助手标题
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
共[12]条 当前为第1条到12条
 

相关语句
vulnerability scan
    Design of a system for vulnerability scan and detection
    一个漏洞扫描与检测系统设计
    The Design of an Integrative Scan System Based on Vulnerability Scan
    基于漏洞扫描的综合扫描系统设计
    A Framework of Mobile Agent Based Vulnerability Scan System
    基于移动智能体技术的漏洞扫描系统模型
    Arm at the LAN vulnerability in the periods of transition from IPv4 to IPv6, we rebuild the detect engine and plugms database of NESSUS to improve the IPv6 vulnerability scan ability.
    针对局域网内双栈主机的过渡策略,对漏洞扫描系统的检测引擎和插件库进行改进,使之具备IPv6漏洞扫描的能力。
    Just like the military, you have resources that you are trying to protect. The traditional information security solution such as firewall, Intrusion Detection System, security vulnerability scan, virtual private networking play the important role against hacker, but these solution gradually are laborsome in front of more and more network attack ,especially unknown attack.
    传统的安全防护手段防火墙、入侵检测、安全漏洞扫描、虚拟专用网等在同网络黑客进行斗争的过程中发挥了巨大的作用,但是在层出不穷的网络攻击(尤其是未知攻击)面前这些传统的安全防御手段显得有些力不从心,渐渐处于被动的境地。
    Aiming at this kind of circumstance, the dissertation does the following works through the foundation of TCP/IP protocol analysis: researching the current vulnerability scan techniques, introducing the necessity of safety scan and security scan's step and the classification.
    针对这种情况,本文在对TCP协议介绍在基础上,对目前的漏洞扫描技术进行了研究,介绍了安全扫描的必要性,以及安全扫描的步骤和分类。
    Scan technique include port scan and vulnerability scan which the latter base on the former. The text elaborates their technique and points out the direction of the vulnerability scan technique future development.
    扫描技术包括:端口扫描技术与漏洞扫描技术,漏洞扫描技术是基于端口扫描技术,并分别对它们的技术进行了阐述,指出了漏洞扫描技术未来发展的方向。
    The risk management contains lots of security technology including vulnerability scan, threat recognition, risk assessment and response technology.
    风险管理集中了多种安全技术:漏洞扫描、威胁识别、风险评估以及安全响应技术。
    In the risk management system, the risk assessment is the basic and first indispensable step. The risk assessment deals with the results of vulnerability scan and threat recognition with some special methods.
    在风险管理中,风险评估是最基本的,它根据漏洞扫描及威胁识别的结果采用适当的风险评估方法对被评估系统的安全性做出定量的评判。
    In order to do that, the fundament and features of vulnerability scan technology were researched, the author also analyses the develop trends, and classify the security scanner systems, analyses the commonly system structures.
    为达到这一设计目标,本文首先研究了漏洞扫描技术的原理及特点,分析了扫描技术的发展趋势与安全扫描系统的分类,对主要安全扫描器的一般体系结构进行了分析。
    In this paper, the application of vulnerability scan based on mobile agent technology is exploited.
    本文在讨论基于集散控制模型的漏洞扫描体系结构基础上,探讨移动智能体技术在漏洞扫描体系结构中的运用。
    With the rapid expansion of network, traditional vulnerability scan based on distributed control strategies is no longer adaptive in complex, large - scale networks.
    基于集散控制模型的传统漏洞扫描已不能适应结构日益复杂的网络需要。
 

首页上一页1下一页尾页 

 
CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社