Research on key technology of vulnerability threat classification
In order to solve the vulnerability assessment problem of vulnerability management,three attribute groups were selected to qualitatively evaluate vulnerability threat.After the selection of vulnerability attributes,analytic hierarchy process method was used to establish vulnerability classification...
Saved in:
Main Authors: | Qi-xu LIU, Chong-bin ZHANG, Yu-qing ZHANG, Bao-feng ZHANG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.011/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Design and implementation of national security vulnerability database
by: ZHANG Yu-qing1, et al.
Published: (2011-01-01) -
Research on OLE object vulnerability analysis for RTF file
by: De-guang LE, et al.
Published: (2016-01-01) -
Research and practice of network security threat intelligence management system for power enterprise
by: Weixiong CHEN, et al.
Published: (2022-07-01) -
A general attack model based on Android system vulnerability
by: Xihai DENG, et al.
Published: (2016-10-01) -
Research on context-aware Android application vulnerability detection
by: Jiawei QIN, et al.
Published: (2021-11-01)