Computer Science ›› 2007, Vol. 34 ›› Issue (12): 85-90.
Previous Articles Next Articles
MAO Han-Dong CHENG Feng ZHANG Wei-Ming ZHU Cheng SONG Jun-Feng (School of Information System and Management, NUDT, Changsha 410073)
Online:
Published:
Abstract: For establishing the knowledge infrastructure of network security assessment and gaining the knowledge superiority, in this paper, network exploit ontology is used as the knowledge infrastructure of network security assessment and NEOCA is proposed to con
Key words: Network security assessment, Network exploit, Ontology, Knowledge infrastructure
MAO Han-Dong CHENG Feng ZHANG Wei-Ming ZHU Cheng SONG Jun-Feng (School of Information System and Management, NUDT, Changsha 410073). [J].Computer Science, 2007, 34(12): 85-90.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2007/V34/I12/85
Cited