• Vulnerability is a serious menace to software security, so vulnerability detection has important meanings for improving software security.

    漏洞软件安全一个严重威胁,如何检测软件中存在的漏洞提高安全性具有重要意义

    youdao

  • The main problem of existing static vulnerability detection methods based source code analysis is their high false positive and false negative rates.

    现有采用基于源代码分析漏洞静态检测方法中存在的主要问题漏报率较高

    youdao

  • By research on the middleware technology and vulnerability detection technology, this paper presents an architecture of security hole detection middleware.

    论文通过漏洞检测技术中间件技术研究,结合两者特点,提出了一个漏洞检测中间件的系统结构

    youdao

  • In this paper, the vulnerability of pattern matching is analyzed, and an effective detection method which is called protocol analysis is proposed.

    本文揭示了模式匹配技术弱点分析一种新的、有效检测方法协议分析技术

    youdao

  • The study of attack classification has a significant role to analyze computer system vulnerability and technique used for attack and can help to build effective detection methods.

    攻击分类研究对于系统分析计算机系统脆弱性攻击利用技术方法有着重要的意义,这有助于构造高效入侵检测方法。

    youdao

  • Research Interest: Information security, Vulnerability analysis and detection, Malware analysis and prevention.

    主要研究方向信息安全软件漏洞分析检测恶意代码分析与防范

    youdao

  • OS scanning is the prelude of hacker's attack by using OS vulnerability. Real-time detection of OS scanning is one main measure against hacker's intrusion using OS vulnerabilities.

    OS扫描黑客进行OS漏洞攻击前奏实时检测OS扫描是防止系统遭受OS漏洞攻击重要手段

    youdao

  • At present, there are two main methods of host security detection. One is detection by using automated vulnerability scanning tools, the other is manual detection.

    目前主机安全检测方式主要利用自动化漏洞扫描工具进行检测和人工检测两种

    youdao

  • In the process of studying intrusion detection technology, the vulnerability taxonomy is an important and necessary process.

    进行入侵检测技术研究安全漏洞分类一个重要必需的过程。

    youdao

  • This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.

    利用漏洞扫描器入侵检测系统统计结果两方面信息提出了应用模糊信息融合安全漏洞进行定性评估方法

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定