Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Zhongyuan University of Technology》 2011-01
Add to Favorite Get Latest Update

Research on Web Server Security Scanning in Network Security Evaluation System

XIA Min-jie,XIA Bing(Zhongyuan University of Technology,Zhengzhou 450007,China)  
The system design of Web server security scanning is presented in connection with research of Web security vulnerabilities.Specific implementation of the vulnerability scan function is described in detail on IIS web server.The security of Web server system can be detected using the system.
【Fund】: 河南省科技攻关项目(092102310038)
【CateGory Index】: TP393.05
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 1 Hits
1 LV Zhen-bang,ZHANG Jun-cai,ZHANG Jun (Aeronautical Computing Technique Research Institute, Xian 710068,China );Research on Network Security Leak Scan and Vulnerability Analysis[J];Aeronautical Computer Technique;2005-02
【Co-citations】
Chinese Journal Full-text Database 2 Hits
1 LI Wei College of Engineering,Graduate University of Chinese Academy of Sciences,Beijing 100049,China;Study on application of data mining technology in vulnerability scanning system[J];Computer Engineering and Applications;2008-30
2 YU Jie1,LI Zhou-jun2,ZHANG Yu-bing3,LI Qiang2(1.School of Computer Science,National University of Defense Technology,Changsha 410073;2.School of Computer Science and Engineering,Beihang University,Beijing 100083;3.China Information Technology Security Certification Center,Beijing 100089,China);Research on the Scenario of the Active Scanning of Web Vulnerability[J];Computer Engineering & Science;2010-03
【Secondary Citations】
Chinese Journal Full-text Database 7 Hits
1 QIAO Pei-li, WANG Chun-ying, ZHANG Jun (Computer & Control College, Harbin Univ. Sci. Tech., Harbin 150080, China);Application and Research on CVE Vulnerability Database[J];Journal of Harbin University of Science and Technology;2004-05
2 Wang Yuchen;Principle of System Vulnerability and the Analyse of Attack[J];Computer Engineering and Applications;2001-03
3 SHAN Guodong,DAI Yingxia,WANG Hang (State key Lab of Information Security,Graduate School of USTC, Beijing 100039);Study on Computer Vulnerability Taxonomy[J];Computer Engineering;2002-10
4 LIU Bo,LIU Hui,HU Hua-ping,HUANG Zun-guo (School of Computer Science, National University of Defense Technology, Changsha 410073, China);The Design, Implementation and Application of a Computer Vulnerability Database System[J];Computer Engineering & Science;2004-07
5 LI Xiao - hui, ZHANG Xi - hong ( Department of Control Engineering, Ordnance Engineering College, Shijiazhuang 050003, China);Study of Network Port Scanning & Leak Detection[J];Journal of Ordnance Engineering College;2003-01
6 PU Qing (University of Science & Technology of China, Hefei 230052, China);Design and Implementation of a Datagrams Retransmission Timeout Based OS Fingerprinting Technique[J];Mini-micro Systems;2005-04
7 LIU Hai-yan YANG Hong-lu;Network Based Vulnerability Scanning Technique[J];Journal of Armored Force Engineering Institute;2003-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved