You can do likewise for the vulnerability and threat identification Web services.
可以对漏洞和威胁标识Web服务进行类似的处理。
According to characteristics of threat identification and Bayesian network, a method of threat identification based on Bayesian network is brought forward.
根据威胁识别与贝叶斯网络的特点,提出了基于贝叶斯网络的威胁识别方法。
Good threat signature identification will be an ongoing problem as new types of threats emerge.
随着新威胁的不断出现,大量威胁签名认证将一直是个问题。
Radar usage identification is the base of the radar type analysis and threat evaluation.
雷达用途识别是分析雷达型号和进行威胁评估的基础。
When threat is not available, the link between social identification and in-group favoritism is weak with the high trust toward in-group.
而当威胁不存在时,社会认同和内群体评估之间的相关程度是微弱的,主要是对内群体的信任度的提高。
When threat is available, the social identification of group is influenced by out-group evaluation and the difference between groups.
在群体独特性受到威胁的条件下,群体的社会认同受到外群体评估和群体间区分度的影响。
Automatic identification of the digital modulation type of a signal has found applications in many areas, including electronic warfare, surveillance and threat analysis.
的数字信号调制类型的自动识别已应用在许多领域,包括电子战,监视和威胁分析。
Automatic identification of the digital modulation type of a signal has found applications in many areas, including electronic warfare, surveillance and threat analysis.
的数字信号调制类型的自动识别已应用在许多领域,包括电子战,监视和威胁分析。
应用推荐