• The main research content of this paper is network information detection technology and network security evaluation method.

    本文主要研究内容网络信息探测技术建立在信息探测基础上的安全评估方法

    youdao

  • First, we outlined the basic principle of this method. Then, this paper presented how this method applied to the evaluation of security vulnerability.

    首先介绍方法基本原理然后介绍方法在安全漏洞评估中的具体实现。

    youdao

  • A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    youdao

  • To the question, the paper presents a system evaluation method and software based on the evaluation Criteria for Information Technology Security (Common Criteria).

    针对这个问题,设计实现了基于信息技术安全性评估准则(通用标准)的系统评估方法软件

    youdao

  • The road safety evaluation method based on the road Traffic Driving Simulator has put forward a kind of feasible appraisal method to the security of the highway.

    基于驾驶模拟器道路安全评价道路安全性评价提出切实可行评价方法

    youdao

  • According to the key techniques above, the paper designs system of network security evaluation based on information detection in chapter 3, and supplies method for the system realization.

    基于前面关键技术,第四详细设计基于信息探测网络安全评估系统的方案给出了具体实现的方法

    youdao

  • Then, the same method of analysis will be used to analyze factors endangering China's financial security and then obtain the evaluation of current status of China's financial soundness.

    然后同样分析方法分析目前危及中国金融安全因素,从而得出目前中国金融稳健状况评价

    youdao

  • Through the analysis of Bayesian net's applicability in computer network security evaluation, this paper presents a novel method to evaluate network security.

    通过分析贝叶斯网络计算机网络安全评估中的适用性提出一种新的网络安全评估方法

    youdao

  • This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.

    利用漏洞扫描器入侵检测系统统计结果两方面信息提出了应用模糊信息融合安全漏洞进行定性评估方法

    youdao

  • The article appraises the security of man-machine-environment system under multi-factor impact with multi-level fuzzy general evaluation method.

    文章采用了多级模糊综合评价方法人—机—环境系统多因素影响安全性进行了评价

    youdao

  • Finally, the paper introduced single-stage fuzzy comprehensive evaluation method for the appliance effect of classified countermeasures of mountainous rural highway security engineering.

    最后介绍一级模糊综合评价方法,对山区农村公路安保工程分级对策应用效果进行评价。

    youdao

  • The risk evaluation of information security and system risk synthetical assessment method was also theoretically concluded.

    信息安全风险评估系统风险的整体评价进行了理论归纳。

    youdao

  • The risk evaluation of information security and system risk synthetical assessment method was also theoretically concluded.

    信息安全风险评估系统风险的整体评价进行了理论归纳。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定