Analysis for the Classification Scanner Method of Network Vulnerability
DOI:
Author:
Affiliation:

Funding:

Ethical statement:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
    Abstract:

    In network security, the vulnerability scanner will find the hidden vulnerability. In this paper, the classifications of vulnerability and the principle of vulnerability scanner are introduced. Based on the protocol classification, and combined with the s

    Reference
    Related
    Cited by
Get Citation

刘嫔,唐朝京,张森强.基于网络的安全漏洞分类与扫描分析[J]. Journal of Terahertz Science and Electronic Information Technology ,2004,2(4):

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
History
  • Received:
  • Revised:
  • Adopted:
  • Online:
  • Published: