Mobile
Log In Sign Up
Home > english-chinese > "vulnerability analysis" in Chinese

Chinese translation for "vulnerability analysis"

弱点分析

Related Translations:
vulnerabilities:  不安全因素脆弱点
vulnerability:  脆弱性 易损坏性 易损性局方情况可捕性漏洞弱点,易受伤害易伤性易受责难易损生易损性
shock vulnerability:  不耐震的
nuclear vulnerability:  核易损性
vulnerability factor:  命中公算
ventricular vulnerability:  心室易颤性
jamming vulnerability:  低抗扰性抗扰性不良
vulnerability index:  易损指数
realistic vulnerability:  真实攻击真实损伤
genetic vulnerability:  基因易损性
Example Sentences:
1.As with any vulnerability analysis , we start by identifying the components and their external communication paths
与任何漏洞分析一样,我们从确定组件及其外部通信路径开始。
2.A new network vulnerability analysis model is given by use of layered analysis in this paper
摘要在被动网络节点脆弱性分析方法的基础上提出了一种新的基于主动攻击的网络脆弱性分析模型。
3.This dissertation deals mainly with the ip network security analysis based on network measurement . network intrusion detection system and network vulnerability analysis system are also discussed in detail
本文重点研究基于网络探测的ip网络安全性分析,探讨网络入侵检测系统和网络脆弱性分析系统,保证ip网络安全有效运行。
4.In recent years , more and more attention is paid to the network security . network intrusion detection and network vulnerability analysis are active solution for network security problems , and they are too much important
网络安全问题越来越受到人们的重视,网络入侵检测和网络脆弱性分析是主动的网络安全解决方案,是解决这一问题的重要手段之一。
5.Two kinds of network vulnerability analysis model are given aiming at the limitation of the current network vulnerability analysis technique , and both the two models given by this dissertation separately have improvements and enhancements comparing with the current analysis technique
针对现有网络脆弱性分析技术的局限,给出了两种新的网络脆弱性分析模型,它们均有针对性的改进和优点。
6.4 ) combining the scene simulation technology based pc with the simulation model for seismic damage illustration , the buildings earthquake damage illustration system ( embryo ) is estabished . we adopted a mixed - language programming model using visual basic , visual c + + and vba and provided good files management and powerfully database supporting . with the functions of vulnerability analysis , automatic documents processing and earthquake damage illustration , the software can be used for the seismic damage forecast and earthquake damage illustration for sevarel types of common buildings
4 )利用基于pc的视景仿真技术,结合房屋震害的仿真模型,开发了房屋震害演示系统(雏形) 。该系统采用了visualbasic + vba + visualc + +的混合编程模型,具有完善的文件管理功能和强大的数据库支持。该系统兼具易损性分析、自动文档处理和震害特征演示三项功能,既可以用于常见房屋的单体震害预测,亦可用于常见房屋单体震害特征的直观演示。
7.The following are the main achievements : distributed network measurement and analysis infrastructure ( dnmai ) , the cooperant result of all the researchers of our workgroup , is discussed in detail , and also the important status of the network intrusion detection and network vulnerability analysis in dnmai
研究成果如下:系统地介绍了本项目组全体成员共同创作的一种分布式网络测量与分析基础架构dnmai ( distributednetworkmeasurementandanalysisinfrastructure )及网络入侵检测系统和网络脆弱性分析系统在其中的重要地位和作用。
8.Representation , classification and global reference name standard of the common security knowledge , are summarized . then a new model of system security trend analysis is presented , which combines vulnerability analysis ( using privilege graph analysis method ) and attack knowledge analysis ( using goal tree analysis method )
本论文首次从信息对抗的角度分析了公共知识获取和安全趋势分析的意义,系统总结了公共知识分类、标准与知识描述等方面问题,给出动态防御系统中公共知识获取的方法,提出了权限图与攻击树相结合的目标系统安全趋势分析方法。
9.According to working process of terminal - sensitive projectile using capturing rule of detector , on the basis of vulnerability analysis to self - mechanized gun , a model of injuring target about terminal - sensitive projectile is established in this paper . and on the basis of it , using monte - carlo method , numerical simulating computation is done . according to result analysis , the maximum sensitive factor of terminal - sensitive projectile ' s performance is found , the scientific foundations supplied for determining structural parameter and performance parameter of terminal - sensitive projectile are provided
在此基础上,根据末敏弹工作过程和探测器采用的捕获准则,在对自行火炮进行易损分析基础上,建立了末敏弹毁伤目标模型,并在此基础上,采用了蒙特卡罗法进行大量的数值模拟计算,对结果进行分析,找出了影响末敏弹的最敏感因素,为末敏弹结构参数、性能参数的优化提供了依据。
10.Fifthly , one agent - based network vulnerability analysis system ( briefly named anvas ) is designed , and some key technologies of the anvas are studied and analyzed . the mpi - based algorithm for vulnerability information quick collection and relation model - based method for vulnerability analysis are proposed
设计一个基于主体网络脆弱性分析系统anvas ,并研究分析anv人s中的关键技术,提出了基于mpi的脆弱信息快速采集算法和基于关系模型的脆弱性关联分析方法。
Similar Words:
"vulnari" Chinese translation, "vulnerabilit doemr" Chinese translation, "vulnerabilities" Chinese translation, "vulnerability" Chinese translation, "vulnerability (computing)" Chinese translation, "vulnerability analysis and mapping" Chinese translation, "vulnerability analysis and mapping unit" Chinese translation, "vulnerability assessment" Chinese translation, "vulnerability assessment committee" Chinese translation, "vulnerability assessment tool" Chinese translation