查询词典 vulnerability
- 与 vulnerability 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Finally, the article concludes the characteristics and regional differentiation rules of vulnerability in the coastland and analyzes the reasons of this phenomenon, in order to find out the origin of natural disaster vulnerability from the human society and to provide effective basis for insurance and decision-making of governments.
最终,对沿海区域自然灾害脆弱性的特点进行研究,探讨了该区域宏观脆弱性的区域分异规律,并分析了产生这种现象的根本原因,旨在从人类社会本身找出灾难根源,为灾害保险和政府决策提供有效指导。
-
In this context, we studied the class and disserve of web application security vulnerability and compared the static vulnerability test to the dynamic vulnerability test.
本文在这样的背景下研究了Web应用安全漏洞的种类和危害并对静态漏洞检测技术和动态漏洞检测技术进行了比较和评价,指出动态漏洞测试技术是最适合于Web应用的安全漏洞测试的方法。
-
In order to reduce the time of analyzing the scan report of Nessus, we designed an analyzer of vulnerability scanning report, the analyzer includes two parts: one worksheet is used to reveal the classification of vulnerability; the other is used to show the related information of the host, such as IP address, port numbers, detailed vulnerability information, grades of risk and related solving schemes.
NSR格式的漏洞扫描报告进行改进,设计并实现了一个漏洞报告分析器,该漏洞报告分析器包括两部分内容,除了用来简要的显示主机漏洞分类的工作表外,还有一个显示主机的相关信息的工作表,例如主机IP地址,端口号,漏洞详细信息,风险等级以及相关的解决方案等,该应用程序减少了分析漏洞报告数据所需要的时间,减轻了网络维护人员的工作量。
-
Recently, Web vulnerability scanning has an important role in network security. However, the most popular open-source web vulnerability scanners, such as Nikto, Nessus, etc., have been criticized for their high false alarms, inaccurate evaluation and low sanning efficiency.
当前,主要的开源Web漏洞扫描工具如Nikio、Nessus等都存在误报率与漏报率较高、评估不准确、扫描效率较低等问题。
-
Without periodic resource distribution evaluation, the resource supply may not satisfy the demand of emergency. Vulnerability and resource distribution evaluation are also complicated. There are many factors that influence vulnerability and different area has different vulnerability analysis. Besides, as far as the evaluation of resource location and allocation, there are different standards. This dissertation studied three important peoblems.
其中,脆弱性评估和资源布局评估是应急预案评估中的两个重点问题,如果在应急预案制定过程中脆弱性评估不足,则难以找到地区脆弱性所在并加以特殊应对,最终导致因脆弱性较强而损失较大;而在处置过程中出现资源不足或者调度不力等情况则与资源布局关系密切,需要事先确定资源布局并评估其合理性。
-
From a perspective, it's moved from,'Let me find a vulnerability,' to,'Let me find an application vulnerability and automate it and put it into a bot, load up pages and reinfect the client, which I can then use to populate my bot network.'
从一个心理来看,观念从'让我来找个漏洞'变成了'让我来找个能让我安装网络自动代理程序的应用程序漏洞,用自动代理程序使它自动化下载网页、感染用户。
-
They are the cumulate vulnerability that the four resources are degenerating and the concussive vulnerability of red tide or earthquake.
本文对河北省海岸带主要面对的安全问题进行了分析,得出河北省海岸带主要面对四种资源退化的累积式安全问题以及赤潮和地震的冲击式安全问题。
-
Ninthly, by means of MAPGIS, this paper mapped the inherent vulnerability maps, the special vulnerability maps of groundwater and the sequence maps of the influencing factors on groundwater vulnerability in Guanzhong Basin.
结果显示,关中盆地地下水氮污染的特殊脆弱性强和较强脆弱地区分布在泾惠渠灌区、交口灌区和洛惠渠灌区等农业发达区,以及蒲城到大荔地区的黄土台塬洼地。
-
After analyzing the impacting factors of natural vulnerability along the Pearl River mouth, the paper divides the coastline of approximately 412km into 25 15-minute gird cells. For assessment purposes, the six variables including geography, relative sea-level change, average tide range, regional slope, shoreline erosion or accretion rates and tropic cyclone impacting frequency are selected as assessed variables. Once each section of coastline is assigned a risk value for each specific data variable, the costal vulnerability index can be useto calculate the natural vulnerability of the areas along the Pearl River mouth. After that, the paper develops a database for assessment of coastal vulnerability to sea-level rises and protracts a 1:2,000,000 vectors CVI map of the coastlines along the Pearl River mouth.
为了探讨不同海岸带对未来海平面上升的自然脆弱性,本文以珠江口沿岸作为研究个案,在分析珠江口沿岸自然脆弱性的影响因子的基础上,把珠江口沿岸412km岸线划分为25个15′×15′的网格单元,选取了地质、海平面上升率、平均潮差、区域海岸坡度、海岸侵蚀/堆积率、热带气旋影响频率6个评价指标,应用CVI指数评价公式对珠江口地区进行海岸脆弱性评价,并建立海岸脆弱性评价数据库,绘制了珠江口沿岸1:2,000,000的数字化CVI图。
-
In the thesis, research on network vulnerability analysis and IP traceback is discussed.Under the background of "IP network topology and analysis of performance based on network detection" supported by NSFC, Distributed Network Measurement and Analysis Infrastructure, the cooperant result of our workgroup, is discussed, and also the significance of network vulnerability analysis and IP traceback research in DNMAI; Several existing advanced vulnerability analysis methods and models are compared and summarized. Advantages and disadvantages of each technique are discussed in detail.
论文以国家自然科学基金重点项目(基于网络探测的IP网络拓扑发现和性能分析)工作组提出的分布式网络测量和分析基础架构为背景,在网络脆弱性分析和反向追踪方面做了一些研究工作:说明了脆弱性分析和反向追踪研究在DNMAI架构中的意义和作用;对现有网络脆弱性分析领域的几种先进模型和技术进行分析、比较和综述,详细讨论了各种技术的优缺点。
- 相关中文对照歌词
- Vulnerability
- Vulnerability (Skit)
- 推荐网络例句
-
It has been put forward that there exists single Ball point and double Ball points on the symmetrical connecting-rod curves of equilateral mechanisms.
从鲍尔点的形成原理出发,分析对称连杆曲线上鲍尔点的产生条件,提出等边机构的对称连杆曲线上有单鲍尔点和双鲍尔点。
-
The factory affiliated to the Group primarily manufactures multiple-purpose pincers, baking kits, knives, scissors, kitchenware, gardening tools and beauty care kits as well as other hardware tools, the annual production value of which reaches US$ 30 million dollars.
集团所属工厂主要生产多用钳、烤具、刀具、剪刀、厨具、花园工具、美容套等五金产品,年生产总值3000万美元,产品价廉物美、选料上乘、质量保证,深受国内外客户的青睐
-
The eˉtiology of hemospermia is complicate,but almost of hemospermia are benign.
血精的原因很,以良性病变为主。