Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Zhongyuan University of Technology》 2011-01
Add to Favorite Get Latest Update

Research on Web Server Security Scanning in Network Security Evaluation System

XIA Min-jie,XIA Bing(Zhongyuan University of Technology,Zhengzhou 450007,China)  
The system design of Web server security scanning is presented in connection with research of Web security vulnerabilities.Specific implementation of the vulnerability scan function is described in detail on IIS web server.The security of Web server system can be detected using the system.
【Fund】: 河南省科技攻关项目(092102310038)
【CateGory Index】: TP393.05
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 LV Zhen-bang,ZHANG Jun-cai,ZHANG Jun (Aeronautical Computing Technique Research Institute, Xian 710068,China );Research on Network Security Leak Scan and Vulnerability Analysis[J];Aeronautical Computer Technique;2005-02
Chinese Journal Full-text Database 3 Hits
1 LI Wei College of Engineering,Graduate University of Chinese Academy of Sciences,Beijing 100049,China;Study on application of data mining technology in vulnerability scanning system[J];Computer Engineering and Applications;2008-30
2 YU Jie1,LI Zhou-jun2,ZHANG Yu-bing3,LI Qiang2(1.School of Computer Science,National University of Defense Technology,Changsha 410073;2.School of Computer Science and Engineering,Beihang University,Beijing 100083;3.China Information Technology Security Certification Center,Beijing 100089,China);Research on the Scenario of the Active Scanning of Web Vulnerability[J];Computer Engineering & Science;2010-03
3 Liu Xingjun Zhong Huiqiu(Dongguan University of Technology,Dongguan 523000,China);Brief Analysis on System Integration Technique of Computer Network System[J];Value Engineering;2011-12
China Proceedings of conference Full-text Database 1 Hits
1 Gong Xiaogang (Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University Of Posts and Telecommunications,Beijing 100876);Research on Network Vulnerability Scanning Technology[A];[C];2010
Chinese Journal Full-text Database 1 Hits
1 SHEN Shou-zhong1,2,ZHANG Yu-qing2 (1. Key Lab of Computer Networks and Information Security,Ministry of Education,Xidian University,Xi'an 710071; 2. National Computer Network Intrusion Protection Center,Graduate University of Chinese Academy of Sciences,Beijing 100043);Design and Implementation of XSS Vulnerability Detection Tool Based on Crawler[J];Computer Engineering;2009-21
【Secondary References】
Chinese Journal Full-text Database 1 Hits
1 WANG Feng,HU Da-hui(Information Management Department,Southwest University,Rongchang 402460,China);Security issues and prevention measures for agricultural information system[J];Guangdong Agricultural Sciences;2012-21
【Secondary Citations】
Chinese Journal Full-text Database 6 Hits
1 QIAO Pei-li, WANG Chun-ying, ZHANG Jun (Computer & Control College, Harbin Univ. Sci. Tech., Harbin 150080, China);Application and Research on CVE Vulnerability Database[J];Journal of Harbin University of Science and Technology;2004-05
2 Wang Yuchen;Principle of System Vulnerability and the Analyse of Attack[J];Computer Engineering and Applications;2001-03
3 SHAN Guodong,DAI Yingxia,WANG Hang (State key Lab of Information Security,Graduate School of USTC, Beijing 100039);Study on Computer Vulnerability Taxonomy[J];Computer Engineering;2002-10
4 LIU Bo,LIU Hui,HU Hua-ping,HUANG Zun-guo (School of Computer Science, National University of Defense Technology, Changsha 410073, China);The Design, Implementation and Application of a Computer Vulnerability Database System[J];Computer Engineering & Science;2004-07
5 PU Qing (University of Science & Technology of China, Hefei 230052, China);Design and Implementation of a Datagrams Retransmission Timeout Based OS Fingerprinting Technique[J];Mini-micro Systems;2005-04
6 LIU Hai-yan YANG Hong-lu;Network Based Vulnerability Scanning Technique[J];Journal of Armored Force Engineering Institute;2003-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved