1) network vulnerability
网络弱点
1.
In some case, single network vulnerability may be safe, or in some single act does not constitute a threat, but in the complex network connection, the attackers can make use of network-related vulnerabilities to exploit, and gradually improve their own power, and ultimately achieve the purpose of controlling objectives the machine or service.
网络弱点评估技术能够检测网络系统潜在的安全弱点,评估网络系统的安全状况,因此,深入分析和研究网络弱点评估对保障计算机系统与网络安全具有重要意义。
2.
The model collects the network vulnerability, analyzes the vulnerability relation, references network configuration and topology, simulates the produce of the exploitation state change, builds exploit graph, analyzes the key exploit queue and constructs assessment of network vulnerability, which provides a useful evidence and guidance for making risk decision.
提出一种基于渗透图的网络弱点评估模型(EG_NVM),从网络弱点采集、弱点关联分析出发,参考网络环境配置与拓扑结构、模拟渗透状态改变的过程,构建渗透图,通过对关键渗透序列的量化分析进行网络弱点评估。
3.
The method identifies the correlation graphs to be integrated through alert relativity, and reasons out missing alerts by analyzing network vulnerability and exploit.
该方法根据报警相关度确定可组合的关联图,利用网络弱点和攻击关系推出漏报警,使得分裂的关联图能够组合起来,进而重建完整的攻击场景。
2) network vulnerability
网络脆弱性
1.
A kind of framework was introduced for realtimely analyzing network vulnerability.
首先介绍了实时分析网络脆弱性的一种框架,它能够被用于实时发现攻击点(或网络的脆弱性),描述网络在攻击情况下的状况。
2.
The evaluation of network vulnerability was the first-line task for network security issue.
网络脆弱性评价是有效解决网络安全问题的首要任务。
3) weak-compact k-networks
弱紧k网络
1.
In this paper,a space with a closed image of a locally compact metric space is obtained if and only if it is a Frchet space with a point-countable weak-compact k-network,it is a new characterization of closed images with locally compact metric spaces by means of weak-compact k-networks.
借助弱紧k网络,获得了局部紧度量空间闭映象内部特征一个新的刻画,即空间X是局部紧度量空间的闭映象当且仅当X是具有点可数的弱紧k网络的Fr chet空间。
4) Net of Inferior Relation
弱关系网络
5) network node
网络节点
1.
The Localization Technology Based on TDOA for Wireless Sensor Network Nodes;
基于TDOA的无线传感器网络节点定位技术研究
2.
According the speciality of wireless sensor network technology and alarming in intelligent home,we designed an alarming system based on wireless sensor network technology,built the structure picture of alarming system,and designed the network node and software of the alarming system.
方法通过搭建该报警系统结构框图,设计了报警系统的网络节点,利用许可证技术来保证信息的传输准确。
3.
Such design enhances the flexibility of the system and improves the reliability of the network nodes.
此设计增强了系统的灵活性,提高了网络节点的可靠性,结构简单适应于不同应用领域的需求。
6) network pinch
网络夹点
1.
The difference between the process pinch and network pinch has been analyzed.
本文分析了过程夹点和网络夹点的不同,指出了在改造过程中存在网络夹点,并且节能潜力受网络夹点的控制,同时提出了克服网络夹点的途径,即分流和调整换热网络结构。
补充资料:脆弱性骨硬化
脆弱性骨硬化
osteopoikilosis
1915年Albers-Schonberg首先描述。起因不明。多见于男性,患者父母多有亲属关系。长骨内有致密斑点,但骨皮质正常,骨形态无改变,一般无症状。常伴有皮肤病变,如硬皮病、弥散性豆状皮肤纤维瘤病。无特效疗法。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条