安全评估通用标准(Common Criteriafor IT Security Evaluation,CC)。

    youdao

  • A novel approach to the security evaluation of information system is presented.

    提出一种新颖安全评估方法

    youdao

  • Energy security; Evaluation system; The international energy game; Safeguard measures.

    能源安全评价体系国际能源博弈保障对策

    youdao

  • Network topology discovery is a technology that research for network structure by collecting network transmission data, which is important in network management and network security evaluation.

    网络拓扑发现通过收集网络传输信息研究网络连通结构一项技术网络管理网络安全评估发面具有重要意义

    youdao

  • Prove what this text design the whole set of way and standard of the enterprise security evaluation of the road conveyance have stronger possibility and maneuverability as a result.

    结果证明本文设计整套道路运输企业安全评价办法标准具有较强可行性可操作性

    youdao

  • Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.

    网络安全评价复杂系统工程现有安全评估工具大都只是用于对网络系统安全漏洞进行扫描检测

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • The evolution history of computer security evaluation criteria and the application of security evaluation criteria to the evaluation of security products are analyzed.

    分析计算机系统安全标准演化过程,以及安全评价标准安全产品评价中的实际应用情况。

    youdao

  • Because of explosive materials is a kind of combustible and detonable product, so it is necessary that security evaluation should be conducted systematically and seriously.

    民爆器材种广泛应用易燃易爆安全性评价系统的、细致的必要的。

    youdao

  • A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    youdao

  • The index of network security evaluation is used to evaluate network security and indicate the security property of telecom network.

    网络安全评估指标网络安全评估工具,是反映电信网安全属性标志。

    youdao

  • The paper based on the research of industrial security theory and industrial security evaluation, argues that the existing industrial security evaluation have some limited.

    本文通过产业安全理论评价研究认为现有的产业安全评价模型具有一定局限性

    youdao

  • This article holds that the oil security evaluation index system is foundation.

    本文认为,构建石油安全评价指标体系评价工作的基础

    youdao

  • At last a security evaluation to this system is given according to the current means to attack the mail system.

    最后根据当前常用的电子邮件攻击手段给出系统安全评估

    youdao

  • It is crucial to investigate the parameter which effect decisively on the result of security evaluation.

    研究评估参数安全评估结果影响具有重要意义

    youdao

  • During the process all the security evaluation information is reserved by fuzzy judgment of center of gravity, and gives prominent to key items by assignment of center of gravity.

    评价过程中通过采用模糊重心评价方法,保留了所有系统安全评价信息通过重心分配突出重要评价项目

    youdao

  • The necessity of evaluation on the environmental security of transgenic rice plants was addressed. The author gives his personal views about the contents for security evaluation.

    阐述了转基因水稻抗病植株环境安全性评价必要性,对环境安全性评价内容提出个人观点

    youdao

  • According to the key techniques above, the paper designs system of network security evaluation based on information detection in chapter 3, and supplies method for the system realization.

    基于前面关键技术,第四详细设计基于信息探测网络安全评估系统的方案给出了具体实现的方法

    youdao

  • As water resource is the indispensable material in life and its security is emergent, the development of water security evaluation and assurance system is desiderated so that we can recognize the.

    由于水资源维持生命必需物质安全保障问题迫在眉睫,因此亟需建立起安全评价体系水安全保障体系,通过系统的方法技术认清水安全形势,探讨保障水安全措施和方法。

    youdao

  • The IAHP can quantify the effect of the evaluation parameters on security evaluation results.

    改进AHP方法可以有效地量化评估参数评估结果影响

    youdao

  • The IAHP can quantify the effect of the evaluation parameters on security evaluation results.

    改进AHP方法可以有效地量化评估参数评估结果影响

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定