• Good security requirements and analysis practices will significantly reduce system security risk.

    良好安全需求分析实践极大地减少系统安全风险

    youdao

  • Power system security and stability analysis is necessary to the security and stability operation of power systems.

    电力系统安全稳定分析保障电网安全稳定运行重要环节。

    youdao

  • As an essential part in the power system security analysis, the whole process of contingency selection becomes more sensible by taking the probability aspect into consideration.

    作为电力系统安全分析中的重要组成部分偶然事故选择由于在分析过程中加入了事故发生率的考虑而变得具有合理性

    youdao

  • In this paper, a deep analysis was made from five angles on the design of China's social security tax system based on the traditional four-principle rule.

    本文分析我国社会保障税制设计应遵循四个原则基础,就该税制要素设计的五个重要方面问题进行了详细研讨。

    youdao

  • The thesis begins with analysis of system structure, then introduces realization of simulating models, naming, location, security operation of dynamic data, and data consistency.

    首先分析体系结构然后介绍系统如何实现仿真模型动态数据统一命名定位安全操作数据一致性

    youdao

  • Covert channel analysis is an inevitable problem of high security computer system research.

    通道分析研究安全性计算机系统不可回避问题

    youdao

  • Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.

    指挥自动化网络安全系统基于信息存储通信信道计算机病毒及电磁辐射安全性分析

    youdao

  • This paper pointed the threat faced by Three-Layer MPLS VPN first, then analysis the security of control layer, data layer and management layer, at last gave some advices to keep the system security.

    本文首先指出MPLSVPN可能受到安全威胁然后分析三层MPLS VPN数据控制管理面上安全性最后提出保持系统安全一些建议

    youdao

  • Recently, the analysis of static security in relation to power system planning and on-line applications has become a subject of increased interest.

    电力系统规划设计在线应用方面静态安全分析成为近年来深感兴趣课题

    youdao

  • On the basic of the above analysis, it also proposes the construction thoughts and security system of the circular economy demonstration area.

    通过对循环经济示范区内涵建设意义的初步分析提出了循环经济示范区建设思路保障体系

    youdao

  • The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.

    针对计算机系统安全故障方法网络信息系统攻击方法应用了这一安全分析建模工作。

    youdao

  • From the perspective of systems engineering, Fault Tree analysis method which is widely used in system security study is used for analysis of urban rail transit accident.

    系统工程学角度出发,将广泛应用于系统安全研究中的事故分析方法应用到城市轨道交通事故分析

    youdao

  • Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.

    通过分析发现,利用攻击模型信息系统安全进行度量,比较好的选择最后对本模型的特点进行了讨论

    youdao

  • Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.

    网络安全漏洞扫描脆弱性分析进行系统安全评估基础信息安全保障体系中的必要组成部分

    youdao

  • Safety analysis showed that technique of mixed crowd of public password system possessed high security. It was popularized easy in network certification.

    安全性分析证明公开口令系统混合算法技术具有强度安全性网络认证产品中推广应用。

    youdao

  • This article on the impact of computer network system security the main factor analysis combined with practical work, and put forward countermeasures and the majority of peers to explore.

    本文影响计算机网络系统安全主要因素结合工作实际进行分析提出相应的对策广大同行共同探讨。

    youdao

  • This thesis regards the basic analysis and the synthetic analysis as the fundamental point to study the rural medical security system.

    本文认为基础分析综合分析恰恰应该研究我国农村医疗保障制度根本性切入点

    youdao

  • Analysis the function, composition and structure of registry, and study it about computer system maintenance, performance and security.

    分析注册作用组成结构注册表计算机系统维护性能安全作了一定的探讨

    youdao

  • The security analysis of the network file service system is able to validate the security of model.

    通过网络文件服务系统安全性分析验证模型的安全性。

    youdao

  • Used the case methodology to carry on the analysis to the information system security requirements.

    采用个案研究法信息系统安全需求进行分析

    youdao

  • Log analysis regard as component part of network security defending system, it plays a very important role in the network security.

    日志分析作为网络安全防御系统组成部分网络安全中重要作用

    youdao

  • In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.

    本文网络安全病毒防护主机系统安全三方面对信息系统的安全进行分析实现技术进行了探讨

    youdao

  • In this paper, the social security system from our current situation, analysis of the social security system problems, improve the social security system of measures.

    本文主要我国社会保障制度现状出发,分析我国社会保障制度存在问题,探讨完善我国社会保障体系措施

    youdao

  • After theoretic analysis and simulation experiments, the system has higher sensitivity to initial conditions, better security and encryption effects, so it is adapt for images encryption.

    理论分析模拟试验可以看出,系统具有较高初值敏感性强的安全性和较好的加密效果,可用于实际的图像加密系统。

    youdao

  • WAN security prewarning system consists of incident produce module, incident analysis module, security prewarning model and incident respond module.

    广域网安全预警系统主要事件采集模块、事件分析模块、安全预警模型事件响应模块组成。

    youdao

  • The importance of designing and realizing a FTP log analysis system is stated clearly in this article from the Angle of network security protection.

    本文网络安全防范角度讲述了设计实现一个FTP日志分析系统重要性

    youdao

  • As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.

    随着信息技术安全问题日益突出网络系统进行安全分析日益重要

    youdao

  • It is applied in relay protection, system metering and analysis of power system. It has a close relation with the security and reliability of power system.

    广泛应用继电保护系统监测、电力系统分析之中,关系电力系统安全性可靠性

    youdao

  • Methods: security telemedicine system model was constructed with theoretic analysis according to each security request of medical information.

    方法针对医疗信息各项安全要求进行理论分析构建安全远程医疗系统模型结果

    youdao

  • So, need a set of feasible network security tactics urgently and carry on network analysis to IP's network of telecommunications of Kweichow, Make out the system of network security and implement.

    因此迫切需要切实可行网络安全策略,对贵州电信IP进行系统分析制定网络安全体系加以实施

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定