Research on key technology of vulnerability threat classification

In order to solve the vulnerability assessment problem of vulnerability management,three attribute groups were selected to qualitatively evaluate vulnerability threat.After the selection of vulnerability attributes,analytic hierarchy process method was used to establish vulnerability classification...

Full description

Saved in:
Bibliographic Details
Main Authors: Qi-xu LIU, Chong-bin ZHANG, Yu-qing ZHANG, Bao-feng ZHANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2012-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.011/
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items