期刊文献+

信息系统脆弱性分析与管理系统综述 被引量:1

原文传递
导出
摘要 随着信息系统在国内各行各业中广泛应用,行业对信息系统的脆弱性分析与管理的需求日益迫切。本文针对信息系统脆弱性分析与管理系统的研发过程,设计提出了系统的各大功能模块划分,总结了系统主要功能特性,阐述了系统实现过程中使用的关键技术。
作者 黄波
出处 《网络安全技术与应用》 2008年第5期41-42,共2页 Network Security Technology & Application
  • 相关文献

参考文献1

二级参考文献31

  • 1Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996 被引量:1
  • 2Longley D. , Shain M. , Caelli W.. Information Security: Dictionary of Concepts, Standards and Terms. New York: Macmillan, 1992 被引量:1
  • 3Beizer B.. Software Testing Techniques. 2nd edition. International Thomson Computer Press, 1990 被引量:1
  • 4Farmer D. , Spafford E. H.. The COPS security checker system. Purdue University, West Lafayette: Technical Report,Coast TR 94-01, CSD-TR-993, 1990 被引量:1
  • 5Baldwin R. W.. Kuang: Rule-based security checking. Programming Systems Research Group, Lab for Computer Science, MIT, Massachusetts: Technical Report, 1994 被引量:1
  • 6Zerkle D. , Levitt K. , NetKuang: A multi-host configuration vulnerability checker. In: Proceedings of the 6th USENIX Security Symposium, San Jose, CA, 1996 被引量:1
  • 7Porras P. A. , Kemmerer R. A.. Penetration state transition analysis: A rule-based intrusion detection approach. In: Proceedings of the Eighth Annual Computer Security Applications Conference, 1992, 220~229 被引量:1
  • 8Ilgun K.. USTAT: A real-time intrusion detection system for UNIX. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 16 被引量:1
  • 9Jensen K.. Colored petri nets: Basic concepts, analysis methods and practical use. vol. 1. 2nd edition. Berlin, Germany:Springer-Verlag, 1997 被引量:1
  • 10Kumar S.. Classification and detection of computer Intrusions [Ph. D. dissertation]. Department of Computer Science, Purdue University,West Lafayette, 1995 被引量:1

共引文献83

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部