1.
Network security evaluation based on vulnerability correlation and security requirements
基于弱点关联和安全需求的网络安全评估方法
2.
Multidimensional Association Rule Mining Based on Vulnerability Database;
基于弱点数据库的多维关联规则挖掘
3.
Study about Multidimensional Association Rule Mining Based on Vulnerability Database
基于弱点数据库的多维关联规则算法研究
4.
A note on weak FI-algebras and weak MV-algebras;
关于弱FI-代数和弱MV-代数的一点注记
5.
Uniform Convergence, Convergence and Weak Convergence;
一致收敛 点点收敛 弱收敛之关系探讨
6.
A Weak Alliance: America-Pakistan Relations after "9.11" Event
脆弱的联盟——“9·11”后的美巴关系
7.
Ring Signature with Strong Anonymity and Weak Linkability
具有强匿名性和弱可关联性的环签名
8.
VGGA Arithmetic and it's Application in Network System Vulnerability Mend
弱点相关图生成算法及在信息系统弱点修补中的应用
9.
On the Special Group in Ethnic Schools;
关于民族高校“弱势群体”的几点思考
10.
The Common Fixed Point for (Ag) Type -Weak Commutativity Mappings
关于(Ag)型弱交换映象的公共不动点
11.
The Incidence Coloring and Adjacent Vertex Distinguishing Incidence Coloring of Graphs;
图的关联着色与邻点可区别关联着色
12.
Reflections on Taking Advantage of "Rule of Virtue" to Raise Concern for the Vulnerable Groups;
关于发挥"德治"优势 关注"弱势"群体的几点思考
13.
Reflections on Taking Advantage of “Rule of Virtue” to Raise Concern for the Vulnerable Groups;
关于发挥“德治”优势关注“弱势”群体的几点思考
14.
Decentralized Nonfragile Guarranteed Cost Control of a Class of Interconnected Composite Systems;
一类关联大系统的分散非脆弱保成本控制
15.
An analyst can tell a great deal about the strengths and weakness of the firm.
分析者就能表述许多有关企业的实力和弱点。
16.
Fixed Point Theorems For Multivalued Mappinqs of Upper Hemicontinuous
关于弱上半连续多值映象的不动点定理
17.
Research on Computer Security Vulnerability and Its Corresponding Key Technologies;
计算机安全弱点及其对应关键技术研究
18.
Anatomical and Physiological Weaknesses of the Shoulder Joint and its Sports Injuries Prevention;
肩关节解剖生理弱点与运动损伤的预防干预