vulnerability analysis 中文意思是什麼

vulnerability analysis 解釋
弱點分析
  • vulnerability : 脆弱性 易損壞性 易損性
  • analysis : n. (pl. -ses )1. 分解,分析;【數學】解析。2. 梗概,要略。3. 〈美國〉用精神分析法治療(= psychoanalysis)。
  1. The following are the main achievements : distributed network measurement and analysis infrastructure ( dnmai ), the cooperant result of all the researchers of our workgroup, is discussed in detail, and also the important status of the network intrusion detection and network vulnerability analysis in dnmai

    研究成果如下:系統地介紹了本項目組全體成員共同創作的一種分散式網路測量與分析基礎架構dnmai ( distributednetworkmeasurementandanalysisinfrastructure )及網路入侵檢測系統和網路脆弱性分析系統在其中的重要地位和作用。
  2. General speaking, the detection of the vulnerability is a technique filled with inspiration and luck, but thorough analysis shows it is also deducible. if more people understand the hacking technique, it will no longer be magic mastered only by a few experts

    總的來說,漏洞的發現和利用雖然是一項充滿了靈感和機遇的技術,但是仔細分析起來,其中仍然存在明顯的規律,掌握了這些規律,攻擊技術就不單單是少數專家手中的魔術,而可以被更多的人所掌握,為國家所用。
  3. Representation, classification and global reference name standard of the common security knowledge, are summarized. then a new model of system security trend analysis is presented, which combines vulnerability analysis ( using privilege graph analysis method ) and attack knowledge analysis ( using goal tree analysis method )

    本論文首次從信息對抗的角度分析了公共知識獲取和安全趨勢分析的意義,系統總結了公共知識分類、標準與知識描述等方面問題,給出動態防禦系統中公共知識獲取的方法,提出了權限圖與攻擊樹相結合的目標系統安全趨勢分析方法。
  4. Energetic materials for defense - safety, vulnerability - compatibility by thermo - gravimetric analysis

    國防用高能材料.安全性易損性.用熱解重量分析法分析的兼容性
  5. The bank vulnerability has been matter of concern in the works of economic historian and the institutional school. the classical economists such as marx, marshall, keynes mainly describe and analyze bank crisis from the angle of economic cycle, minsky and kindleberger introduces the behavior factor of microscopic main body into the analysis of bank vulnerability. the development of the game theory and the information economics lay a solid foundation for stiglitz and weiss ' s study about bank vulnerability

    銀行脆弱性問題在經濟史家和制度學派的著作中多有論及,馬克思、馬歇爾、凱恩斯等經典經濟學家主要從經濟周期的角度描述銀行危機的現象和原因,分別重視信用規模不穩定和社會流動性偏好的波動對銀行系統的影響,但馬克思將銀行信用危機看作是經濟危機的結果;明斯基、金德爾伯格引入微觀主體的行為因素對銀行的脆弱性進行分析;博弈論和信息經濟學的發展最終為斯蒂格利茨、韋斯等人對銀行體系脆弱性的研究提供了較為系統、堅實的微觀基礎。
  6. Analysis of hydrological vulnerability characteristics and influence factors of zhalong riparian wetlands

    扎龍河濱濕地水系統脆弱性特徵及影響因素分析
  7. 4 ) combining the scene simulation technology based pc with the simulation model for seismic damage illustration, the buildings earthquake damage illustration system ( embryo ) is estabished. we adopted a mixed - language programming model using visual basic, visual c + + and vba and provided good files management and powerfully database supporting. with the functions of vulnerability analysis, automatic documents processing and earthquake damage illustration, the software can be used for the seismic damage forecast and earthquake damage illustration for sevarel types of common buildings

    4 )利用基於pc的視景模擬技術,結合房屋震害的模擬模型,開發了房屋震害演示系統(雛形) 。該系統採用了visualbasic + vba + visualc + +的混合編程模型,具有完善的文件管理功能和強大的數據庫支持。該系統兼具易損性分析、自動文檔處理和震害特徵演示三項功能,既可以用於常見房屋的單體震害預測,亦可用於常見房屋單體震害特徵的直觀演示。
  8. A thorough analysis of the vulnerability of chinese bank system is carried out in terms of the institutional reform advancement, the system of ownership form and the principal - agency relations5, with emphasis on the characteristics of different stages in the institutional reform

    我國商業銀行的產權制度改革必須以終極所有權與法人財產權的徹底分離為前提條件,以股份製作為最終實現形式,將國有商業銀行改造成為自主經營、自負盈虧、自我約束、自擔風險的現代商業銀行。
  9. Vulnerability assessment and forecasting analysis of shallow groundwater in luxi basin, western yunnan province

