threat model 中文意思是什麼

threat model 解釋
風險模式
  • threat : n. 1. 恐嚇,威嚇,威脅。2. 兇兆,(…的)樣子,(…的)危險。vt. ,vi. 〈古、方〉=threaten.
  • model : n 1 模型,雛型;原型;設計圖;模範;(畫家、雕刻家的)模特兒;樣板。2 典型,模範。3 (女服裝店僱...
  1. Rupert murdoch has added to the gloom surrounding the us newspaper industry , saying that the business model of most titles is under threat as classified advertising moves online and circulations fall further

    默多克先生一度把報紙分類廣告營收形容為「黃金之河」 ,但他說: 「有時河流也會乾涸。 」
  2. Aiming at the self - estimation of threat to the sam system, and basing on the analysis of support distance of the target acquisition radar and operation efficiency of the system in three intercept sections, a distance - threat index and a type - threat index of the target are proposed, and a threat - estimation decision - making model is established, and a standard of fire - striking order in each section is put forward

    摘要針對地空導彈系統的威脅自動判斷問題,基於對目標指示雷達保障距離以及三種攔截區間中系統作戰效能的分析,提出了目標距離威脅指數和目標類型威脅指數的概念,進而建立了一種連續型的威脅判斷決策模型,並給出了每個區間火力打擊的排序標準。
  3. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電子郵件服務系統中存在的安全隱患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦公模式、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、密碼管理的應用需求等進行了詳細的分析和設計。
  4. At last, this thesis figures out an event - based method of air threat assessment through the definitions of the events, the modeling accompanied with xml description of the model, the introduction of the functional architecture model of event correlation, the type of event correlation and the expressions of the theory of this technique, the event deleting and contracting on the data facet, the correlation between the events in causality by bayesian network and the probability reasoning, exemplifying and calculating of bayesian network employed in the construction of threat assessment model of air battle

    最後提出了一種基於事件的空戰威脅估計方法。對事件進行了定義、建模並用xml語言進行了數據描述;介紹了事件關聯功能結構模型;介紹了事件關聯類型及知識表達方式,從數據層進行了事件清理和壓縮,使用貝葉斯網路對因果事件進行關聯,建立了空戰威脅估計貝葉斯網模型、進行了貝葉斯概率推理及算例分析。
  5. A threat evaluation model for aerial defense based on grey related theory

    基於灰色關聯理論的要地防空威脅評估模型
  6. Meanwhile, the radar ’ s threat mechanisms and damage mode are analyzed, and a common electrocircuit model is proposed to simplify the network while modeling the bayesian network

    在貝葉斯網路的建模過程中,文章分析了針對雷達設備電路系統常見的威脅機理和損傷模式,提出了其電路模塊的通用簡化模型。
  7. In this dissertation, the author has covered such key points as follows : 1. modeling of fire distribution for all kinds of air defense weapons against low altitude targets ( including various anti - aircraft missiles against low altitude targets ) and taking into account the fire distribution against the cruise missile as a special air strike weapon for the first time ; 2. an overall analysis of the factors that have effect on threat degree and advantage degree as well as the fuzzy distribution of individual factors ; establishment of models for threat degree evaluation and advantage degree evaluation in fuzzy method in conjunction with fire distribution model in sort method, resulting in the materialization of a new fire distribution model, i. e., fuzzy sort model ; 3. modification of the definition of distribution line of target and realization of optimized fire distribution against the initial targets and the targets that await fire shift

    論文的主要內容包括: 1 )建立了各種陸軍低空防空武器(包括各種低空防空導彈)的火力分配模型;首次將巡航導彈作為一種特殊的空襲兵器,優先考慮了對它的分配。 2 )分析了威脅度和有利度的影響因素及各單因素的模糊分佈,建立了一種新的火力分配模型? ? 「模糊排序模型」 。 3 )修改了目標分配線的定義,實現了對射擊目標和轉火目標的優化分配。
  8. Secondly, this article analyses outer environmental conditions faced by the grid company such as economic environment, electricity consumers, enterprise owned power plants and grids, power suppliers market, and electricity regulating, and also analyses the opportunity and threat by utilizing strategy management evaluating model of environmental elements

