Computer Science ›› 2007, Vol. 34 ›› Issue (12): 85-90.

Previous Articles     Next Articles

MAO Han-Dong CHENG Feng ZHANG Wei-Ming ZHU Cheng SONG Jun-Feng (School of Information System and Management, NUDT, Changsha 410073)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: For establishing the knowledge infrastructure of network security assessment and gaining the knowledge superiority, in this paper, network exploit ontology is used as the knowledge infrastructure of network security assessment and NEOCA is proposed to con

Key words: Network security assessment, Network exploit, Ontology, Knowledge infrastructure

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!