Vulnerability Analysis of Intelligent Network System

Danfeng Yan, Fangchun Yang
{"title":"Vulnerability Analysis of Intelligent Network System","authors":"Danfeng Yan, Fangchun Yang","doi":"10.1109/NSWCTC.2009.27","DOIUrl":null,"url":null,"abstract":"All attacks come from the successful utilization of the vulnerabilities of the telecommunication network or systems by the attackers. So it is the first important thing to clear the vulnerability of certain network or system. The theoretic methods are available to analyze the shortcomings of network topology and actions. Lots of vulnerabilities are found by practical work. This paper analyzes and summarizes the vulnerabilities of intelligent network system from realization application cases. It is valuable to the father research and development work.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"146 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NSWCTC.2009.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

All attacks come from the successful utilization of the vulnerabilities of the telecommunication network or systems by the attackers. So it is the first important thing to clear the vulnerability of certain network or system. The theoretic methods are available to analyze the shortcomings of network topology and actions. Lots of vulnerabilities are found by practical work. This paper analyzes and summarizes the vulnerabilities of intelligent network system from realization application cases. It is valuable to the father research and development work.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
智能网络系统脆弱性分析
所有的攻击都来自于攻击者成功利用电信网络或系统的漏洞。因此,清除某个网络或系统的漏洞是重中之重。该理论方法可用于分析网络拓扑和动作的不足。在实际工作中发现了许多漏洞。本文从实现应用案例入手,分析总结了智能网络系统存在的漏洞。这对父亲的研发工作是有价值的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Hybrid Protocol for Password-Based Key Exchange in Three-party Setting A Range Query Model Based on DHT in P2P System Energy Minimization for Broadcasting Message in Wireless Sensor Networks Energy-aware AODV Routing for Ad Hoc Networks Improved Block Soft Feedback Equalization Based on Sequence Detection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1