    其次,對黑龍江省電網公司面臨的經濟環境、電力用戶、企業自備電廠及企業供電電網、發電企業及發電市場和電力監管等外部環境進行了分析,利用企業戰略環境要素評價模型分析了供電行業的機會與威脅。
  9. A shipboard model of threat judgement oriented to defence

    基於最大隸屬度的目標威脅評估與排序法
  10. Secondly, multi - target threat assessment and ranking are studied. multiple attribute decision making method is used with linear model and topsis model

    採用多屬性決策威脅指數評估法,分別採用線性模型和topsis模型進行威脅排序計算。
  11. In this paper, a evaluation model of stealth can threat the anti - stealth threat is discussed

    因此,研究防空雷達在隱身技術條件下的威脅評估是現代雷達技術發展的主要內容。
  12. To count this situation, the thesis has studied the electric power equipment industry and the sichuan the electric power equipment industry ' s present situation and devolpment according to analysis, and also to counter the power equipment, detaily analysed and proved the condition and enviroment of national economic states. market demond compition situation, power system orginazation reform and analysed industrual instruction with boter model, then analysed internal condition and capcity of management and administition, design and market of dujiang electric power equipment work. using the " prime factor evaluating model " analyses internal conditions, nagement level and ability of marketing etc, later get the opportunity, threat, ausing the " prime factor evaluaing model " analyses the internal conditions, mad - vantage and inferiority through the swot research. finally, the thesis layout the straetgy system according to the threat, advantage of dujing electric power euipment work and opportunity of developing qiukly of the electric power equipment, and expaiate strategic aim

    本文針對這一情況,通過對電力製造業的分析,對電力製造業特別是四川電力製造業的現狀與發展作了研究,同時,針對電力設備,通過分析國家產業政策,行業經濟狀態,市場需求競爭態勢,電力體制改革等情況並進行了詳細的論證,運用波特模型分析了行業的結構,然後就都江電力設備廠內部的情況與經營能力、設計能力、市場營銷能力等內部條件進行了分析,採用了「關鍵要素矩陣評價價值法」量化了關鍵要素,最後用swot分析方法重點對競爭優勢等各方面進行了分析和論證,確定了潛在的機會與威脅,優勢與劣勢。
  13. Threat - estimation for decision - making model of nearby radar information of the sam system

    地空導彈系統近方雷達情報威脅判斷分析
  14. Swot ( strenth, weakness, opportunity and threat ) metrix strategic analysis model is used and expanded in the analysis of agile enterprise strategy

    擴展了面向網路化製造的敏捷企業swot戰略分析方法,基於典型企業的分析提出了敏捷企業戰略實施原則。
  15. This model can be used in self - estimation of threat of the target acquisition radar, self - selection of decision - making of the system operation plan and self - optimization of decision - making of the operation plan

    該模型可用於目標指示雷達威脅自動判斷、系統作戰預案自動選擇決策和作戰方案自動優化決策。
  16. Chongqing iron & steel designing institute ( cisdi ) is translating traditional institution into enterprise in accordance with centralized arrangement, and what are our countermoves facing the threat and challenge after china becoming a member of wto especially ? our enterprise should transfer traditional financial management model ( fmm ) into a new model which is suitable for modernized enterprise system

    重慶鋼鐵設計研究院(以下簡稱本院)正在按照國家對事業單位改企轉制的統一部署,由企業化管理的事業單位轉變為科技型企業,進行股份制改造;在我國加入wto后,國內國際市場的競爭更加激烈。
  17. It discusses data storage format and the conception of threat model, which can add the threat to digital map that can transform the threat avoidance to terrain avoidance

    討論了數字地圖數據的存儲格式。提出了威脅模型的概念,並且把威脅疊加到數字地圖中,把威脅迴避轉化為地形迴避來處理。
  18. The stride threat model

    Stride威脅模型
  19. Prepare in advance for the security review, and begin by carefully creating a threat model

    應事先為安全檢查做好準備,然後以認真創建一個威脅模型作為起始工作。
  20. It is discussed that exploiting scanning and utilization at last. meanwhile the conception and main principle of safe programming and safe threat model is presented, which is very meaningful in improving the quality of software development

    同時為了實現在源代碼級消除安全漏洞的目的,本文探討了利用安全威脅模型進行安全編程的方法,並提出了安全編程整體模型的框架和原則,對安全編程方法作了比較詳盡的討論,為今後進一步的研究打下了基礎。
分享友人