With the application and spread of the classification protection, Network Security Vulnerability Scanning should consider the efficiency and the function expansion.
随着等级保护的应用和普及,网络安全漏洞扫描需充分考虑执行效率和功能的扩展性问题。
Based on classification of poison gas, definition of leakage parameters and calculation of leakage probability and combined with vulnerability matrix the most possible leakage spots are determined.
通过对有毒物质毒性分级、泄漏危险参数定义以及泄漏概率的计算分析,并配合易损性矩阵,确定了最大可能泄漏点。
The study of attack classification has a significant role to analyze computer system vulnerability and technique used for attack and can help to build effective detection methods.
攻击分类研究对于系统地分析计算机系统脆弱性和攻击利用的技术方法有着重要的意义,这有助于构造高效的入侵检测方法。
The foundation of the study of computer security vulnerability includes the classification of security vulnerability and the design of vulnerability database.
安全漏洞分类和漏洞库设计是计算机安全漏洞研究的基础。
The foundation of the study of computer security vulnerability includes the classification of security vulnerability and the design of vulnerability database.
安全漏洞分类和漏洞库设计是计算机安全漏洞研究的基础。
应用推荐