• Focused on the business process security, the related assets which affect the business process security were identified by security tree model.

    业务过程安全为中心和目标通过安全模型,识别影响业务过程安全关联资产

    youdao

  • Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.

    通过分析发现,利用攻击模型信息系统安全进行度量,比较好的选择最后对本模型的特点进行了讨论

    youdao

  • The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.

    针对计算机系统安全故障方法网络信息系统攻击方法应用了这一安全分析建模工作。

    youdao

  • On the other hand, the solution retains the tree structure. At the last, we give a security analysis based on the random oracle security model.

    最后随机预言机模型给出协议安全性分析

    youdao

  • A management model of distributed network security system with tree-like hierarchical structure was introduced.

    提出一种采用树形层次结构分布式网络安全系统管理模型

    youdao

  • A management model of distributed network security system with tree-like hierarchical structure was introduced.

    提出一种采用树形层次结构分布式网络安全系统管理模型

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定