|
计算机应用研究 2006
Research on Vulnerability Database Technology
|
Abstract:
Vulnerability is the origin of network incident. Vulnerability database technology is advantageous to systematically analyze the vulnerability essence, thus is advantageous to the vulnerability detection, the prevention and the elimination. First, four vu