A New Method to Construct the Software Vulnerability Model | |
Li, Xiang[1]; Chen, Jinfu[2]; Lin, Zhechao[3]; Zhang, Lin[4]; Wang, Zibin[5]; Zhou, Minmin[6]; Xie, Wanggen[7] | |
2017 | |
会议名称 | 2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA) |
会议日期 | 2017-01-01 |
关键词 | computer security vulnerability vulnerability analysis vulnerability model chemical abstract machine |
页码 | 225-229 |
收录类别 | CPCI-S |
URL标识 | 查看原文 |
WOS记录号 | WOS:000425460800044 |
内容类型 | 会议论文 |
URI标识 | http://www.corc.org.cn/handle/1471x/5342233 |
专题 | 江苏大学 |
作者单位 | 1.[1]Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100101, Peoples R China.,Beijing Inst Syst Engn, Beijing 100101, Peoples R China. 2.[2]Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Peoples R China. 3.[3]Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100101, Peoples R China.,Beijing Inst Syst Engn, Beijing 100101, Peoples R China. 4.[4]Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Peoples R China. 5.[5]Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100101, Peoples R China.,Beijing Inst Syst Engn, Beijing 100101, Peoples R China. 6.[6]Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Peoples R China. 7.[7]Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Peoples R China. |
推荐引用方式 GB/T 7714 | Li, Xiang[1],Chen, Jinfu[2],Lin, Zhechao[3],et al. A New Method to Construct the Software Vulnerability Model[C]. 见:2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA). 2017-01-01. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论