{"title":"车轮引发的网络安全反思","authors":"Ruan Hong-Wei, Li Hua, Ao Teng-He, Wu Cheng-yong","doi":"10.1109/ICCTD.2009.49","DOIUrl":null,"url":null,"abstract":"Starting from the popular application of JNLP protocol in the network flow monitor products, through the analysis of security issues, this article presents reflection of current network security for industry to explore and improve.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Reflection of Network Security Caused by a Wheel\",\"authors\":\"Ruan Hong-Wei, Li Hua, Ao Teng-He, Wu Cheng-yong\",\"doi\":\"10.1109/ICCTD.2009.49\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Starting from the popular application of JNLP protocol in the network flow monitor products, through the analysis of security issues, this article presents reflection of current network security for industry to explore and improve.\",\"PeriodicalId\":269403,\"journal\":{\"name\":\"2009 International Conference on Computer Technology and Development\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Computer Technology and Development\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCTD.2009.49\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Computer Technology and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTD.2009.49","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Starting from the popular application of JNLP protocol in the network flow monitor products, through the analysis of security issues, this article presents reflection of current network security for industry to explore and improve.