请帮我查下这篇文章的EI检索号,谢谢!

2024-12-30 14:07:18
推荐回答(2个)
回答1:

  Accession number: 20101312814394

  Title: Feasibility study on COM plug-in technology in vulnerability scanner

  Authors: Su, Xiaoling1 ; Li, June2

  Author affiliation: 1 College of Information Science and Engineering, Henan University of Technology, ZhengZhou, 450001, China

  2 Computer Center, Wuhan University, Wuhan, 430072, China

  Corresponding author: Su, X. (suxiaoling0802@126.com)

  Source title: ITME2009 - Proceedings 2009 IEEE International Symposium on IT in Medicine and Education

  Abbreviated source title: ITME - Proc. IEEE Int. Symp. IT Med. Educ.

  Monograph title: ITME2009 - Proceedings 2009 IEEE International Symposium on IT in Medicine and Education

  Issue date: 2009

  Publication year: 2009

  Pages: 300-303

  Article number: 5236412

  Language: English

  ISBN-13: 9781424439294

  Document type: Conference article (CA)

  Conference name: 2009 IEEE International Symposium on IT in Medicine and Education, ITME2009

  Conference date: August 14, 2009 - August 16, 2009

  Conference location: Ji'nan, China

  Conference code: 79617

  Sponsor: IEEE Beijing Section; Wuhan University of Technology (WHUT); East China Normal University (ECNU); Birmingham City University (BCU); University of Southern Queensland (USQ)

  Publisher: IEEE Computer Society, 445 Hoes Lane - P.O.Box 1331, Piscataway, NJ 08855-1331, United States

  Abstract: The paper analyzes plug-in technology ways to be used in vulnerability scanners at home and abroad. So far plug-in development in the vulnerability scanners has not arrived the unified standard. If the public standard is designed for plug-in in vulnerability scanners, it will add flexibility of write plug-in (not confined to special language). Plug-in is designed by system development staff. The terminal users on-line upgrade plug-in library similar to upgrade virus library. Combining with COM standard widespread used in Windows platform, the paper puts forth the designing idea of scanning master routine and the COM plug-in in the vunerability scanners, and verifies ideas. ©2009 IEEE.

  Number of references: 5

  Main heading: Scanning

  Controlled terms: Information technology - Standardization - Viruses

  Uncontrolled terms: Feasibility studies - Plug-in technology - Plug-ins - System development - Vulnerability scanner - Vunerability - Windows platform

  Classification code: 461.9 Biology - 723.5 Computer Applications - 741.3 Optical Devices and Systems - 801.2 Biochemistry - 902.2 Codes and Standards - 903 Information Science

  DOI: 10.1109/ITIME.2009.5236412

  Database: Compendex

  Compilation and indexing terms, © 2009 Elsevier Inc.

回答2:

你到万方数据库找啊
直接把题名打进去
然后你应该就知道EI检索号了。
在学校用数据库是不花钱的
O(∩_∩)O哈哈~好好利用资源。