助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   漏洞库 的翻译结果: 查询用时:0.032秒
图标索引 在分类学科中查询
所有学科
互联网技术
计算机软件及计算机应用
电信技术
更多类别查询

图标索引 历史查询
 

漏洞库
相关语句
  vulnerability database
     This article generalizes CVE vulnerability database and technology analysis, introduces machine tools of ASP,analyses dadabase accessing technology based on B/S mode three - hierarchy structure, and remlizes a CVE netware database system with ASP/ADO technology based on B/S mode of WEB Server.
     概述了CVE漏洞库及其技术分析,介绍了ASP的工作机制,分析了基于B/S模式三层结构的数据库访问技术,并用ASP/ADO技术实现了具体的、基于WEB服务器B/S模式的CVE网络数据库系统.
短句来源
     Application and Research on CVE Vulnerability Database
     CVE漏洞库体系的研究与实现
短句来源
     The foundation of the study of computer security vulnerability includes the classification of security vulnerability and the design of vulnerability database.
     安全漏洞分类和漏洞库设计是计算机安全漏洞研究的基础。
短句来源
     The Design, Implementation and Application of a Computer Vulnerability Database System
     计算机漏洞库系统的设计、实现与应用
短句来源
     This pape r puts the stress on how the scanning system was designed and implemented, inclu ding the design of the system structure, the design and development of internal and external scanning module, and the design of the vulnerability database and r ules database.
     本文的重心在主机漏洞扫描系统的设计和实现上,包括系统结构的设计和实现,外部扫描模块和内部扫描模块的设计实现,以及漏洞库和规则库的的设计。
短句来源
更多       
  vulnerabilities database
     After analyzing the research situation and the shortcoming of vulnerabilities database system, the distributed computing technology, database technology and Web technology are used to implement NSVADS.
     在分析国内外研究现状的基础上,针对现有的漏洞库系统在漏洞信息的组织、使用等方面存在的不足,采用分布计算技术、数据库技术、Web技术实现了网络安全脆弱性分析与处置系统。
短句来源
     However for these scan systems, on the one hand ,they are based on the rule of vulnerabilities database mostly, existing to fail to report, misinformation phenomenon;
     但是,对于这些扫描系统,一方面它们大都是基于规则的漏洞库匹配技术,存在着漏报、误报现象;
短句来源
     A model is proposed for the network Vulnerabilities Scanner system based on″Common Vulnerabilities and Exposures″and Vulnerabilities Database in this paper. With this model,the components and implementation of a network scanner system,iTOP,are described.
     提出了一个基于CVE标准和漏洞库的网络隐患扫描系统模型,描述了一个基于该模型的“安拓”网络隐患扫描系统的组成结构和实现机制。
短句来源
     Some key technical problems and their solutions,which include the design and implementation of Vulnerabilities Database,the technique of hardware -based design,the upgrade and maintenance mechanism of vulnerabilities scanner segment ,and the mechanism of system security,are also discussed.
     讨论了该系统实现中的关键技术及其解决方法,包括:漏洞库的设计实现、隐患扫描手段的升级维护机制、系统硬件化技术及自身的安全机制等。
短句来源
  “漏洞库”译为未确定词的双语例句
     Secondly,the unconsistent of holes storeroom standard makes the unconsistent of the scanned results that makes users unconvenience.
     第二,目前漏洞扫描安全漏洞库的标准不一致,造成两种漏洞扫描工具测出来的安全漏洞不一致,给用户带来不方便;
短句来源
     And the CVE knowledge base of the system traces international newly development trends of CVE, establishing internal unified CVE standards, whose abundant knowledge base settle ununified problem of internal flaw base, and has great practical value.
     同时,本系统所基于的CVE知识库,跟踪国际上CVE的最新发展动态,制订了国内统一的CVE标准,具有极大丰富的知识库,有效的解决了国内漏洞库不统一的问题,有很大的实用价值。
短句来源
     This paper have abundant content,abroad subject matter ,chat and character combine,content include exordium SQL server database and ASP brief introduction implement how build CVE leak database.
     本文主要论述了该网站的基本功能和如何运作的方法,以及所运用到的一些工具,工作环境,和在设计过程中所遇到的要点、难点等。 其内容包括有绪论、SQL Server数据库简介、ASP简介、创建CVE漏洞库的具体实现、网页与数据库的具体结合及总结等几个部分。
短句来源
     Accordingly, in the present work, a security detection and evaluation system under emulational environment is designed where all kinds of scanning tools and attacking tools in network are gathered and integrated as the plug-in unit .
     本系统把网络上搜集到的各种网络扫描工具及各种攻击工具收集实现了扫描工具库和攻击工具库并作为本系统的插件的方式集成在一起,系统还可以在使用的提供实时帮助(工具的说明、使用方法等),全面的对目标系统的安全性进行彻底的检测,并通过查询本系统的漏洞库数据找到最好的解决方案,从而达到保证目标系统的安全的目的。
短句来源
     at present it is becoming more important to analyze network security state quantitatively and alarm in advance, the paper analyzes a lot of vulnerabilities' characteristics and proposes a analytic hierarchy process model and a series of indexes, it applies a graph theory method to analyze the association problem among vulnerabilities and construct intrusion relation graph model, the paper also proposes several computing methods of network security state, at the end of the paper analyzes the implementation prototype of the whole network security analysis and evaluation system.
     当前 ,对网络的安全状况进行定量分析和预警日益显得重要 ,文中通过对漏洞库中的大量漏洞信息进行分析 ,提出对网络安全脆弱性的威胁程度进行定量分析的层次分析模型和指标体系 ,采用图论的方法对各种安全脆弱性信息进行关联分析 ,并在此基础上构造入侵关系图模型 ,给出基于入侵关系图的网络安全威胁分析方法 ,最后对整个网络安全分析评估系统的实现原型进行了分析
短句来源
更多       
查询“漏洞库”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  vulnerability database
CERIAS is making available to the security community a vulnerability database that describes vulnerabilities at a great level of detail.
      
