{"title":"Reflection of Network Security Caused by a Wheel","authors":"Ruan Hong-Wei, Li Hua, Ao Teng-He, Wu Cheng-yong","doi":"10.1109/ICCTD.2009.49","DOIUrl":null,"url":null,"abstract":"Starting from the popular application of JNLP protocol in the network flow monitor products, through the analysis of security issues, this article presents reflection of current network security for industry to explore and improve.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"121 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Computer Technology and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTD.2009.49","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Starting from the popular application of JNLP protocol in the network flow monitor products, through the analysis of security issues, this article presents reflection of current network security for industry to explore and improve.