Accession number: 20101312814394
Title: Feasibility study on COM plug-in technology in vulnerability scanner
Authors: Su, Xiaoling1 ; Li, June2
Author affiliation: 1 College of Information Science and Engineering, Henan University of Technology, ZhengZhou, 450001, China
2 Computer Center, Wuhan University, Wuhan, 430072, China
Corresponding author: Su, X. (suxiaoling0802@126.com)
Source title: ITME2009 - Proceedings 2009 IEEE International Symposium on IT in Medicine and Education
Abbreviated source title: ITME - Proc. IEEE Int. Symp. IT Med. Educ.
Monograph title: ITME2009 - Proceedings 2009 IEEE International Symposium on IT in Medicine and Education
Issue date: 2009
Publication year: 2009
Pages: 300-303
Article number: 5236412
Language: English
ISBN-13: 9781424439294
Document type: Conference article (CA)
Conference name: 2009 IEEE International Symposium on IT in Medicine and Education, ITME2009
Conference date: August 14, 2009 - August 16, 2009
Conference location: Ji'nan, China
Conference code: 79617
Sponsor: IEEE Beijing Section; Wuhan University of Technology (WHUT); East China Normal University (ECNU); Birmingham City University (BCU); University of Southern Queensland (USQ)
Publisher: IEEE Computer Society, 445 Hoes Lane - P.O.Box 1331, Piscataway, NJ 08855-1331, United States
Abstract: The paper analyzes plug-in technology ways to be used in vulnerability scanners at home and abroad. So far plug-in development in the vulnerability scanners has not arrived the unified standard. If the public standard is designed for plug-in in vulnerability scanners, it will add flexibility of write plug-in (not confined to special language). Plug-in is designed by system development staff. The terminal users on-line upgrade plug-in library similar to upgrade virus library. Combining with COM standard widespread used in Windows platform, the paper puts forth the designing idea of scanning master routine and the COM plug-in in the vunerability scanners, and verifies ideas. ©2009 IEEE.
Number of references: 5
Main heading: Scanning
Controlled terms: Information technology - Standardization - Viruses
Uncontrolled terms: Feasibility studies - Plug-in technology - Plug-ins - System development - Vulnerability scanner - Vunerability - Windows platform
Classification code: 461.9 Biology - 723.5 Computer Applications - 741.3 Optical Devices and Systems - 801.2 Biochemistry - 902.2 Codes and Standards - 903 Information Science
DOI: 10.1109/ITIME.2009.5236412
Database: Compendex
Compilation and indexing terms, © 2009 Elsevier Inc.
你到万方数据库找啊
直接把题名打进去
然后你应该就知道EI检索号了。
在学校用数据库是不花钱的
O(∩_∩)O哈哈~好好利用资源。