共 8 条
[1]
Tianjing vulnerability scanning and e-valuation system. Venustech Corporation. http://www.venustech.com.cn/products/tjing/ . 2003
[2]
Passive vulnerabili-ty scanning introduction. Renaud Deraison,Ron Gula,Todd Hayton. http://www.tenablesecu-rity.com/images/pdfs/passive-scanning-tenable.pdf . 2006
[3]
In-troduction to OVAL:a new language to determine the presence of software vulnerabilities. Matthew Wojcik,Tiffany Bergeron,Todd Wittbold,et al. http://oval.miter.org/documents/doc-03/intro/intro.html . 2004
[4]
List of issues that are fixed in Internet Explorer6service packs. http://support.microsoft.com/default.aspx?scid=kb;en-us;326489 . 2005
[5]
List of issues that are fixed in Internet Explorer6service packs. http://support.microsoft.com/default.aspx?scid=kb;en-us;326489 . 2005
[6]
ASP[P]. 韩国专利:KR20120130370A,2012-12-03
[7]
CERT/CC statistics1988-2006. CERT Coordination Center. http://www.cert.org/stats/cert-stats.html .
[8]
Vulnerability assessment. Internet Security SystemsTM. http://www.iss.net/find-products/vulnerability-as-sessment.php . 2004