搜索筛选:
搜索耗时1.0734秒,为你在为你在102,285,761篇论文里面共找到 1 篇相符的论文内容
类      型:
[会议论文] 作者:ZHAO Xianghui,PENG Yong,ZHAI Zan,Jin Yi,YAO Yuangang, 来源:2015中国计算机网络安全年会 年份:2015
For the question of information security vulnerabilities discovery,the parallel vulnerabilities discovery method is given based on the CAPEC,CWE,CVE and other open source database and text mining.Firs...
相关搜索: