The software includes three subsystems: database system, aircraft target vulnerability model system and graphics visualization module.
该软件包括数据库系统、易损性评估系统和可视化模块三大子系统。
After the analysis and comparison of the existing vulnerability analysis methods, a new vulnerability model of distributed systems based on reliability theory is proposed.
对现有的脆弱性分析方法进行分析和比较,提出基于可靠性理论的分布式系统脆弱性模型。
The fragmentation artillery warhead is utilized in the paper. The target damage tree is used to build vulnerability model by means of analyzing the vulnerability of vehicle of launching missile.
本文采用战斗部为破片式战斗部,通过对导弹发射车的易损性分析,目标毁伤树来建立目标易损性计算模型。
A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.
应在公司用于检测漏洞和保护s OA基础结构的业务策略中包含用于目标和攻击者之间的多个SOA的深度防御模型。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
Based on the structure preserving model, according to the variation of transient energy in power network, line vulnerability index and outset vulnerability index are defined.
在结构保持模型的基础上,根据网络中暂态能量的变化规律,定义了支路及割集的脆弱性指标。
A visual model is set up by using GIS technology combined with the method of working out the earthquake vulnerability index curve.
本文将求解建筑物地震易损性指数曲线的分析方法及程序与GIS技术相结合,建立了可视化模型。
The proposed fuzzy pattern recognition model under fuzzy environment is applied to theevaluation of groundwater vulnerability.
把模糊环境下的模糊识别理论具体应用到地下水脆弱性评价中。
Secondly, the dissertation analyzed and induced network vulnerability scanners' functions, and presented a CIM model of the scanner.
在分析和归纳网络漏洞扫描系统功能的基础上,构建了其对应的CIM通用模型。
The dissertation studied the management information modeling method based on CIM, then presented a CIM model of network vulnerability scanner.
本文对基于CIM的管理信息建模方法进行了研究,提出了一个网络漏洞扫描系统的CIM管理信息模型。
Based on the DRASTIC model, the fuzzy analysis theory and method which are suitable for evaluating aquifer vulnerability are established and have been used in Cangzhou City.
以DRAST IC模型为基础,建立了评价含水层污染性难易程度的模糊分析理论与方法,并将其应用于沧州市区地下水系统脆弱性评价。
A perfect security vulnerability collection model based on the notion of vulnerability auto-collection is proposed.
提出了一种完善的安全漏洞收集模型。
According to the specific conditions of semi-confined aquifer in the urban area of Changchun City, the catastrophe model was selected for vulnerability assessment.
根据长春城区半承压含水层的具体状况,用突变理论进行脆弱性评价。
The model displayed a hierarchical structure for system risk, in which the possibility and consequences of threat were evaluated by three risk factors - asset, vulnerability and control measure.
此模型应用资产、弱点和控制措施对威胁发生可能性和后果进行评估,并呈现系统风险的层次结构。
Influence of geometrical parameters of slope, space location and disaster-resisting performance of hazard bearing body on vulnerability are analyzed based on the model.
并采用该模型分析了坡体几何特征参数、受灾体空间位置以及受灾体抗灾性能对易损性的影响规律。
The experiment proves the correctness and performance of vulnerability relation model, and the threat analysis method based on the model is more reasonable and effective.
实验证明了脆弱性关联模型的正确性及其优越的描述性能,基于该模型的威胁分析方法也更为合理、有效。
But the existing risk analysis model based on term rewriting ignores the induction procedure from risk to decision, and makes it easy to propagate the potential vulnerability.
但是现存项重写的模型忽略了分析和决策之间的推理过程,容易导致潜在威胁的传播。
Network vulnerability index calculation, pays attention to the method and the model of network vulnerability index calculation.
网络脆弱性指数计算,主要研究网络脆弱性指数计算方法和脆弱性指数计算模型。
After analyzing various shortcomings of evaluation methods, the paper proposes a multi-dimensional security vulnerability evaluation model.
在分析其评估方法的不足之处后,提出了一种多维度的安全漏洞风险评估方法。
The selection of model parameters was discussed in detail, and then the model was used to evaluate vulnerability of aircraft guarantee system.
最后根据该模型对航空保障系统易损性进行了评估,并对模型参数选择进行了分析。
According to the characteristics of vulnerability assessment of aircraft guarantee system on board, a vulnerability assessment model is presented.
针对舰船航空保障系统易损性评估特性,提出一种易损性评估模型。
This paper makes an E-R model for the comprehensive vulnerability analysis model, and establishes IMS vulnerability knowledge base.
并对脆弱性综合分析模型进行了E-R建模,建立了脆弱性知识库。
There are three theoretical models on the prevention of eating disorders:non-specific vulnerability-stressor model, social cognitive model, and critical social perspectives model.
目前关于进食障碍预防理论模型主要有三种:非特异性易感压力模型、社会认知模型和批判性社会观点模型。
And point out the problems existed in the traditional collaborative filtering methods: ratings matrix sparsity, cold start, vulnerability, single interest model and scalability issues.
指出了传统协同过滤方法存在着评分矩阵稀疏、冷启动、易受攻击性、兴趣模型单一和可扩展性等问题。
A fuzzy comprehensive evaluation model based on the DRASTIC system is developed for assessing aquifer vulnerability.
以DRASTIC模型为基础,建立了模糊综合评价模型。
The model includes three modules, which are hazard assessment based on net cell, vulnerability assessment bas…
同时以广州市崩塌灾害为例,采用该模型进行评估并取得了良好的效果。
The model includes three modules, which are hazard assessment based on net cell, vulnerability assessment bas…
同时以广州市崩塌灾害为例,采用该模型进行评估并取得了良好的效果。
应用推荐