threat assessment 中文意思是什麼

threat assessment 解釋
威脅評判
  • threat : n. 1. 恐嚇,威嚇,威脅。2. 兇兆,(…的)樣子,(…的)危險。vt. ,vi. 〈古、方〉=threaten.
  • assessment : n. 1. (價格的)評定,(稅額的)估定,(損害額的)查定。2. 稅額,攤派額。3. 【商業】應繳股款。4. (功過的)評價。
  1. A method of ahp threat assessment based on madm

    多屬性決策的輻射源威脅等級判定方法
  2. At last, this thesis figures out an event - based method of air threat assessment through the definitions of the events, the modeling accompanied with xml description of the model, the introduction of the functional architecture model of event correlation, the type of event correlation and the expressions of the theory of this technique, the event deleting and contracting on the data facet, the correlation between the events in causality by bayesian network and the probability reasoning, exemplifying and calculating of bayesian network employed in the construction of threat assessment model of air battle

    最後提出了一種基於事件的空戰威脅估計方法。對事件進行了定義、建模並用xml語言進行了數據描述;介紹了事件關聯功能結構模型;介紹了事件關聯類型及知識表達方式,從數據層進行了事件清理和壓縮,使用貝葉斯網路對因果事件進行關聯,建立了空戰威脅估計貝葉斯網模型、進行了貝葉斯概率推理及算例分析。
  3. The multi - levelfuzzysynthetic evaluation for threat assessment in battlefield

    戰場敵情威脅的多級模糊綜合評判
  4. Analyze the definition, function of situation assessment & threat evaluation, based on the attributes of air combat platform. gives out specific analysis on hiberarchy and key factors " expressions of situation view and threat view

    重點研究了態勢評估、威脅估計系統在空戰平臺上運用的特點和功能需求,給出了態勢圖與威脅視圖的層次結構和各要素的表達。
  5. All proposed developments that will affect these habitats should undergo ecological assessment so that the threat to local seagrass communities caused by urban development can be minimized. it was demonstrated that transplantation appeared to be a viable technique for compensating the lost seagrass beds of

    一個有關移植海草的實驗顯示,移植方法可以作為一個可行的技術來補償失去了的矮大葉藻海草床,和被認為是保育本地矮大葉藻的一個方法。
  6. Secondly, multi - target threat assessment and ranking are studied. multiple attribute decision making method is used with linear model and topsis model

    採用多屬性決策威脅指數評估法,分別採用線性模型和topsis模型進行威脅排序計算。
  7. To assess the threat of electronic warfare targets, the content and function of threat assessment of electronic warfare targets are analyzed, and threat assessment methods are researched deeply, which are important to estimate enemy ' s situation and command in electronic warfare

    摘要為了對電子作戰目標進行威脅評估,主要立足於電子戰環境,分析了電子作戰目標威脅評估的內容與作用,並系統深入地研究了當前常用的目標威脅評估方法,對判斷敵情及電子對抗作戰指揮具有一定的指導意義。
  8. Threat assessment using multiple attribute decision making

    應用多屬性決策的威脅評估方法
  9. How does thiaffect your threat assessment for the summit

    那這些對兩國元首會議的威脅評估有多大的影響?
  10. New threat assessment non - parameter model in beyond - visual - range air combat

    一種新的超視距空戰威脅估計非參量法模型
  11. Secondly, this thesis concerns the study of competence - based and situation - based threat assessment of air battle

    其次對基於能力和態勢的空戰威脅估計方法進行了研究。
  12. A threat assessment stated the russian billionaire was most vulnerable after chelsea ' s matches, when his car could get caught in traffic

    一個危險評估表明這個俄羅斯億萬富翁在切爾西比賽后最危險,這時他的車需要通過繁忙的交通。
  13. Under the background of single - ship missiles defense system, the paper studies the threat assessment method based on bayesian network. the theoretic basis of the bn is introduced firstly

    本文以單艦對反艦導彈的防禦為背景,重點研究了基於貝葉斯網路的威脅評估方法。
  14. Using information from a number of major reports, such as the millennium ecosystem assessment, wwf set out to quantify the overall status of threat to major rivers on which people depend for water and livelihoods

    參考數篇重要的論文,像是《千禧年生態系統評估綜合報告》后,該基金會將民生用水主要仰賴的各大河流面臨的威脅進行了量化評估。
  15. The test shows that the method has the positive results on determining the anomaly traffic and on the threats assessment process. this method can distinguish the abnormal traffic, which is harmful for the bandwith, from the netflow sample and gives a reference value of its threat level and never need analyzing the content of the packets

    實驗和分析表明本文提出的威脅評估方法對網路中的異常流量確定和威脅的定量分析是有效的,並不需要對netflow數據數據包內容的進行分析,就可以確定對網路可用性影響較大的異常網路流,並給出其威脅度的量化指標。
  16. In this paper, we study the techniques of situation threat assessment ( sta ) and multi - sensor tracks association, which are two cores in the battlefield surveillance and reconnaissance system

    本文以戰場偵察警戒信息融合系統為研究背景,深入研究了系統中多傳感器航跡融合跟蹤和態勢威脅估計關鍵技術。
  17. On the basis of comparing cc with other risk assessment criteria, we find cc may be tailored according to the concrete system and it fits website risk assessment. thirdly, this thesis analyze the security requirement of website according to web server protection profile based on cc. fourthly, through consulting related risk assessment standard and model and web server protection profile of cc, this thesis brings forward website risk assessment model, confirms the recognition method and assessment method of the property, threat and vulnerability of website information issue system, and establishes relevant evaluation guideline and half - quantitative risk computational method and formulates the risk rank determination criterion

    本文首先介紹了網站安全的定義、目標和國內外風險評估的研究現狀;然後對信息安全風險評估的基本概念和理論進行了闡述,同時簡要介紹了國際風險評估標準的發展現狀,並詳細闡述了通用準則cc ( commoncriteria ) ,在將cc和其他風險評估標準進行比較分析的基礎上,發現cc標準可以根據具體的系統作定製開發,比較適合網站風險評估;接下來,本文結合cc標準下制定的webserverprotectionprofile ,分析了web網站的安全需求;隨后,本文通過借鑒相關的風險評估標準和模型,以及cc的webserverprotectionprofile ,提出網站風險評估模型,確定網站的資產、威脅和脆弱性的識別方法和評價準則,並構造出半定量的風險分析方法,最終制定風險等級判定準則;最後,通過一個實例來驗證本文所提出的基於模型的半定量風險分析方法的實用性。
分享友人