• Digital library of the University analysis of the threat to network security, made a series of network security management strategy.

    通过高校数字图书馆网络安全面临威胁进行分析提出了一系列的网络安全管理策略

    youdao

  • This paper pointed the threat faced by Three-Layer MPLS VPN first, then analysis the security of control layer, data layer and management layer, at last gave some advices to keep the system security.

    本文首先指出MPLSVPN可能受到安全威胁然后分析三层MPLS VPN数据控制管理面上安全性最后提出保持系统安全一些建议

    youdao

  • The threat-assessment pattern analyzed the threat level to network security through multi-sensor fusion technology with the result of early warning analysis.

    威胁评估模块将预警分析结果(攻击预测)作为输入,利用多属性融合技术定量分析网络安全威胁程度

    youdao

  • It manages national cyber security incidents, carries out real-time threat analysis and provides advice.

    而其职责就是处理国家网络安全事件进行实时分析提供建议

    youdao

  • Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.

    差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,目前的信息安全系统构成严峻挑战。

    youdao

  • Test result of demo system proves that applying event correlation method on the threat analysis decreases the false positive and redundant alarm from network security devices.

    产生上述问题原因在于当前大部分网络安全设备仅仅只关注系统检测到的?。

    youdao

  • Test result of demo system proves that applying event correlation method on the threat analysis decreases the false positive and redundant alarm from network security devices.

    产生上述问题原因在于当前大部分网络安全设备仅仅只关注系统检测到的?。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定