您当前的位置:
首页 >
文章列表页 >
Design and implementation of national security vulnerability database
更新时间:2024-10-14
    • Design and implementation of national security vulnerability database

    • Vol. 32, Issue 6, Pages: 93-100(2011)
    • CLC: TP393.08
    • Published:2011

    移动端阅览

  • ZHANG Yu-qing1, WU Shu-ping1, LIU Qi-xu1, et al. Design and implementation of national security vulnerability database[J]. 2011, 32(6): 93-100. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1314

下载量

9

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Survey on chaos-based low probability of interception communication technology
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Survey on privacy protection indoor positioning
Survey of capacity limits and implementation techniques in wireless covert communication
Research on coreference resolution technology of entity in information security

Related Author

ZHOU Ang
WANG Shilian
CHEN Weiyu
XIA Guojiang
Jinfu CHEN
Zhenxin WANG
Saihua CAI
Qiaowei FENG

Related Institution

Beijing Institute of Astronautical Systems Engineering
College of Electronic Science and Technology, National University of Defense Technology
Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University
School of Computer Science and Communication Engineering, Jiangsu University
Department of Business Computing, Wisconsin International University College, Accra RE
0