[1] |
[EB/OL].
|
[2] |
[EB/OL].
|
[3] |
XIE Y C , AIKEN A . Static detection of security vulnerabilities in scripting languages[A]. 15th USENIX Security Symposium[C]. 2006. 179-192.
|
[4] |
Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution[EB/OL]. .
|
[5] |
彭亚发, 陈华 . 基于系统漏洞扫描和防病毒技术的网络安全的设计[J]. 商情, 2013,(12): 261-263. PENG Y F , CHEN H . Network security design based on system vulnerability scanning and anti-virus technology[J]. Shangqing, 2013,12: 261-263.
|
[6] |
陈俊华 . 网络漏洞扫描系统研究与设计[J]. 信息网络安全, 2013,(5): 64-66. CHEN J H . Network vulnerability scanning system research and design[J]. Netinfo Security, 2013,(5): 64-66.
|
[7] |
FONSECA J , SEIXAS N , VIEIRA M ,et al. Analysis of field data on Web security vulnerabilities[J]. IEEE Transactions Dependable and Secure Computing, 2014,11(2): 89-100.
|
[8] |
SHAHRIAR H . Security vulnerabilities and mitigation techniques of web applications[A]. The 6th International Conference on Security of Information and Networks[C]. Aksaray,Turkey, 2013. 459-459.
|
[9] |
LI D , HONG X , WITT D . ProtoGENI,a prototype GENI under security vulnerabilities:an experiment-based security study[J]. IEEE Systems Journal, 2013,7(3): 478-488.
|
[10] |
RISTOV S , GUSEV M , DONEVSKI A . OpenStack cloud security vulnerabilities from inside and outside[A]. The Fourth International Conference on Cloud Computing,GRIDs,and Virtualization[C]. Valencia,Spain, 2013. 101-107.
|