Research of security vulnerability in the computer network

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In order to solve the problem of security vulnerability in the computer network radically, it was studied for the cause of vulnerability. Solving scheme was put forward aim at one kind of vulnerability, that is, by the special scan and encryption techniques, it makes attacker can't bypass its access control. In this way, it can avoid the vulnerability caused by the error of access verification. Finally, it pointed out that the method solving vulnerability problem according to the cause of vulnerability will be the development trend to study the vulnerability.

Original languageEnglish
Title of host publication2010 International Conference on Biomedical Engineering and Computer Science, ICBECS 2010
DOIs
StatePublished - 2010
Event2010 International Conference on Biomedical Engineering and Computer Science, ICBECS 2010 - Wuhan, China
Duration: 23 Apr 201025 Apr 2010

Publication series

Name2010 International Conference on Biomedical Engineering and Computer Science, ICBECS 2010

Conference

Conference2010 International Conference on Biomedical Engineering and Computer Science, ICBECS 2010
Country/TerritoryChina
CityWuhan
Period23/04/1025/04/10

Keywords

  • Access control
  • Access verification
  • Encrypt
  • Scan
  • Security vulnerability
  • System security

Fingerprint

Dive into the research topics of 'Research of security vulnerability in the computer network'. Together they form a unique fingerprint.

Cite this