Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Group Technology & Production Modernization》 2011-01
Add to Favorite Get Latest Update

Design on Control Center of Distributed Security Assessment System with Task-oriented and Reconfigurable

XIA Bing1,LI Jie-bing2(1.School of Computer Science,ZhongyuanUniversity of Technology,zhengzhou 450007;2.Henan Finance and Economics School,Zhengzhou 450002,China)  
How to fast implement assessment on enterprise network is an issue of network security assessment.The paper proposes a task-oriented and reconfigurable plan to improve the process time of task making in design of control center.The plan uses scan policy as reconfigurable module,and experiment showes that the plan is valid.
【Fund】: 河南省科技攻关计划项目(092102310038 092102210029)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 4 Hits
1 WANG Xinzhi, LIU Kesheng (Staff Room of Network Engineering, Hefei Electronic Engineering Institute, Hefei 230037);Task Scheduling Model and Algorithm in Distributed Network Security Scan System[J];Computer Engineering;2003-19
2 LAN Zhou SUN Shi-Xin(College of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 610054);An Algorithm of Allocating Tasks to Multiprocessors Based on Dynamic Critical Task[J];Chinese Journal of Computers;2007-03
3 HE Kun,ZHAO Yong,CHEN Yang(Institute of Systems Engineering,Department of Control Science and Engineering,Huazhong University of Science and Technology,Wuhan 430074,China);Analysis and Solutions for Multitasks Scheduling in Distributed Environments[J];Systems Engineering-Theory & Practice;2007-05
4 XIA Bing1,2,PEI Fei1,ZHENG Qiu-sheng1,2(1.Zhongyuan University of Technology;2.Zhengzhou Key Lab of Computer Network Security Assessment,Zhengzhou,450007,China);Research and Implementation of Security Assessment System Based on Policy and Management[J];Journal of Zhongyuan University of Technology;2009-06
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 WU Zhi-yong1,SUN Le-chang1,WANG Yan1,ZHONG Gao-xian1,YU Sheng2 (1.Department of Network Engineering,Electronic Engineering Institute of PLA,Hefei 230037,China;2.Basic Department,Petty Officer Institute,Bengbu 233012,China);A scheduler algorithm on vulnerability scanning plugins[J];Journal of Anhui University(Natural Sciences);2008-04
2 LI Tao-shen,YI Song-jie(School of Computer and Electronic Information,Guangxi University,Nanning 530004,China);Design and development of vulnerabilities detection middleware based on plug-in component[J];Information Technology;2006-10
3 He Kun Huang Wenqi(College of Computer Science and Technology,Huazhong University ofScience and Technology,Wuhan 430074,China);Mathematical module for optimal scheduling in distributed-memory machines[J];Journal of Huazhong University of Science and Technology(Nature Science Edition);2008-02
4 LIANG Gen1,QIN Yong1,2,GUO Xiao-xue3,LIANG Huo-min4(1.Education Information and Technology Center,Maoming University,Maoming 525000;2.School of Computer Science & Engineering,South China University of Technology,Guangzhou 510641;3.College of Science,Maoming University,Maoming 525000;4.College of Computer Science,South China Normal University,Guangzhou 510631);Task Scheduling in Distributed System Based on Dynamic Multi Processing Nodes[J];Computer Engineering;2009-09
5 LI Tao-shen,YI Song-jie(School of Computer,Electronics and Information,Guangxi University,Nanning 530004,China);A Distributed Hole Detection Scan Scheduling Algorithm[J];Computing Technology and Automation;2007-01
6 HE Kun1),2)ZHAO Yong2)HUANG Wen-Qi1)1)(College of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan 430074)2)(Department of Control Science and Engineering,Huazhong University of Science and Technology,Wuhan 430074);A Clustering and Scheduling Algorithm Based on Task Duplication[J];Chinese Journal of Computers;2008-05
7 Hu Leigang Xiao Mingqing Wang Lei (ATS Lab,Engineering College,Air Force Engineering University,Xi'an 710038,China);Research on Parallelizability of Parallel Test Tasks[J];Computer Measurement & Control;2008-10
8 GONG Yue,ZHANG Zhen-zhen,ZHANG Gang-gang,MA Xiao-hai,BAO Jie(College of Computer Science and Technology,Changchun University of Science and Technology,Changchun 130022,China);Task Allocation and Scheduling Algorithm Based on Fuzzy Theory[J];Computer Engineering;2010-18
9 XIA Bing1,2,LI Jinwu1,PEI Fei1,ZHENG Qiusheng1,21.School of Computer Science,Zhongyuan University of Technology,Zhengzhou 450007,China 2.Zhengzhou Key Lab of Computer Network Security Assessment,Zhengzhou 450007,China;Model of communication and dispatch with distributed security assessment[J];Computer Engineering and Applications;2011-12
10 MAO Cheng-yong,LIU Xiang-zhi,CHENG Wei(Shandong Key Laboratory of Automotive Electronics,Institute of Automation,Shandong Academy of Sciences,Jinan 250014,China);OSEK/VDX Standard Based Optimization and Implementation for a Task Scheduling Algorithm[J];Shandong Science;2010-03
China Proceedings of conference Full-text Database 2 Hits
1 LI Jinwu~(1,2),ZHENG Qiusheng~(1,2) (School of Computer Science,Zhongyuan University of Technology,ZhengZhou 450007,Henan China) 1 (ZhengZhou Key Lab of Computer Network Security Assessment,ZhengZhou 450007,Henan China) 2;Research and Design of Communication Protocol in Distributed Security Assessment[A];[C];2010
2 XIA Bing~(1,2),XIA~1 Minjie,XU~1 Fei,ZHENG Qiusheng~(1,2) (1.School of Computer Science,Zhongyuan University of Technology,Zhengzhou 450007,Henan China; 2.Zhengzhou Key Lab of Computer Network Security Assessment Department,Zhengzhou 450007,Henan China);Research and Design on Control Center of Distributed Security Assessment System[A];[C];2010
【Secondary Citations】
Chinese Journal Full-text Database 5 Hits
1 He Kun Zhao Yong Doctoral Candidate;Dept.of Control Sci.& Eng., Huangzhong Univ.of Sci.& Tech.,Wuhan 430074,China.;Modeling and analyzing resource schedules in grid environments[J];Journal of Huazhong University of Science and Technology(Nature Science Edition);2006-03
2 XING Xu Jia LIN Chuang JIANG Yi Xin (Department of Computer Science and Technology, Tsinghua University, Beijing 100084);A Survey of Computer Vulnerability Assessment[J];Chinese Journal of Computers;2004-01
3 ZHOU Shuang E 1) YUAN You Guang 2) XIONG Bing Zhou 2) OU Zhong Hong 1) 1) (College of Computer Science and Technology, Harbin Engineering University, Harbin 150001) 2) (Institute of Wuhan Digital Engineering, Wuhan 430074);An Algorithm of Processor Pre-Allocation Based on Task Duplication[J];Chinese Journal of Computers;2004-02
4 SHI Zhi-cai(Electronic and Electric Engineering Institute, Shanghai University of Engineering Science, Shanghai 201620,China);Research on methods of network risk evaluation[J];Journal of Computer Applications;2008-10
5 QI Jun-peng1,SUN Si-ming1,WANG Hua-peng2(1.China Aerospace Engineering Consultation Center,Beijing 100037,China;2.China Electric Power Research Institute,Beijing 100085,China);An Expert System for Risk Assessment of Information Security[J];Computer Simulation;2008-09
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved