...
首页> 外文期刊>Applied stochastic models in business and industry >Cyber vulnerability maintenance policies that address the incomplete nature of inspection
【24h】

Cyber vulnerability maintenance policies that address the incomplete nature of inspection

机译:网络漏洞维护策略,解决了检查的不完全性质

获取原文
获取原文并翻译 | 示例
           

摘要

Abstract >In cybersecurity, incomplete inspection, resulting mainly from computers being turned off during the scan, leads to a challenge for scheduling maintenance actions. This article proposes the application of partially observable decision processes to derive cost‐effective cyber maintenance actions that minimize total costs. We consider several types of hosts having vulnerabilities at various levels of severity. The maintenance cost structure in our proposed model consists of the direct costs of maintenance actions in addition to potential incident costs associated with different security states. To assess the benefits of optimal policies obtained from partially observable Markov decision processes, we use real‐world data from a major university. Compared with alternative policies using simulations, the optimal control policies can significantly reduce expected maintenance expenditures per host and relatively quickly mitigate the most important vulnerabilities. </abstract> </span> <span class="z_kbtn z_kbtnclass hoverxs" style="display: none;">展开▼</span> </div> <div class="translation abstracttxt"> <span class="zhankaihshouqi fivelineshidden" id="abstract"> <span>机译:</span><Abstract Type =“Main”XML:Lang =“EN”XML:ID =“ASMB2487-ABS-ABS-0001”> <标题类型=“main”>抽象</ title> >在网络安全中,检查检查,主要从扫描期间关闭计算机,导致调度维护操作的挑战。本文提出适用部分可观察决策流程来推导成本有效的网络维护行动,以最大限度地降低总成本。我们考虑几种类型的宿主,在各种严重程度上具有漏洞。我们拟议模型中的维护成本结构包括除与不同安全国家相关的潜在事件成本之外的维护行动的直接成本。为了评估从部分可观察到的马尔可夫决策过程中获得的最佳政策的好处,我们使用来自一所重大大学的真实数据。与使用模拟的替代政策相比,最佳控制策略可以显着降低每个宿主的预期维护支出,并且相对迅速减轻最重要的漏洞。</ p> </摘要> </span> <span class="z_kbtn z_kbtnclass hoverxs" style="display: none;">展开▼</span> </div> </div> <div class="record"> <h2 class="all_title" id="enpatent33" >著录项</h2> <ul> <li> <span class="lefttit">来源</span> <div style="width: 86%;vertical-align: text-top;display: inline-block;"> <a href='/journal-foreign-19344/'>《Applied stochastic models in business and industry》</a> <b style="margin: 0 2px;">|</b><span>2019年第6期</span><b style="margin: 0 2px;">|</b><span>共21页</span> </div> </li> <li> <div class="author"> <span class="lefttit">作者</span> <p id="fAuthorthree" class="threelineshidden zhankaihshouqi"> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Liu Enhao&option=202" target="_blank" rel="nofollow">Liu Enhao;</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Allen Theodore T.&option=202" target="_blank" rel="nofollow">Allen Theodore T.;</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Roychowdhury Sayak&option=202" target="_blank" rel="nofollow">Roychowdhury Sayak;</a> </p> <span class="z_kbtnclass z_kbtnclassall hoverxs" id="zkzz" style="display: none;">展开▼</span> </div> </li> <li> <div style="display: flex;"> <span class="lefttit">作者单位</span> <div style="position: relative;margin-left: 3px;max-width: 639px;"> <div class="threelineshidden zhankaihshouqi" id="fOrgthree"> <p>Department of Integrated Systems Engineering College of EngineeringThe Ohio State UniversityColumbus Ohio;</p> <p>Department of Integrated Systems Engineering College of EngineeringThe Ohio State UniversityColumbus Ohio;</p> <p>Industrial and Systems EngineeringIndian Institute of Technology KharagpurKharagpur India;</p> </div> <span class="z_kbtnclass z_kbtnclassall hoverxs" id="zhdw" style="display: none;">展开▼</span> </div> </div> </li> <li > <span class="lefttit">收录信息</span> <span style="width: 86%;vertical-align: text-top;display: inline-block;"></span> </li> <li> <span class="lefttit">原文格式</span> <span>PDF</span> </li> <li> <span class="lefttit">正文语种</span> <span>eng</span> </li> <li> <span class="lefttit">中图分类</span> <span><a href="https://www.zhangqiaokeyan.com/clc/1147.html" title="应用数学">应用数学;</a></span> </li> <li class="antistop"> <span class="lefttit">关键词</span> <p style="width: 86%;vertical-align: text-top;"> <a style="color: #3E7FEB;" href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=cyber vulnerabilities&option=203" rel="nofollow">cyber vulnerabilities;</a> <a style="color: #3E7FEB;" href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=incomplete inspection&option=203" rel="nofollow">incomplete inspection;</a> <a style="color: #3E7FEB;" href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=partially observable Markov decision process (POMDP)&option=203" rel="nofollow">partially observable Markov decision process (POMDP);</a> </p> <div class="translation"> 机译:网络漏洞;检查检查;部分可观察的马尔可夫决策过程(POMDP); </div> </li> </ul> </div> </div> <div class="literature cardcommon"> <div class="similarity "> <h3 class="all_title" id="enpatent66">相似文献</h3> <div class="similaritytab clearfix"> <ul> <li class="active" >外文文献</li> <li >中文文献</li> <li >专利</li> </ul> </div> <div class="similarity_details"> <ul > <li> <div> <b>1. </b><a class="enjiyixqcontent" href="/journal-foreign-detail/0704022680022.html">Cyber vulnerability maintenance policies that address the incomplete nature of inspection</a> <b>[J]</b> . <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Liu Enhao&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Liu Enhao,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Allen Theodore T.&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Allen Theodore T.,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Roychowdhury Sayak&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Roychowdhury Sayak </a> <a href="/journal-foreign-19344/" target="_blank" rel="nofollow" class="tuijian_authcolor">Applied stochastic models in business and industry .</a> <span>2019</span><span>,第6期</span> </span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:网络漏洞维护策略,解决了检查的不完全性质</span> </p> </li> <li> <div> <b>2. </b><a class="enjiyixqcontent" href="/journal-foreign-detail/0704023715114.html">Siemens and TUV SUD join forces against cyber threats: Siemens and TUV SUD have come together to address the growing risk of cyberattacks on critical infrastructure by collaborating to provide digital safety and security assessments, as well as industrial vulnerability assessments to help global energy players identify asset risk and cybersecurity solutions</a> <b>[J]</b> . <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Mark Tisshaw&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Mark Tisshaw </a> <a href="/journal-foreign-25167/" target="_blank" rel="nofollow" class="tuijian_authcolor">Modern Power Systems: Communicating Power Technology Worldwide .</a> <span>2019</span><span>,第5期</span> </span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:西门子和TUV SUD加入Cyber威胁:西门子和TUV SUD通过合作提供数字安全和安全评估,以及帮助全球能源球员识别资产的工业脆弱性评估,以促进跨国基础设施的越来越危险的网络角落的风险。 风险和网络安全解决方案</span> </p> </li> <li> <div> <b>3. </b><a class="enjiyixqcontent" href="/academic-journal-foreign_the-washington-quarterly_thesis/0204120129840.html">A Strategic Cyber No-First-Use Policy? Addressing the US Cyber Strategy Problem</a> <b>[J]</b> . <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Schneider Jacquelyn&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Schneider Jacquelyn </a> <a href="/journal-foreign-14666/" target="_blank" rel="nofollow" class="tuijian_authcolor">The Washington Quarterly .</a> <span>2020</span><span>,第2期</span> </span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:战略网络无第一用政策?解决美国网络策略问题</span> </p> </li> <li> <div> <b>4. </b><a class="enjiyixqcontent" href="/academic-conference-foreign_meeting-193581_thesis/020513066931.html">A Sequential Inspection Policy for Incomplete Information with An Incomplete and Bayesian Selected Monitor</a> <b>[C]</b> . <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Takashi Satow&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Takashi Satow,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Hajime Kawai&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Hajime Kawai </a> <a href="/conference-foreign-193581/" target="_blank" rel="nofollow" class="tuijian_authcolor">Reliability and Quality in Design .</a> <span>2005</span> </span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:具有不完整和贝叶斯选择监视器的不完整信息的顺序检查策略</span> </p> </li> <li> <div> <b>5. </b><a class="enjiyixqcontent" href="/academic-degree-foreign_mphd_thesis/02061580481.html">Costly Inspections and Limited Abatement: The Efficiency of Automobile Inspection andMaintenance (I/M) Programs.</a> <b>[D] </b> . <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Giguere, Christopher Scott.&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Giguere, Christopher Scott. </a> <span>2017</span> </span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:昂贵的检查和有限的减排:汽车检查和维护(I / M)程序的效率。