期刊文献+
共找到30篇文章
< 1 2 >
每页显示 20 50 100
关于《是C语言的“漏洞”吗?》一文的再商榷 被引量:1
1
作者 袁志民 《电脑开发与应用》 2004年第6期48-48,共1页
关键词 《是C语言的“漏洞”吗?》 李敏 C语言 期刊 王正山 《关于(是C语言的“漏洞”吗?)一文的商榷》
下载PDF
从内部审计角度谈防范高校经济“漏洞”的对策
2
作者 张佳春 陈月圆 《现代商业》 2009年第4期234-,233,共2页
论文针对目前制约高校发展的各种复杂问题,指出:防范高校经济工作中的"漏洞"的关键,是建立适应新时期高校发展的审计监督体制,充分发挥内部审计的防护性功能。
关键词 内部审计 高校 经济“漏洞”对策
下载PDF
探析高考选择题中的“漏洞”
3
作者 李伟康 《物理通报》 2015年第2期81-83,共3页
选择题在高考试卷中占有较大的比重,因此受到师生的普遍重视.选择题不仅对考生的能力要求较高,而且对知识的要求也较为全面.笔者仅通过对部分高考选择题"漏洞"的分析,试图探究高考命题的意图,指导实际中的教与学.
关键词 高考选择题 “漏洞” 选拔
下载PDF
逆向选择还是制度“漏洞”:全民医保下的不连续参保行为研究 被引量:13
4
作者 王昭茜 仇雨临 《兰州学刊》 CSSCI 2021年第6期124-138,共15页
虽然我国已实现基本医疗保险全民覆盖,但实践中有部分群体选择从基本医保制度中退出,全民医保覆盖具有其不稳定性。文章运用中国家庭追踪调查(CFPS)的数据分析在全民医保下部分群体参保中断的现象,并从逆向选择与制度设计可能的“漏洞... 虽然我国已实现基本医疗保险全民覆盖,但实践中有部分群体选择从基本医保制度中退出,全民医保覆盖具有其不稳定性。文章运用中国家庭追踪调查(CFPS)的数据分析在全民医保下部分群体参保中断的现象,并从逆向选择与制度设计可能的“漏洞”两方面探讨影响参保中断的因素。研究发现约有5%的参保者选择从原有的保障制度中退出,逆向选择和制度性因素均能部分解释这一行为,但自愿性的参保原则、待遇水平与个人负担、组织管理效率等制度设计因素,对个人不连续参保行为的解释力更强。因此,需要优化基本医保的制度设计、激励机制与治理结构,实现从基本医疗保险全民覆盖到全民稳定覆盖。 展开更多
关键词 全民医保 不连续参保 逆向选择 医疗保险制度“漏洞”
下载PDF
关于《是C语言的“漏洞”吗?》一文的商榷 被引量:1
5
作者 王正山 《电脑开发与应用》 2003年第9期F002-F002,F003,共2页
关键词 C语言 程序设计语言 源程序 Scanf( )函数 《是C语言的“漏洞”吗?》
下载PDF
找寻没有“漏洞”的浏览器——四款主流浏览器的安全测试与设置
6
作者 展曦 《电子制作.电脑维护与应用》 2004年第9期4-8,共5页
当所有媒体的镁光灯都聚焦在IE浏览器漏洞上时,习惯于使用IE的你会怎样抉择呢?是更换新的浏览器?还是为你的IE做好防范升级措施,继续使用?
