請幫我查下這篇文章的EI檢索號,
題目:
請幫我查下這篇文章的EI檢索號,
Feasibility Study on COM Plug-in Technology in
Vulnerability Scanner
急用,請有權限的朋友幫下忙吧!
解答:
Accession number:20101312814394
Title:Feasibility study on COM plug-in technology in vulnerability scanner
Authors:Su,Xiaoling1 ; Li,June2
Author affiliation:1 College of Information Science and Engineering,Henan University of Technology,ZhengZhou,450001,China
2 Computer Center,Wuhan University,Wuhan,430072,China
Source title:ITME2009 - Proceedings 2009 IEEE International Symposium on IT in Medicine and Education
Abbreviated source title:ITME - Proc.IEEE Int.Symp.IT Med.Educ.
Monograph title:ITME2009 - Proceedings 2009 IEEE International Symposium on IT in Medicine and Education
Issue date:2009
Publication year:2009
Pages:300-303
Article number:5236412
Language:English
ISBN-13:9781424439294
Document type:Conference article (CA)
Conference name:2009 IEEE International Symposium on IT in Medicine and Education,ITME2009
Conference date:August 14,2009 - August 16,2009
Conference location:Ji'nan,China
Conference code:79617
Sponsor:IEEE Beijing Section; Wuhan University of Technology (WHUT); East China Normal University (ECNU); Birmingham City University (BCU); University of Southern Queensland (USQ)
Publisher:IEEE Computer Society,445 Hoes Lane - P.O.Box 1331,Piscataway,NJ 08855-1331,United States
Abstract:The paper analyzes plug-in technology ways to be used in vulnerability scanners at home and abroad.So far plug-in development in the vulnerability scanners has not arrived the unified standard.If the public standard is designed for plug-in in vulnerability scanners,it will add flexibility of write plug-in (not confined to special language).Plug-in is designed by system development staff.The terminal users on-line upgrade plug-in library similar to upgrade virus library.Combining with COM standard widespread used in Windows platform,the paper puts forth the designing idea of scanning master routine and the COM plug-in in the vunerability scanners,and verifies ideas.©2009 IEEE.
Number of references:5
Main heading:Scanning
Controlled terms:Information technology - Standardization - Viruses
Uncontrolled terms:Feasibility studies - Plug-in technology - Plug-ins - System development - Vulnerability scanner - Vunerability - Windows platform
Classification code:461.9 Biology - 723.5 Computer Applications - 741.3 Optical Devices and Systems - 801.2 Biochemistry - 902.2 Codes and Standards - 903 Information Science
DOI:10.1109/ITIME.2009.5236412
Database:Compendex
Compilation and indexing terms,© 2009 Elsevier Inc.
添加新評論