期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于MBD的标准件信息快速获取及标注方法研究 被引量:1
1
作者 韩志仁 王珂 刘明星 《沈阳航空航天大学学报》 2014年第6期31-35,共5页
在基于全三维信息模型(MBD模型)的数字化制造中,连接信息快速提取是三维工艺设计的关键问题之一。针对该问题,提出了标准件信息快速获取及标注的算法,通过简化拾取元素,自动检索结构树相关信息以及关联标注等技术,利用CATIA二次开发技术... 在基于全三维信息模型(MBD模型)的数字化制造中,连接信息快速提取是三维工艺设计的关键问题之一。针对该问题,提出了标准件信息快速获取及标注的算法,通过简化拾取元素,自动检索结构树相关信息以及关联标注等技术,利用CATIA二次开发技术,建立了标准件信息标注平台。实现了标准件信息的快速获取和标注,对基于三维数字化制造的工艺编制和生产现场信息快速提取具有重要意义,在很大程度上提高了数字化制造生产准备的效率。 展开更多
关键词 标准件信息 标注 CAA MBD
下载PDF
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
2
作者 Jin Li Jinfu Chen +5 位作者 Minhuan Huang Minmin Zhou Wanggen Xie Zhifeng Zeng Shujie Chen Zufa Zhang 《China Communications》 SCIE CSCD 2018年第2期190-208,共19页
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel... Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity. 展开更多
关键词 software vulnerability detection LOOPHOLES information security evaluationmethod testing framework
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部