期刊文献+

计算机网络脆弱性评估研究 被引量:2

Research on the vulnerability evaluation of computer network
下载PDF
导出
摘要 计算机网络脆弱性评估是计算机安全领域的重要组成部分,对于提高计算机网络自身的安全水平至关重要.文章从计算机网络的脆弱性开始介绍,阐述了脆弱性评估方法所要解决的问题,具体介绍了目前计算机网络脆弱性评估领域的主要方法、面临的问题以及今后的发展方向. Computer network vulnerability assessment is the important part of the computer security domain, it is very important to improve oneself security level of computer network. This paper introduces the computer network vulnerability firstly, expatiate on the problem which should be solved by the vulnerability assessment, embody introduce some main methods of computer network vulnerability assessment and the issues faced, and then it gives the future work of computer network vulnerability assessment.
出处 《安徽大学学报(自然科学版)》 CAS 北大核心 2007年第4期29-32,共4页 Journal of Anhui University(Natural Science Edition)
关键词 脆弱性评估 BP神经网络 攻击图 vulnerability assessment BPNN attack - graph
  • 相关文献

参考文献6

  • 1王士同,等.人工智能教程[M].北京:电子工业出版社,2004.
  • 2段金利,张岐山.基于BP神经网络和专家系统的信息系统风险评估方法研究[J].现代管理科学,2006(7):21-22. 被引量:6
  • 3Swilled L P,Phillips C,Ellis D,Chakerian S.Computer-attack graph generation tool[C].IEEE,2001:307-321.
  • 4Ritchey R,Ammann R.Using model checking to analyze network vulnerabilities[J].Proceedings of the IEEE Symposium on Security and Privacy,Oakland,CA,2000,115(1):71-79.
  • 5Holzmann G.The model checkers SPIN[J].IEEE Transactions on Software Engineering,1997,23(5):279-295.
  • 6Ritchey R,Berry O.Representing TCP/ IP connectivity for topological analysis of network security[C].In Proceedings of the 18th Annual Computer Security,ApplicationsConference,San Diego,California,2002:25-31.

二级参考文献4

共引文献9

同被引文献13

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部