    潞西盆地淺層地下水脆弱性預測分析
  10. Adopting the method of factor analysis, we conclude our research with the four dimensions for overt narcissism : authority, superiority, entitlement and self - admiration, as well as the three dimensions for covert narcissism : vulnerability, entitlement and self - admiration

    採用因素分析的方法得出大學生顯性自戀人格的4個維度:權欲、優越感、特權感、自我欽羨,大學生隱性自戀人格的3個維度:易感質、特權感、自我欽羨。
  11. The evaluation of the vulnerability of the grid provides the theory base on which some weak points will be focused on in the stability analysis of the grid. and the operator will gain some knowledge in quality of the grid in the whole and it improves the stability analysis work of the grid a further step

    脆弱性評價使電網的穩定分析中著重研究的薄弱點的選擇有了理論依據,並且可以從全局上對電網有定量的認識,使得電網穩定分析的工作得到了進一步的深化。
  12. Under the supporting of the natural science foundation of china, " a study on the earthquake vulnerability and failure dependence of the building structures based on the push - over analysis ( 50178064 ) ", in this paper, it was studied the elastic - plasticity random response and the failure dependence of the rc structures, and some conclusions were obtained : 1

    在國家自然科學基金項目「基於靜力彈塑性分析的建築結構地震易損性及失效相關性研究」 (項目編號: 50178064 )的支持下,本課題利用pushover方法對鋼筋混凝土框架結構進行了彈塑性隨機反應統計分析,研究了框架結構在小震和大震作用下的失效相關性問題,並得出了以下幾點結論: 1
  13. In the face of the increasingly complicated threat of network environment, this paper focuses on the study of theories and key technologies of information security operation about network adversary, operation architecture, attack detection, attack prevention, attack deception and vulnerability analysis. the purpose of the researches is to explore new methods for information security assurance so that we can have the initiative on information security

    而對日益復雜網路環境威脅,本文就網路敵手模型、對抗體系、攻擊檢測、攻擊阻斷、攻擊欺騙以及脆弱性分析等信息安全對抗理論和關鍵技術進行研究。其目的在於探索新型的信息安傘保障方法,以掌握信息安全對抗主動權。
  14. A new network vulnerability analysis model is given by use of layered analysis in this paper

    摘要在被動網路節點脆弱性分析方法的基礎上提出了一種新的基於主動攻擊的網路脆弱性分析模型。
  15. Fifthly, one agent - based network vulnerability analysis system ( briefly named anvas ) is designed, and some key technologies of the anvas are studied and analyzed. the mpi - based algorithm for vulnerability information quick collection and relation model - based method for vulnerability analysis are proposed

    設計一個基於主體網路脆弱性分析系統anvas ,並研究分析anv人s中的關鍵技術,提出了基於mpi的脆弱信息快速採集演算法和基於關系模型的脆弱性關聯分析方法。
  16. As with any vulnerability analysis, we start by identifying the components and their external communication paths

    與任何漏洞分析一樣,我們從確定組件及其外部通信路徑開始。
  17. This dissertation deals mainly with the ip network security analysis based on network measurement. network intrusion detection system and network vulnerability analysis system are also discussed in detail

    本文重點研究基於網路探測的ip網路安全性分析,探討網路入侵檢測系統和網路脆弱性分析系統,保證ip網路安全有效運行。
  18. In recent years, more and more attention is paid to the network security. network intrusion detection and network vulnerability analysis are active solution for network security problems, and they are too much important

    網路安全問題越來越受到人們的重視,網路入侵檢測和網路脆弱性分析是主動的網路安全解決方案,是解決這一問題的重要手段之一。
  19. Two kinds of network vulnerability analysis model are given aiming at the limitation of the current network vulnerability analysis technique, and both the two models given by this dissertation separately have improvements and enhancements comparing with the current analysis technique

    針對現有網路脆弱性分析技術的局限,給出了兩種新的網路脆弱性分析模型,它們均有針對性的改進和優點。
  20. According to working process of terminal - sensitive projectile using capturing rule of detector, on the basis of vulnerability analysis to self - mechanized gun, a model of injuring target about terminal - sensitive projectile is established in this paper. and on the basis of it, using monte - carlo method, numerical simulating computation is done. according to result analysis, the maximum sensitive factor of terminal - sensitive projectile ' s performance is found, the scientific foundations supplied for determining structural parameter and performance parameter of terminal - sensitive projectile are provided

    在此基礎上,根據末敏彈工作過程和探測器採用的捕獲準則,在對自行火炮進行易損分析基礎上,建立了末敏彈毀傷目標模型,並在此基礎上,採用了蒙特卡羅法進行大量的數值模擬計算,對結果進行分析,找出了影響末敏彈的最敏感因素,為末敏彈結構參數、性能參數的優化提供了依據。
分享友人