关键词 “漏洞” 浏览器 安全问题 OPERA MOZILLA NETSCAPE TouchNet
下载PDF
国际学界对康德《遗著》研究综述 被引量:1
7
作者 袁建新 罗芙蓉 《湘潭大学学报(哲学社会科学版)》 CSSCI 北大核心 2012年第1期109-112,共4页
《遗著》是国际学界研究热点。研究主要集中在所谓"过渡"问题、"漏洞"问题及其相互关系上。国际学界关于"过渡"的基本观念及其起源问题存在五种观点;关于"漏洞"问题及其与"过渡"问... 《遗著》是国际学界研究热点。研究主要集中在所谓"过渡"问题、"漏洞"问题及其相互关系上。国际学界关于"过渡"的基本观念及其起源问题存在五种观点;关于"漏洞"问题及其与"过渡"问题的关系,也有四种不同的看法。这些研究表明,必须联系《纯粹理性批判》等来理解《遗著》。解释《遗著》对重解康德哲学具有重要意义。 展开更多
关键词 康德 〈遗著〉 “过渡” “漏洞”
下载PDF
Optimal configuration of firewall, IDS and vulnerability scan by game theory 被引量:7
8
作者 赵柳榕 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2011年第2期144-147,共4页
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash... The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail. 展开更多
关键词 economics of information systems FIREWALL intrusion detection system (IDS) vulnerability scan securityportfolio strategy
下载PDF
构建高中数学创新教学思维的教学设计分析
9
作者 朱思文 《数学学习与研究》 2012年第11期45-45,共1页
本文主要从以下四个方面具体说明高中数学教学方法如何创新:要善于设置"漏洞",让学生体验成功;要努力探求解题新思路;要不断加强对教学的方式、方法的拓展研究;要重视加强对学生的拓展研究.
关键词 设置“漏洞” 体验成功 探求新思路 拓展研究
下载PDF
通过管理挖潜 提高项目效益
10
作者 颜俊华 温晓梅 《江苏建材》 2015年第5期54-57,共4页
根据近年施工项目管理体会和经验,结合几个管理工具及方法的应用,从强化全员成本效益理念、"漏洞"管理、数据库运用、分包管理和与业主关系处理等方面,探讨如何进行管理挖潜,以达到实现施工项目利润增长的目的。
关键词 管理挖潜 成本效益 “漏洞”管理 BIM技术 人际关系
下载PDF
多源卫星影像二次联合平差技术应用
11
作者 刘旺生 王佑武 李崇伟 《甘肃科技》 2016年第7期30-32,共3页
卫星遥感影像中山体阴影、云雾遮挡、雪山水体反光和摄影"漏洞"等影像缺陷严重影响和制约立体测图的效率和成果精度。本论述结合项目实践,介绍了综合利用多源卫星影像二次联合平差的技术方法。通过对实验成果数据精度分析和... 卫星遥感影像中山体阴影、云雾遮挡、雪山水体反光和摄影"漏洞"等影像缺陷严重影响和制约立体测图的效率和成果精度。本论述结合项目实践,介绍了综合利用多源卫星影像二次联合平差的技术方法。通过对实验成果数据精度分析和类似工程实践应用,此方法技术可靠,能够有效解决此类问题。 展开更多
关键词 多源卫星影像 影像“漏洞” 二次联合平差 精度
下载PDF
Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks 被引量:3
12
作者 Jiang Qi Ma Zhuo +1 位作者 Ma Jianfeng Li Guangsong 《China Communications》 SCIE CSCD 2012年第10期103-111,共9页
In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the pos... In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks. 展开更多
关键词 AUTHENTICATION ANONYMITY smart card untraceabiliy WSNS
下载PDF
Assessment of Snow Cover Vulnerability over the Qinghai-Tibetan Plateau 被引量:4
13
作者 Lijuan Ma Dahe Qin +2 位作者 Lingen Bian Cunde Xiao Yong Luo 《Advances in Climate Change Research》 SCIE 2011年第2期93-100,共8页
By using daily air temperature and precipitation data, and the weather phenomena data of daily snowfall from 98 meteorological stations over the Qinghai-Tibetan Plateau (QTP), this paper performs an "at-risk" eval... By using daily air temperature and precipitation data, and the weather phenomena data of daily snowfall from 98 meteorological stations over the Qinghai-Tibetan Plateau (QTP), this paper performs an "at-risk" evaluation on snowfall and accumulated snow over the QTP under current climate situation and future climate warming condition. When rainfall, snowfall, or accumulated snow weather phenomena occur, critical values are determined based on dally air temperature and precipitation for current climate conditions. Air temperature of 0 ℃ is defined as the critical value of temperature for rainfall or snowfall, while 0 ℃ air temperature and 4.0 mm (autumn) or 3.0 mm (spring) snowfall amounts are defined as the critical values for accumulated snowfall. Analyses based on the above critical values disclose that under current climate condition, stations with "at-risk" accumulated snow account for 33% and 36% of all stations, and the "at-risk" snowfall stations reach 78% and 81% in autumn and spring, respectively. Spatially, most stations with "at-risk" accumulated snow are located on the southern and eastern edge of the QTP, and stations with "at-risk" snowfall are also apparent at the northern edge. If the air temperature increases by 2.5 ℃ in 2050, only the snowfall at a few "at-risk" snowfall stations will transform into rainfall, while most "at-risk" accumulated snow stations will face the problem that snowfall is hardly accumulated. Additionally, most stations will become "at-risk" accumulated snow stations, indicating that both the snow depth and the snow cover duration will decline in most areas of the QTP, including a delay of the start date and an advancing of the end date of snow cover. 展开更多
