請幫我查下這篇文章的EI檢索號,

題目:

請幫我查下這篇文章的EI檢索號,
Feasibility Study on COM Plug-in Technology in
Vulnerability Scanner
急用,請有權限的朋友幫下忙吧!

解答:

  Accession number:20101312814394
  Title:Feasibility study on COM plug-in technology in vulnerability scanner
  Authors:Su,Xiaoling1 ; Li,June2
  Author affiliation:1 College of Information Science and Engineering,Henan University of Technology,ZhengZhou,450001,China
  2 Computer Center,Wuhan University,Wuhan,430072,China
  Source title:ITME2009 - Proceedings 2009 IEEE International Symposium on IT in Medicine and Education
  Abbreviated source title:ITME - Proc.IEEE Int.Symp.IT Med.Educ.
  Monograph title:ITME2009 - Proceedings 2009 IEEE International Symposium on IT in Medicine and Education
  Issue date:2009
  Publication year:2009
  Pages:300-303
  Article number:5236412
  Language:English
  ISBN-13:9781424439294
  Document type:Conference article (CA)
  Conference name:2009 IEEE International Symposium on IT in Medicine and Education,ITME2009
  Conference date:August 14,2009 - August 16,2009
  Conference location:Ji'nan,China
  Conference code:79617
  Sponsor:IEEE Beijing Section; Wuhan University of Technology (WHUT); East China Normal University (ECNU); Birmingham City University (BCU); University of Southern Queensland (USQ)
  Publisher:IEEE Computer Society,445 Hoes Lane - P.O.Box 1331,Piscataway,NJ 08855-1331,United States
  Abstract:The paper analyzes plug-in technology ways to be used in vulnerability scanners at home and abroad.So far plug-in development in the vulnerability scanners has not arrived the unified standard.If the public standard is designed for plug-in in vulnerability scanners,it will add flexibility of write plug-in (not confined to special language).Plug-in is designed by system development staff.The terminal users on-line upgrade plug-in library similar to upgrade virus library.Combining with COM standard widespread used in Windows platform,the paper puts forth the designing idea of scanning master routine and the COM plug-in in the vunerability scanners,and verifies ideas.©2009 IEEE.
  Number of references:5
  Main heading:Scanning
  Controlled terms:Information technology - Standardization - Viruses
  Uncontrolled terms:Feasibility studies - Plug-in technology - Plug-ins - System development - Vulnerability scanner - Vunerability - Windows platform
  Classification code:461.9 Biology - 723.5 Computer Applications - 741.3 Optical Devices and Systems - 801.2 Biochemistry - 902.2 Codes and Standards - 903 Information Science
  DOI:10.1109/ITIME.2009.5236412
  Database:Compendex
  Compilation and indexing terms,© 2009 Elsevier Inc.

添加新評論

暱稱
郵箱
網站