• With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.

    随着等级保护应用普及网络安全漏洞扫描充分考虑执行效率和功能扩展性问题。

    youdao

  • Based on classification of poison gas, definition of leakage parameters and calculation of leakage probability and combined with vulnerability matrix the most possible leakage spots are determined.

    通过有毒物质毒性分级泄漏危险参数定义以及泄漏概率计算分析配合易损性矩阵,确定最大可能泄漏

    youdao

  • The study of attack classification has a significant role to analyze computer system vulnerability and technique used for attack and can help to build effective detection methods.

    攻击分类研究对于系统分析计算机系统脆弱性攻击利用技术方法有着重要的意义,这有助于构造高效入侵检测方法。

    youdao

  • The foundation of the study of computer security vulnerability includes the classification of security vulnerability and the design of vulnerability database.

    安全漏洞分类漏洞设计计算机安全漏洞研究基础

    youdao

  • The foundation of the study of computer security vulnerability includes the classification of security vulnerability and the design of vulnerability database.

    安全漏洞分类漏洞设计计算机安全漏洞研究基础

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定