An event set based threat assessment method is proposed.
提出了一种基于入侵事件集的威胁评估方法,它综合考虑了攻击次数、攻击源、攻击初始威胁度、被保护目标的重要级别等因素。
参考来源 - 网络安全中协同攻击的威胁评估方法 in CNetwork security situation value calculation is elabrated in the paper, and also network security threat evaluation and network security situation evaluation. These three concepts are also extended in content and their connection and differentiation are covered as well.
具体来讲文章主要关注于第一层态势要素的获取以及第二层态势理解,集中阐述了网络安全态势值计算,网络安全威胁评估和网络安全态势评估三大概念,较传统定义做了扩展并给出了相互间的联系和区分。
参考来源 - 网络安全态势系统关键技术分析与建模The design of risk assessment tool follows the steps which are defined by Information Security Risk Assessment Standard and modules such as assessment of asset, threat, vulnerability and risk analysis are designed.
风险评估工具的设计完全遵循《信息安全风险评估规范》所规定的流程,设计出了资产评估、威胁评估、脆弱性评估和风险分析等模块。
参考来源 - 基于访问路径的业务系统风险分析工具的设计与实现Secondly, multi-target threat assessment and ranking are studied.
其次研究了多目标空战的威胁评估和排序问题。
参考来源 - 基于数据链的多机多目标智能火控系统研究Based on confirming affecting-proportion by AHP method,Fuzzy Multiple Attributes Decision(FMAD) method is adopted to analyze equipment menace-evaluation in quantity.
采用模糊多属性决策的方法,在AHP方法确定各要素的权重指数基础上,研究定量分析并建立装备战场威胁评估模型。
参考来源 - 基于模糊多属性决策方法的装备战场威胁评估·2,447,543篇论文数据,部分数据来源于NoteExpress
负责撰写威胁评估的委员会已修正了其对俄罗斯的看法。
A committee that writes the threat assessment has rejigged its view on Russia.
工作范围包括IT服务,以提高空间情报的生存能力和威胁评估。
The scope of work covers it services to enhance the survivability of space intelligence and threat assessments.
最初,执行基准风险分析当前威胁评估的基础上开发使用的网络保护战略。
Initially, perform a baseline risk analysis based on a current threat assessment to use for developing a network protection strategy.
应用推荐