Vulnerability evaluation of various biometric systems should be conducted and its results should be available to potential users.
许多生物辨识系统的安全性弱点评估应该被进行,并且应该让可能的使用者得以公开取得评估的结果。
After analyzing various shortcomings of evaluation methods, the paper proposes a multi-dimensional security vulnerability evaluation model.
在分析其评估方法的不足之处后,提出了一种多维度的安全漏洞风险评估方法。
This paper summarizes the current studies about the security vulnerability evaluation and introduces the Common vulnerability Scoring System (CVSS).
本文概述了目前的安全漏洞评估研究现状,并介绍了通用漏洞评分系统(CVSS)。
Based on the human's axiology, the indexes of the debris flow vulnerability evaluation is improved and the fixed amount of the social vulnerability degree evaluation is put forward.
根据人的价值理论改进了泥石流灾害易损度评价体系,提出了社会易损度的定量化方法。
This paper researches the integrated method of urban debris flow risk assessment. The method involves the debris flow hazard zonation, the urban vulnerability evaluation and the risk assessment.
探讨了城市泥石流风险评价的系统方法,该方法包括泥石流扇形地危险区划、城市易损性分析和城市泥石流风险评价三个主要内容。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
SCAP can be used to quickly find known vulnerabilities and to automate activities such as ongoing security monitoring, vulnerability management and security policy compliance evaluation reporting.
SCAP可以用来快速查找已知的漏洞,以及持续的安全监测、脆弱性管理和安全政策的承诺评价报告等自动操作。
Most of the software companies developing web vulnerability scanners will willingly give you evaluation licenses.
很多软件公司开发出web漏洞扫描器,然后给你试用版的许可证。
Advise clients and senior management on strategic business performance evaluation and on recognizing vulnerability to corporate failure.
在公司的策略性绩效评估或企业管理方面的弱点,给企业客户及其高级管理人员提供有效的建议。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
First, we outlined the basic principle of this method. Then, this paper presented how this method applied to the evaluation of security vulnerability.
首先介绍了此方法的基本原理,然后介绍了该方法在安全漏洞评估中的具体实现。
For this problem, this paper put forward a new method for vulnerability risk evaluation.
针对这个问题,提出了一种新的漏洞风险评估方法。
Based on the fuzzy comprehensive DRASTIC evaluation method, the vulnerability of unconfined water in Songnen Plain is evaluated.
运用基于DRASTIC的模糊综合评价方法,对松嫩平原潜水的脆弱性进行了评价。
Selecting environment vulnerable factors and establishing evaluation index system, the environment vulnerability of study area was evaluated.
通过筛选环境脆弱性因子,建立评价指标体系,进行了研究区环境脆弱性评价。
To estimate disaster vulnerability of small town more objectively, a new evaluation approach was presented by means of combining entropy weight with variable fuzzy sets.
为了客观评估小城镇的灾害易损性,提出一种熵权和可变模糊集组合评估方法。
The paper begins with an analysis in vulnerability risk evaluation, including its theory, attack graph and specialty of vulnerability.
论文从漏洞评估的原理、攻击路径及漏洞本身,提出一种基于攻击路径的漏洞风险评估模型。
Evaluation of ground water vulnerability is an effective way to study and prevent ground water from pollution.
区域地下水防污性能评价是研究和预防地下水污染的一种有效途径。
This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.
利用漏洞扫描器及入侵检测系统的统计结果两方面信息 ,提出了应用模糊信息融合对安全漏洞进行定性评估的方法 。
A fuzzy comprehensive evaluation model based on the DRASTIC system is developed for assessing aquifer vulnerability.
以DRASTIC模型为基础,建立了模糊综合评价模型。
A fuzzy comprehensive evaluation model based on the DRASTIC system is developed for assessing aquifer vulnerability.
以DRASTIC模型为基础,建立了模糊综合评价模型。
应用推荐