Currently, we are in the process of building a vulnerability database to suit the testing methodology we have employed.
      
Establishment of a mechanism to generate and perform tests from the vulnerability database.
      
From the Bugtraq vulnerability database we are able to find that only certain version of Windows such as Windows NT and Windows 2000 are vulnerable.
      
ITS4 reads a vulnerability database from a text file at startup, keeping the entire contents resident in memory for the lifetime of the tool.
      
更多          
  hole database
GEOCITY: a drill-hole database as a tool to assess geological hazard in Napoli urban area
      
GEOCITY: a drill-hole database as a tool to assess geological hazard in Napoli urban area
      
The Long Valley gold deposit is a large, low-grade gold resource which is well defined by a large drill hole database.
      
The database used could be part of the geological drill hole database.
      
Using Leapfrog 3D visualisation software, SRK modeled varying copper grades for the entire mine and exploration drill hole database.
      


The significance of evaluating network systems is depicted in this paper. An evaluation model for network security based on plug in technology is illustrated. A kind of classification method for security holes, a principle for identifying them, the problems of updating holes database by using plug ins are discussed. In consideration of the development of plug ins, simulate hack technology implemented by plug ins and the related updating mechanism are described. An evaluation model of comprehensive analysis...

The significance of evaluating network systems is depicted in this paper. An evaluation model for network security based on plug in technology is illustrated. A kind of classification method for security holes, a principle for identifying them, the problems of updating holes database by using plug ins are discussed. In consideration of the development of plug ins, simulate hack technology implemented by plug ins and the related updating mechanism are described. An evaluation model of comprehensive analysis is provided. Quantitative analysis, suggestions, and solutions to the target are given.

针对网络安全技术的发展现状 ,阐述了对网络进行安全评估的重要意义 ,给出了基于插件技术的网络安全评估模型 .在此基础上 ,讨论了漏洞分类的主要方法、漏洞的标识原则以及漏洞库的更新问题 .结合插件技术的发展 ,给出了模拟攻击技术的插件实现以及相关插件更新机制 .最后 ,给出一个综合分析评估模型 ,并探讨了对评估目标的量化分析以及安全措施的建议

A model is proposed for the network Vulnerabilities Scanner system based on″Common Vulnerabilities and Exposures″and Vulnerabilities Database in this paper.With this model,the components and implementation of a network scanner system,iTOP,are described.Some key technical problems and their solutions,which include the design and implementation of Vulnerabilities Database,the technique of hardware -based design,the upgrade and maintenance mechanism of vulnerabilities scanner segment ,and the mechanism of system...

A model is proposed for the network Vulnerabilities Scanner system based on″Common Vulnerabilities and Exposures″and Vulnerabilities Database in this paper.With this model,the components and implementation of a network scanner system,iTOP,are described.Some key technical problems and their solutions,which include the design and implementation of Vulnerabilities Database,the technique of hardware -based design,the upgrade and maintenance mechanism of vulnerabilities scanner segment ,and the mechanism of system security,are also discussed.The characteristic,consistency,the application foreground and the studying way in the future of this system are also summarized.

提出了一个基于CVE标准和漏洞库的网络隐患扫描系统模型,描述了一个基于该模型的“安拓”网络隐患扫描系统的组成结构和实现机制。讨论了该系统实现中的关键技术及其解决方法,包括:漏洞库的设计实现、隐患扫描手段的升级维护机制、系统硬件化技术及自身的安全机制等。归纳了该系统的特点及应用前景,并总结了今后的研究方向。

at present it is becoming more important to analyze network security state quantitatively and alarm in advance, the paper analyzes a lot of vulnerabilities' characteristics and proposes a analytic hierarchy process model and a series of indexes, it applies a graph theory method to analyze the association problem among vulnerabilities and construct intrusion relation graph model, the paper also proposes several computing methods of network security state, at the end of the paper analyzes the implementation prototype...

at present it is becoming more important to analyze network security state quantitatively and alarm in advance, the paper analyzes a lot of vulnerabilities' characteristics and proposes a analytic hierarchy process model and a series of indexes, it applies a graph theory method to analyze the association problem among vulnerabilities and construct intrusion relation graph model, the paper also proposes several computing methods of network security state, at the end of the paper analyzes the implementation prototype of the whole network security analysis and evaluation system.

当前 ,对网络的安全状况进行定量分析和预警日益显得重要 ,文中通过对漏洞库中的大量漏洞信息进行分析 ,提出对网络安全脆弱性的威胁程度进行定量分析的层次分析模型和指标体系 ,采用图论的方法对各种安全脆弱性信息进行关联分析 ,并在此基础上构造入侵关系图模型 ,给出基于入侵关系图的网络安全威胁分析方法 ,最后对整个网络安全分析评估系统的实现原型进行了分析

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关漏洞库的内容
在知识搜索中查有关漏洞库的内容
在数字搜索中查有关漏洞库的内容
在概念知识元中查有关漏洞库的内容
在学术趋势中查有关漏洞库的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社