Vulnerabilities相关论文
In order to deeply understand the security features of Windows and explore the flaws of Windows UAC mechanism,the origin......
Due to the deep integration of infor-mation technology and operational technology, net-worked control systems are experi......
Pickle漏洞是由于没有安全使用Python模块Pickle漏洞而产生的。由于Python语言的跨平台性,shellcode制作的简易性,使得漏洞的危害......
入侵检测系统IDS(Intrusion Detection System)是继传统安全保护措施后新一代的安全保障技术,但目前许多研究者仅局限于自动入侵检测......
利用“Windows图元缓;中区溢出漏洞”的入侵系统的“wmf”文件有别与传统的“.cxe”文件,这是其最大的危害性。攻击代码隐藏在图形文......
随着以教育信息化带动教育现代化的时代要求,各种应用系统和平台也越来越多,高校加大了数据中心的建设力度。文章从数据中心现状出......
在移动Adhoc网络环境下运用移动代理系统,极易受到DoS攻击,以往的解决方案都有一定的局限性,就此问题描述了一种新的安全解决方案,......
近几年,整数溢出漏洞数量居高不下,危害性较大.目前,漏洞分析定位的方法仅在补丁自动生成或漏洞触发样本文件自动生成中有所涉及,......
电子政务系统安全保护主流技术防火墙、IDS、IPS、VPN、数字证书、数据备份与恢复等日趋完善,操作系统、应用软件、网站应用方面的......
Ethernet-based Passive Optical Network(EPON) is considered a very promising solution for the first mile problem of the n......
在分析Stuxnet蠕虫病毒的基础上,介绍该病毒所利用的MS10_046系统漏洞原理及机制。利用VMWare和MSF(MetaSploit FrameWork)搭建局域......
摘要:该文从WEB应用程序的漏洞、威胁和攻击的角度分析网络应用的安全及其防范措施,使网络及WEB应用程序有更强的防御攻击的能力。......
随着随机数产生算法的优化和安全程度的不断提升,弱随机数漏洞已成为信息安全研究的一个重点。该文阐述了三种随机数生成机制的特点......
在公开密钥基础设施(PKI Public key infrastructure)基础上分析了PKI的脆弱性和不足,从应用角度针对这些缺陷和不足提出了对策和建......
可编程逻辑控制器在工业控制系统中扮演着重要的角色,但近年来公开的PLC安全漏洞却呈现逐年增加的态势。针对PLC开展漏洞防御技术......
Due to the deep integration of information technology and operational technology,networked control systems are experienc......
基于规则的脆弱性分析技术依赖于对系统组件间关系的经验知识,系统复杂性、竞态条件、隐含假设等因素,使规则的生成异常困难.该文......
Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity,which opens up ne......
摘要:随着信息技术的不断发展,政府门户网站在阳光政务中起到了至关重要的作用。各级政府机关的信息和政策发布、行政服务、意见征集......
Development of Vulnerability through the DRASTIC Method and Geographic Information System (GIS) (Cas
The vulnerability map is a fondamental document for the development of territory. It basically allows you to guide the s......
Key Vulnerabilities and Limitations in the Management of Hazardous Waste and Its Disposal: A Checkli
From an environmental protection perspective, the crucial issues pertaining to the policing of hazardous waste relate to......
现在的计算机网络技术发展很快,就显得网络安全问题日益突出起来。本文从计算机的网络安全与技术防范来展开,阐述了目前常见的几种网......
针对分布式系统规模愈发庞大的现状,提出故障搜索策略——脆弱点辅助识别算法,结合常见故障模式的故障注入模型,研究基于脆弱点分......
Security risk assessment framework provides comprehensive structure for security risk analysis that would help uncover s......
Security risk assessment framework provides comprehensive structure for security risk analysis that would help uncover s......
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unaut......
Habitat protection for sensitive species: Balancing species requirements and human constraints using
Vertebrates have particular habitat needs as a function of life cycle and reproductive stage. This paper uses four speci......
The present paper is concerned with potential cyberterrorist threats which the objects of national energy infrastructure......