%0 Journal Article
%T Research on Vulnerability Database Technology
脆弱性数据库技术研究
%A XU Liang-hua
%A SHI Hong
%A MA Jun
%A ZHU Lu-hua
%A
徐良华
%A 史洪
%A 马俊
%A 朱鲁华
%J 计算机应用研究
%D 2006
%I
%X Vulnerability is the origin of network incident. Vulnerability database technology is advantageous to systematically analyze the vulnerability essence, thus is advantageous to the vulnerability detection, the prevention and the elimination. First, four vu
%K Vulnerability
%K Database
%K Vulnerability Database
%K Vulnerability Scan
%K Network Security
脆弱性
%K 数据库
%K 脆弱性数据库
%K 脆弱性扫描
%K 网络安全
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=A9D9BE08CDC44144BE8B5685705D3AED&aid=84E4DB6A2B4C66D2&yid=37904DC365DD7266&vid=EA389574707BDED3&iid=38B194292C032A66&sid=94C357A881DFC066&eid=DF92D298D3FF1E6E&journal_id=1001-3695&journal_name=计算机应用研究&referenced_num=0&reference_num=11