Good security requirements and analysis practices will significantly reduce system security risk.
良好的安全需求与分析实践将极大地减少系统安全风险。
Power system security and stability analysis is necessary to the security and stability operation of power systems.
电力系统安全稳定分析是保障电网安全稳定运行的重要环节。
As an essential part in the power system security analysis, the whole process of contingency selection becomes more sensible by taking the probability aspect into consideration.
作为电力系统安全分析中的重要组成部分,偶然事故的选择由于在分析过程中加入了对事故发生率的考虑而变得更具有合理性。
In this paper, a deep analysis was made from five angles on the design of China's social security tax system based on the traditional four-principle rule.
本文在分析我国社会保障税制设计应遵循四个原则的基础上,就该税制要素设计的五个重要方面问题进行了详细研讨。
The thesis begins with analysis of system structure, then introduces realization of simulating models, naming, location, security operation of dynamic data, and data consistency.
首先分析其体系结构,然后介绍系统如何实现仿真模型及动态数据的统一命名、定位、安全操作和数据一致性。
Covert channel analysis is an inevitable problem of high security computer system research.
隐通道分析是研究高安全性计算机系统不可回避的问题。
Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.
指挥自动化网络安全系统,基于信息存储、通信信道、计算机病毒及电磁辐射等安全性分析。
This paper pointed the threat faced by Three-Layer MPLS VPN first, then analysis the security of control layer, data layer and management layer, at last gave some advices to keep the system security.
本文首先指出三层MPLSVPN可能受到的安全威胁,然后分析了三层MPLS VPN在数据面、控制面和管理面上的安全性,最后提出保持系统安全的一些建议。
Recently, the analysis of static security in relation to power system planning and on-line applications has become a subject of increased interest.
在电力系统规划设计和在线应用方面,静态安全分析已成为近年来深感兴趣的课题。
On the basic of the above analysis, it also proposes the construction thoughts and security system of the circular economy demonstration area.
通过对循环经济示范区的内涵和建设意义的初步分析,提出了循环经济示范区的建设思路和保障体系。
The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。
From the perspective of systems engineering, Fault Tree analysis method which is widely used in system security study is used for analysis of urban rail transit accident.
从系统工程学的角度出发,将广泛应用于系统安全研究中的事故树分析方法应用到城市轨道交通事故分析中。
Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.
通过分析发现,利用攻击树模型对信息系统安全进行度量,是比较好的选择。最后对本模型的特点进行了讨论。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
Safety analysis showed that technique of mixed crowd of public password system possessed high security. It was popularized easy in network certification.
安全性分析证明全公开口令系统的混合群算法技术具有高强度安全性,易在网络认证产品中推广应用。
This article on the impact of computer network system security the main factor analysis combined with practical work, and put forward countermeasures and the majority of peers to explore.
本文就对影响计算机网络系统安全的主要因素结合工作实际进行分析,并提出相应的对策,与广大同行共同探讨。
This thesis regards the basic analysis and the synthetic analysis as the fundamental point to study the rural medical security system.
本文认为,基础分析和综合分析恰恰应该是研究我国农村医疗保障制度的根本性切入点。
Analysis the function, composition and structure of registry, and study it about computer system maintenance, performance and security.
分析了注册表的作用、组成与结构,并就注册表对计算机系统的维护、性能和安全作了一定的探讨。
The security analysis of the network file service system is able to validate the security of model.
通过对网络文件服务系统的安全性分析,验证了该模型的安全性。
Used the case methodology to carry on the analysis to the information system security requirements.
采用个案研究法对信息系统安全需求进行分析。
Log analysis regard as component part of network security defending system, it plays a very important role in the network security.
日志分析作为网络安全防御系统的组成部分,在网络安全中起着重要的作用。
In this paper, network security, virus protection, system security tripartite face mainframe information system security analysis, and discussion of the technology for the realization.
本文从网络安全、病毒防护、主机系统安全三方面对信息系统的安全进行分析,并对实现技术进行了探讨。
In this paper, the social security system from our current situation, analysis of the social security system problems, improve the social security system of measures.
本文主要从我国社会保障制度的现状出发,分析我国社会保障制度存在的问题,探讨完善我国社会保障体系的措施。
After theoretic analysis and simulation experiments, the system has higher sensitivity to initial conditions, better security and encryption effects, so it is adapt for images encryption.
理论分析和模拟试验可以看出,本系统具有较高的初值敏感性、较强的安全性和较好的加密效果,可用于实际的图像加密系统。
WAN security prewarning system consists of incident produce module, incident analysis module, security prewarning model and incident respond module.
广域网安全预警系统主要由事件采集模块、事件分析模块、安全预警模型和事件响应模块组成。
The importance of designing and realizing a FTP log analysis system is stated clearly in this article from the Angle of network security protection.
本文从网络安全防范的角度讲述了设计和实现一个FTP日志分析系统的重要性。
As information technology security issues become more prominent, the network system security analysis is becoming increasingly important.
随着信息技术安全问题的日益突出,对网络系统进行安全分析日益重要。
It is applied in relay protection, system metering and analysis of power system. It has a close relation with the security and reliability of power system.
它被广泛应用于继电保护、系统监测、电力系统分析之中,关系到电力系统的安全性与可靠性。
Methods: security telemedicine system model was constructed with theoretic analysis according to each security request of medical information.
方法针对医疗信息的各项安全要求进行理论分析,构建安全远程医疗系统模型结果。
So, need a set of feasible network security tactics urgently and carry on network analysis to IP's network of telecommunications of Kweichow, Make out the system of network security and implement.
因此,迫切需要一套切实可行网络安全策略,对贵州电信IP网进行系统分析,制定出网络安全体系并加以实施。
应用推荐