关键词 Qinghai-Tibetan Plateau snow cover AT-RISK SNOWFALL VULNERABILITY climate change
下载PDF
Building Vulnerability Evaluation in Landslide Deformation Phase 被引量:2
14
作者 CHEN L.X. YIN K.L. DAI Y.X. 《Journal of Mountain Science》 SCIE CSCD 2011年第2期286-295,共10页
Building vulnerability evaluation is important in the risk assessment on earthquake and flood hazards. But for landslide hazard, it is also a very important part for the people in buildings. Most discussions or resear... Building vulnerability evaluation is important in the risk assessment on earthquake and flood hazards. But for landslide hazard, it is also a very important part for the people in buildings. Most discussions or researches about building vulnerability are for landslide failure, few for landslide in deformation phase. For this objective, this paper discussed about building vulnerability evaluation using Zhaoshuling landslide as an example Zhaoshuling landslide named located in the Three Gorges Reservoir Area, China. After a field survey on the geological condition of landslide, detailed field investigation on the buildings' location and structure is carried out. To get landslide surface deformation, numerical simulation method is used under the combining condition of water fluctuation and rainfall. Then building deformation and probable damage degree is analyzed according to landslide surface deformation and the relative theory in mining. Based on the national standard building damage classification system, the vulnerability of all the buildings on the landslide is semi-quantitatively evaluated. 展开更多
关键词 LANDSLIDE Vulnerability evaluation BUILDING RISK
下载PDF
Flood Vulnerability Assessment: A Multiscale, Multitemporal and Multidisciplinary Approach 被引量:1
15
作者 Edna M. Rodriguez-Gaviria Veronica Botero-Fernadez 《Journal of Earth Science and Engineering》 2013年第2期102-108,共7页
Recent catastrophic events related to floods in Colombia reveal again the situation of disaster as a development issue not solved in the country. It is necessary to analyze in more detail the areas under threat and th... Recent catastrophic events related to floods in Colombia reveal again the situation of disaster as a development issue not solved in the country. It is necessary to analyze in more detail the areas under threat and their respective vulnerability to the different mechanisms can generate flooding events and make adjustments in the assessment of disaster risks for the appropriate decision-making at local, regional and national levels. This paper presents a research project in its first phase, whose main objective is to develop a methodology for vulnerability assessment from a multiscale, multitemporal and multidisciplinary perspectives, combining the use of indicators and a spatial information system to analyze exposure and vulnerability at regional and local level in specific areas. This methodological tool will also enable local and regional authorities to identify the most appropriate strategies to reduce vulnerability and adaptation options, and make better decisions in assessing disaster risk. The information generated in this study will contribute to public policy action structured to correct short- and medium-term situations of actual or potential vulnerability, which can also be used in other activities of territorial and environmental planning, developing technology transfer activities and training associated with the research project in the service of the authorities and communities. Results obtained of the vulnerability analysis for a Colombian study area will relate to the hazards obtained in a parallel project whose goal is to identify the best risk management strategies through the development of GIS (geographic information system)-based scenarios for different risk and vulnerability reduction options. 展开更多
关键词 Floods hazards developing countries GIS DISASTER indicators.
