1) vulnerability scanner
漏洞扫描器
1.
Nessus is a powerful vulnerability scanner.
Nessus是一种功能强大的漏洞扫描器。
2.
This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion.
利用漏洞扫描器及入侵检测系统的统计结果两方面信息 ,提出了应用模糊信息融合对安全漏洞进行定性评估的方法 。
2) leak scanning
漏洞扫描
1.
Design of survivability analysis system on leak scanning technology;
基于漏洞扫描技术的生存性分析系统的设计
2.
Technology combined with local area network's cost gateway and leak scanning
局域网的计费网关与漏洞扫描结合技术
3.
In the paper,the writer proposes adding a charging gateway in combination with leak scanning and net flow monitoring technology.
本文设计了将计费网关与漏洞扫描及流量监测技术相结合的方案,解决了校园网客户端用户主机补丁包升级、校园网客户端主机漏洞扫描、漏洞主机提示以及暂时中止中毒主机访问互联网等问题,收到了较好的效果。
3) vulnerability scanning
漏洞扫描
1.
Study on application of data mining technology in vulnerability scanning system;
数据挖掘技术在漏洞扫描系统中的应用研究
2.
Research on SVM detection of network intrusion based on vulnerability scanning;
基于漏洞扫描的SVM网络入侵检测研究
3.
Design and Implementation of Agent-based Network Vulnerability Scanning System;
基于Agent的网络漏洞扫描系统的设计与实现
4) vulnerability scan
漏洞扫描
1.
Design and Implementation of Network Vulnerability Scanning System Based on Web;
一个基于Web的网络漏洞扫描系统的设计与实现
2.
The detection agent, which is a vulnerability scanner based on OVAL Schema, can give an effective and all-sided vulnerability scan aswell as reporting the result to the console without any damage to the network.
其中,检测代理是基于OVALSchema的漏洞扫描器,能在不对本地计算机系统和网络系统造成任何损害的情况下,全面有效地检测主机漏洞,并将漏洞信息结果上报给控制台,而控制台端实现了同时控制局域网内多台主机的漏洞扫描,并将整个局域网的漏洞信息汇总。
5) Vulnerability scanner
漏洞扫描
1.
The paper provided a new model,the interaction with vulnerability scanner and Intrusion Detection System(IDS).
提出漏洞扫描与入侵检测系统联动工作模型。
2.
The location of patch files is important for realizing the host-based vulnerability scanner and patch-pushed system(HVSPS).
补丁文件定位是实现主机漏洞扫描及补丁推送系统的关键。
3.
The paper provides a new model of IDS merged vulnerability scanner.
文章提出一种新的融合漏洞扫描功能的IDS模型,通过定期对系统进行漏洞扫描,及时修补系统安全漏洞,同时IDS根据漏洞扫描结果,对模式库进行动态更新,删除与得到修补的漏洞有关的攻击模式,缩减模式库的规模,提高检测效率。
6) vulnerabilities scan
漏洞扫描
1.
It designs a vulnerabilities database as a result of research of vulnerabilities category theory and need of vulnerabilities scan system.
论文主要探讨了国内外漏洞数据库的发展状况,通过对漏洞特征分类理论的研究,同时结合所开发的漏洞扫描系统的需要,设计了一个漏洞数据库,并且提出了一种基于粗糙集理论的漏洞检测技术。
2.
This paper analyzes the importance of network vulnerabilities scanner in the field of network security and its principles of implementation.
分析了网络漏洞扫描器在网络安全领域的重要作用及其工作原理,介绍了漏洞扫描器开源软件Nessus的优点,介绍了一个在Nessus的基础上开发的基于Web的网络漏洞扫描系统的设计与实现。
补充资料:扫描电子显微镜(见扫描电子显微术)
扫描电子显微镜(见扫描电子显微术)
scanning eleetron mieroseoPe
扫描电子显微镜scanning eleetron mieroseope见扫描电子显微术。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条