请帮我查下这篇文章的EI检索号,

1个回答

  • Accession number:20101312814394

    Title:Feasibility study on COM plug-in technology in vulnerability scanner

    Authors:Su,Xiaoling1 ; Li,June2

    Author affiliation:1 College of Information Science and Engineering,Henan University of Technology,ZhengZhou,450001,China

    2 Computer Center,Wuhan University,Wuhan,430072,China

    Source title:ITME2009 - Proceedings 2009 IEEE International Symposium on IT in Medicine and Education

    Abbreviated source title:ITME - Proc.IEEE Int.Symp.IT Med.Educ.

    Monograph title:ITME2009 - Proceedings 2009 IEEE International Symposium on IT in Medicine and Education

    Issue date:2009

    Publication year:2009

    Pages:300-303

    Article number:5236412

    Language:English

    ISBN-13:9781424439294

    Document type:Conference article (CA)

    Conference name:2009 IEEE International Symposium on IT in Medicine and Education,ITME2009

    Conference date:August 14,2009 - August 16,2009

    Conference location:Ji'nan,China

    Conference code:79617

    Sponsor:IEEE Beijing Section; Wuhan University of Technology (WHUT); East China Normal University (ECNU); Birmingham City University (BCU); University of Southern Queensland (USQ)

    Publisher:IEEE Computer Society,445 Hoes Lane - P.O.Box 1331,Piscataway,NJ 08855-1331,United States

    Abstract:The paper analyzes plug-in technology ways to be used in vulnerability scanners at home and abroad.So far plug-in development in the vulnerability scanners has not arrived the unified standard.If the public standard is designed for plug-in in vulnerability scanners,it will add flexibility of write plug-in (not confined to special language).Plug-in is designed by system development staff.The terminal users on-line upgrade plug-in library similar to upgrade virus library.Combining with COM standard widespread used in Windows platform,the paper puts forth the designing idea of scanning master routine and the COM plug-in in the vunerability scanners,and verifies ideas.©2009 IEEE.

    Number of references:5

    Main heading:Scanning

    Controlled terms:Information technology - Standardization - Viruses

    Uncontrolled terms:Feasibility studies - Plug-in technology - Plug-ins - System development - Vulnerability scanner - Vunerability - Windows platform

    Classification code:461.9 Biology - 723.5 Computer Applications - 741.3 Optical Devices and Systems - 801.2 Biochemistry - 902.2 Codes and Standards - 903 Information Science

    DOI:10.1109/ITIME.2009.5236412

    Database:Compendex

    Compilation and indexing terms,© 2009 Elsevier Inc.