下载PDF
An Immunization Strategy for Social Network Worms Based on Network Vertex Influence
16
作者 YANG Wei WANG Haibo YAO Yu 《China Communications》 SCIE CSCD 2015年第7期154-166,共13页
Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and i... Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms. 展开更多
关键词 social network worm immunization strategy network security worm propagation worm containment
下载PDF
RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow
17
作者 Wang Yong Gu Dawu +2 位作者 Xu Jianping Wen Mi Deng Liwen 《China Communications》 SCIE CSCD 2010年第6期10-16,共7页
Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Int... Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Integer Checking via Buffer overflow). Our approach includes decompile execute file to assembly language; debug the execute file step into and step out; locate the overflow points and checking buffer overflow caused by integer overflow. We have implemented our approach in three buffer overflow types: format string overflow, stack overflow and heap overflow. Experiments results show that our approach is effective and efficient. We have detected more than 5 known integer overflow vulnerabilities via buffer overflow. 展开更多
关键词 integer overflow format string overflow buffer overflow
下载PDF
Urban Disaster Prevention Shelter VulnerabilityEvaluation Considering Road Network Characteristics
18
作者 Cheng-An Tai Yung-Lung Lee 《Journal of Civil Engineering and Architecture》 2013年第5期609-615,共7页
Large-scale national disasters have recently occurred worldwide, causing tremendous damage to life and property. Therefore, urban safety has become a critical issue, and disaster prevention and mitigation are also con... Large-scale national disasters have recently occurred worldwide, causing tremendous damage to life and property. Therefore, urban safety has become a critical issue, and disaster prevention and mitigation are also considered in urban development and infrastructure construction. When earthquake disasters occur, road networks play major roles in rescue activity for responding to urban damage. The urban-disaster prevention spatial system attempts to mitigate hazards by considering shelters, routes for evacuation and rescue and necessary logistics. A literature review shows numerous studies related to a disaster-prevention shelter survey before or after hazards, however, they are less concerned with the reliability of shelter evaluation. This study assesses shelter evaluation by considering road networks. The authors construct 10 selected indices individually related to road networks. Three integrated composite indices are established to explain planned-shelter risks using the Arc GIS diagram of a spatial concept of an urban-planning review process. The relationship between shelters and evacuation/rescue routes is important for disaster-prevention planning. This survey investigates the factors of road networks, fire engine rescue routes, fire station location and road/population density for vulnerability evaluations. 展开更多
关键词 Geographic information system urban safety road networks shelter.
下载PDF
Diminutive Usage of Internet Banking: A Malaysian Case Study
19
作者 Arasu Raman 《Computer Technology and Application》 2013年第7期380-386,共7页
As the opportunities offered, most individuals and businesses feel that E-banking energies are great. Thus, threats are unavoidable to banks if they fail to identify consequences and vulnerabilities accompanying e-ban... As the opportunities offered, most individuals and businesses feel that E-banking energies are great. Thus, threats are unavoidable to banks if they fail to identify consequences and vulnerabilities accompanying e-banking practices. The usage rate of e-banking in a top international commercial bank in Malaysia is rather diminutive compare to its other bases in countries like Singapore, China and India. Interestingly, it is on decreasing mode year by year. This study aimed to offer a good set of information of the factors influencing low usage and possibilities to suggest ways to increase the usage among the bank customers. In this study, a comprehensive survey data gathering were used to collect and analyze the respondents and results indicate that ease of use is the most significant contributor to the low usage. 204 valid feedbacks were obtained from the SCM bank's customers, with the research indicating that e-banking still has a gap to fill between customers, the bank and the e-system in maximizing the desire of existing clients to go over the net. 展开更多
关键词 Strategic information systems management internet banking electronic marketing.
下载PDF
Research on Key Technology of Web Vulnerability Detection System Based on Cloud Environment
20
作者 Zhang Zhen 《International Journal of Technology Management》 2013年第12期121-124,共4页
In the light of the defect of web vulnerability detection system, combined with the characteristics of high efficient and sharing in the cloud environment, a design proposal is presented based on cloud environment, wh... In the light of the defect of web vulnerability detection system, combined with the characteristics of high efficient and sharing in the cloud environment, a design proposal is presented based on cloud environment, which analyses the key technology of gaining the URL, task allocation and scheduling and the design of attack detection. Experiment shows its feasibility and effectiveness in this paper. 展开更多
关键词 cloud technology web crawler task allocation and scheduling detection of SQL injection XSS detection
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部