助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   网络漏洞 的翻译结果: 查询用时:0.051秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

网络漏洞     
相关语句
  network vulnerability
     The Research and Design of Network Vulnerability Scanning System
     网络漏洞扫描系统的研究与设计
短句来源
     In the end, this article describes the design and implementation of a network vulnerability scanning system, which names NVS (Network Vulnerability Scanner).
     最后本文设计并实现了一个采用木马体系结构的、面向攻击的网络漏洞扫描系统NVS(Network Vulnerability Scanner)。
短句来源
     Design of network vulnerability scanner based on port scanning and plugin
     基于端口扫描和插件的网络漏洞扫描器的设计
     Design and Implementation of Agent-based Network Vulnerability Scanning System
     基于Agent的网络漏洞扫描系统的设计与实现
短句来源
     Based on the model of PPDR(Policy Protection Detection Response),integrated the technologies of Firewall,IDS(Intrusion Detection System),Network Vulnerability Scanning and Honeynet, a kind of new network security model based on dynamic and active defense is proposed.
     基于PPDR(PolicyProtectionDetectionResponse)模型,综合防火墙、入侵检测、网络漏洞扫描、密罐等技术,笔者提出了一种动态、主动防御的网络安全管理模型.
短句来源
更多       
  network vulnerabilities
     Design and Implementation of Network Vulnerabilities Scanner
     网络漏洞扫描器的设计与实现
短句来源
     Design and Implementation of Network Vulnerabilities Scanning System
     网络漏洞扫描系统的设计及实现
短句来源
     This paper analyzes the importance of network vulnerabilities scanner in the fields of network security. The design idea and the key programming technology based on Windows Socket of a network vulnerabilities scanner are given. Also,a method scanning Intranet from outside through HTTP and Socks5 proxy is proposed.
     分析了网络漏洞扫描器在网络安全领域的重要作用,给出了一种网络漏洞扫描器的设计思想及基于Windows Sockets编程实现的关键技术,同时提出了一种使用HTTP和Socks5代理连接方式实现对内部网络进行漏洞扫描的方法。
短句来源
     This paper analyzes the importance of network vulnerabilities scanner in the field of network security and its principles of implementation. The strong points of free network vulnerabilities scanner Nessus outgoing other products are presented. Also,the design and implementation of Web-based network vulnerabilities scan system based-on Nessus are given.
     分析了网络漏洞扫描器在网络安全领域的重要作用及其工作原理,介绍了漏洞扫描器开源软件Nessus的优点,介绍了一个在Nessus的基础上开发的基于Web的网络漏洞扫描系统的设计与实现。
短句来源
     As a sort of tools for modeling network attacks,attack trees proposed a goal-oriented approach and possessed the characteristics of structurization and reusability. On the basis of redefining the attack node,multi-stage network attacks was combined with complex network environment and provided a context-sensitive attack model that can capture the structure of various network vulnerabilities and multi-stage attacks.
     以传统的攻击树为研究对象,在对攻击节点进行重定义的基础上,将多阶段网络攻击与其所处的复杂网络环境相结合,给出了一种上下文敏感的结构化攻击建模方法,使之能够捕获网络漏洞和多阶段网络攻击的行为特征.
短句来源
  “网络漏洞”译为未确定词的双语例句
     The Leaks on Internet and Skills for Safety
     INTERNET上的网络漏洞及安全维护技巧
短句来源
     Design and Implementation of Vulnerability Detection System
     一种网络漏洞检测系统的设计与实现
短句来源
     The Design of Network Security Scan System
     网络漏洞扫描系统的设计
短句来源
     At present it is an important field of network security to do researches on vulnerability relevance and propagation in the environment of network, this paper carries out research on vulnerability association problem and proposes the concept of "multi-node" vulnerability.
     当前 ,对复杂网络环境下容易产生的安全漏洞关联与传播问题进行分析与推理是网络安全研究的一个重要方面 ,文中对网络漏洞关联问题进行了分析 ,提出了多点漏洞的概念 ,采用图论的方法对多点漏洞问题进行了数学模型描述 ;
短句来源
     Principle analysis and system design of network scanning system
     网络漏洞扫描器的原理分析与系统实现
短句来源
更多       
查询“网络漏洞”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  network vulnerability
Models and methods for solving the problem of network vulnerability
      
Effective measurement of network vulnerability under random and intentional attacks
      
We introduce an accurate and computable definition of network vulnerability which is directly connected with its topology and we analyze its basic properties.
      
Network vulnerability analysis tools today do not provide a complete security awareness solution.
      
Vulnerability of a link is the percentage of links that are vulnerable to the arbitrary second link failure after the link failed and network vulnerability is defined as the average vulnerability of links in the network.
      
更多          
  network vulnerabilities
Most of the work on network interdiction is focused on preventing jamming and analyzing network vulnerabilities.
      
Finally, we demonstrate how disease can be introduced and the resulting network vulnerabilities analyzed.
      
However, because it lacks knowledge of the network vulnerabilities, it is unable to narrow down hypothesized attacks to ones that are truly relevant.
      
Hackers, phishers, and other cyber criminals are increasingly using multipronged exploits to detect and prey on network vulnerabilities.
      
It can therefore give irrelevant results when hypothesizing missing events, because events are not grounded in real network vulnerabilities.
      
更多          
  net hole
We report μSR measurements on a series of compounds with composition La2-xSrxNiO4+\delta where the net hole concentration x+2\delta is greater than 0.4.
      
A universal relation seems to exist between the net hole density as a result of Ca substitution andTc.
      
At [Mg] >amp;gt;1018 cms-3, the net hole concentration, measured by means of electrochemical C-V pro-filing, decreases with increasing [Mg], indicating significant self compensation.
      
The as-grown epilayers, at 1 atm and substrate temperatures of 570-720°, are allp-type with the net hole concentration dependent on the carrier gas.
      
Results from low temperature photoluminescence (LTPL) spectroscopy indicate that the hydrogen content increased as the capacitance-voltage (C-V) measured net hole concentration increased.
      
更多          


This paper analyzes the importance of network vulnerabilities scanner in the fields of network security. The design idea and the key programming technology based on Windows Socket of a network vulnerabilities scanner are given.Also,a method scanning Intranet from outside through HTTP and Socks5 proxy is proposed.

分析了网络漏洞扫描器在网络安全领域的重要作用,给出了一种网络漏洞扫描器的设计思想及基于Windows Sockets编程实现的关键技术,同时提出了一种使用HTTP和Socks5代理连接方式实现对内部网络进行漏洞扫描的方法。

The targets of vulnerability finding tool is to find security vulnerabilities in hosts or networks, test their defense ability and give some possible remedy methods. Vulnerability finding technique includes those based on host and those based on network. In this paper, we first analyzed techniques for vulnerability finding, including theories as well as methods, and then illustrated in detail the network based vulnerability scanning system developed by us.

漏洞探测工具的目的是探测特定主机或网络中存在的安全漏洞,以测试系统的防御能力,给出可能的修补方法。漏洞探测包括面向主机的漏洞探测和面向网络的漏洞探测。首先从分析漏洞探测技术入手,重点分析了基于网络漏洞探测的原理和技术,在此基础上,介绍了一个基于网络安全的漏洞探测系统。

At present it is an important field of network security to do researches on vulnerability relevance and propagation in the environment of network, this paper carries out research on vulnerability association problem and proposes the concept of "multi-node" vulnerability. The paper applies graph theory method to the representation of the "multi-node" vulnerability and represents information of network vulnerability as case base. The paper applies case-based reasoning to analyze and check the propagation path...

At present it is an important field of network security to do researches on vulnerability relevance and propagation in the environment of network, this paper carries out research on vulnerability association problem and proposes the concept of "multi-node" vulnerability. The paper applies graph theory method to the representation of the "multi-node" vulnerability and represents information of network vulnerability as case base. The paper applies case-based reasoning to analyze and check the propagation path of the "multi-node" vulnerability in the network and carries out risk analysis in the process of analysis and checking.

当前 ,对复杂网络环境下容易产生的安全漏洞关联与传播问题进行分析与推理是网络安全研究的一个重要方面 ,文中对网络漏洞关联问题进行了分析 ,提出了多点漏洞的概念 ,采用图论的方法对多点漏洞问题进行了数学模型描述 ;通过对网络安全攻击案例进行建模分析 ,然后将网络漏洞信息组织成案例的知识表示形式 ,采用案例推理方法对多点之间的漏洞传播进行分析检测 ,并对漏洞检测中的风险进行了分析 .

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关网络漏洞的内容
在知识搜索中查有关网络漏洞的内容
在数字搜索中查有关网络漏洞的内容
在概念知识元中查有关网络漏洞的内容
在学术趋势中查有关网络漏洞的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社