• In our previous column, we discussed software security analysis at a high level, introduced a methodology for assessing software security, and explained the key characteristics of a risk analysis.

    上一专栏中,我们较高层次讨论了软体安全性分析介绍了软体安全性方法并且说明了风险分析关键特性

    youdao

  • The sheer amount of data makes the storage, retrieval, and understanding of this information very difficult without a properly designed security event gathering and analysis architecture.

    如果没有完善设计安全性事件收集分析架构存储检索理解这样巨大信息量非常困难的。

    youdao

  • While not every developer can be a security expert, all developers should know enough to perform some basic network and traffic analysis and to build rudimentary security into their applications.

    并非所有开发人员安全专家,但所有开发人员都应该了解足够多的知识执行某些基本网络流量分析应用程序内构建基本安全性

    youdao

  • Security is a multi-faceted problem that requires close analysis of all the vulnerable factors in a business infrastructure.

    安全一个涉及多方面问题需要业务基础设施所有容易受到危害因素加以分析

    youdao

  • Thus begins a studious and academic analysis of the fun, happy, bouncy, up-beat song "Lookin 'Out My Back Door" as it applies to the topic of Web security.

    因此,我们首先适用Web安全性主题方面入手,对有趣愉快活泼乐观歌曲“小心后门(LookinOut My Back Door)”进行认真的学术分析

    youdao

  • Centralizing the implementation of security policies, log analysis and reporting is a good thing.

    安全策略日志分析报告中心化实现是个不错主义。

    youdao

  • It's certainly better to use TLS than inventing your own solution. Additionally, you'll benefit from a protocol that has withstood careful security analysis.

    使用TLS肯定自己发明解决方案要好另外,使用经得起仔细安全分析的协议从中获益

    youdao

  • Federal employees' job security is so great that workers in many agencies are more likely to die of natural causes than get laid off or fired, a USA TODAY analysis finds.

    今日美国一项调查发现联邦雇员工作保障率如此之高,以至于许多机构员工解雇几率自然死亡的几率还低。

    youdao

  • Risk analysis is a method of identifying risks and assessing potential damages that could occur to justify security controls and safeguards.

    风险分析标识风险评估可能会出现潜在损失的方法,用于安全控制和保障措施提供依据。

    youdao

  • It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.

    的“网络流量分析安全代理使用了移动软件代理,检测计算机网络中的入侵

    youdao

  • The CLASP process also introduces a few new artifacts that logically result from security analysis. These artifacts are fully documented, with supporting examples and templates.

    CLASP过程介绍一些新的活动,这些工件完全文档化的,支持样例模板。

    youdao

  • The latest is voice risk analysis (VRA), which, among others, Harrow Council in London is testing [font=Arial]as a way of identifying fraudulent claims for social-security benefits[font=Arial].

    声音危险性分析VRA最近的技术发明。 和其他此类发明一样,[font=Arial]伦敦Harrow理事会正在测试社会安全有利的测试说谎的方法[font=Arial]。

    youdao

  • In this paper, a deep analysis was made from five angles on the design of China's social security tax system based on the traditional four-principle rule.

    本文分析我国社会保障税制设计应遵循四个原则基础,就该税制要素设计的五个重要方面问题进行了详细研讨。

    youdao

  • Based on analysis of transaction security, a secure transaction model is given. Moreover, a correctness criterion for secure transactions, secure conflict serializability (SCSR) is proposed.

    事务安全性分析基础提出安全事务模型和安全事务正确性标准-安全冲突串行化(SCSR)。

    youdao

  • This paper first introduces principles of synchronous and asynchronous identification based on time and events, and then gives a through analysis of security in dynamic identification techniques.

    简要介绍基于时间、基于事件同步、非同步认证原理分析动态认证技术安全性

    youdao

  • Digital library of the University analysis of the threat to network security, made a series of network security management strategy.

    通过高校数字图书馆网络安全面临威胁进行分析提出了一系列的网络安全管理策略

    youdao

  • Analysis shows that the proposed scheme satisfies all security properties of the strong proxy signature scheme and does not need a secure channel.

    分析表明方案能够满足代理签名方案安全需求,同时需要使用安全信道。

    youdao

  • To eliminate the original signers forgery attacks, a modification of the proxy key generation stage is proposed. Security analysis of the improved scheme is also presented.

    为了抵抗原始签名伪造攻击改进代理签名密钥生成过程,改进方案进行了安全性分析

    youdao

  • A security and reliability analysis model of route project (include railway and highway) in debris flow regions.

    泥石流地区铁路(公路)线路安全性可靠度分析模型

    youdao

  • The stress of the thesis is the research on the structure and the management mode of the ITS VCIP and carrying through a security demand analysis based on the whole VCIP.

    本文重点ITS 虚拟共用信息平台结构管理模式进行研究虚拟平台作为一个密切联系的整体来进行安全需求分析

    youdao

  • According to the analysis of the security demand of multicast communication, a multicast key management scheme based on key matrix is proposed.

    该文分析通信安全需求基础上,提出一种基于密钥矩阵的组播密钥管理方案

    youdao

  • Strand Space Model (SSM) is a practical, intuitive and strict formal method for security protocol analysis.

    空间模型分析安全协议一种实用直观严格形式化方法

    youdao

  • This paper introduces the MD5 algorithm and security analysis. A new keyed hash algorithm based on MD5 is proposed.

    介绍MD 5算法对它的安全性能分析,提出了基于MD5键控散列算法。

    youdao

  • Propose a security vulnerabilities detection model which use static analysis and dynamic verification strategy.

    提出了一个静态分析动态验证安全漏洞检测模型

    youdao

  • Having fully absorbed the former researching results, strand space model become a practical, intuitive and strict method for security protocols analysis.

    空间模型吸收前人研究成果,是分析安全协议一种实用直观严格形式化方法

    youdao

  • In order to deal with the security of SIFANG CITY under vibratile load of busses, this paper does a simulative analysis for it with ANSYS.

    文章针对明孝陵四方在车辆振动荷载安全性问题,应用有限元软件ANSYS进行了数值模拟分析

    youdao

  • It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.

    具有实时数据流量分析日志ip网络数据包能力,能够进行协议分析,是网络安全领域一个新兴热点

    youdao

  • This paper presents a new information security management model based on an analysis of the existing information security management models and information security requirements of the organization.

    分析现有信息安全管理模型基础,根据组织机构信息安全要求提出新的信息安全管理模型

    youdao

  • In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.

    事实证明,空间模型分析安全协议一种实用直观严格形式化方法

    youdao

  • In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.

    事实证明,空间模型分析安全协议一种实用直观严格形式化方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定