</span> </p> </li> <li> <div> <b>6. </b><a class="enjiyixqcontent" href="/academic-journal-foreign-pmc_detail_thesis/040007171339.html">Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User’s Dual Vulnerability Model of Cybercrime Victimization</a> <b>[O] </b> . <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Juan Herrero&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Juan Herrero,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Andrea Torres&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Andrea Torres,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Pep Vivas&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Pep Vivas,</a> <span>2021</span> </span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:智能手机成瘾和网络犯罪受害者在生活方式常规活动和自我控制理论的背景下:网络犯罪受害者的双重脆弱性模型</span> </p> </li> <li> <div> <b>7. </b><a class="enjiyixqcontent" href="/open-access_resources_thesis/01000125494678.html">Cyber vulnerability maintenance policies that address the incomplete nature of inspection</a> <b>[O] </b> . <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Enhao Liu&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Enhao Liu,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Theodore T. Allen&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Theodore T. Allen,</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=Sayak Roychowdhury&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">Sayak Roychowdhury </a> <span>2019</span> </span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:网络漏洞维护策略解决了检查的不完全性质</span> </p> </li> </ul> <ul style="display: none;"> <li> <div> <b>1. </b><a class="enjiyixqcontent" href="/academic-journal-cn_computer-programming-skills-maintenance_thesis/0201290100088.html">计算机信息系统维护与网络安全漏洞处理策略</a> <b>[J]</b> <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=王艳萍&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor"> . 王艳萍</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=宋春红&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">,宋春红</a> <span> <a href="/journal-cn-8872/" target="_blank" rel="nofollow" class="tuijian_authcolor"> . 电脑编程技巧与维护 </a> </span> <span> . 2021</span><span>,第006期</span> </span> </div> </li> <li> <div> <b>2. </b><a class="enjiyixqcontent" href="/academic-journal-cn_china-cio-news_thesis/0201291516675.html">计算机信息系统维护与网络安全漏洞处理策略</a> <b>[J]</b> <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=张勇&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor"> . 张勇</a> <span> <a href="/journal-cn-1657/" target="_blank" rel="nofollow" class="tuijian_authcolor"> . 信息系统工程 </a> </span> <span> . 2021</span><span>,第008期</span> </span> </div> </li> <li> <div> <b>3. </b><a class="enjiyixqcontent" href="/academic-journal-cn_wireless-internet-technology_thesis/0201279363997.html">计算机信息系统维护与网络安全漏洞处理策略分析</a> <b>[J]</b> <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=王懿嘉&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor"> . 王懿嘉</a> <span> <a href="/journal-cn-939/" target="_blank" rel="nofollow" class="tuijian_authcolor"> . 无线互联科技 </a> </span> <span> . 2020</span><span>,第010期</span> </span> </div> </li> <li> <div> <b>4. </b><a class="enjiyixqcontent" href="/academic-journal-cn_popular-standardization_thesis/0201275517521.html">计算机信息系统维护与网络安全漏洞处理策略</a> <b>[J]</b> <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=刘胜新&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor"> . 刘胜新</a> <span> <a href="/journal-cn-7654/" target="_blank" rel="nofollow" class="tuijian_authcolor"> . 大众标准化 </a> </span> <span> . 2019</span><span>,第012期</span> </span> </div> </li> <li> <div> <b>5. </b><a class="enjiyixqcontent" href="/academic-journal-cn_technology-innovation-application_thesis/0201280200979.html">计算机网络安全漏洞及解决措施分析策略</a> <b>[J]</b> <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=张广根&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor"> . 张广根</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=陈云&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">,陈云</a> <span> <a href="/journal-cn-9375/" target="_blank" rel="nofollow" class="tuijian_authcolor"> . 科技创新与应用 </a> </span> <span> . 2020</span><span>,第031期</span> </span> </div> </li> <li> <div> <b>6. </b><a class="enjiyixqcontent" href="/academic-conference-cn_meeting-9990_thesis/020222361334.html">企业安全管理的心理漏洞及解决方法——计算机和网络技术在企业安全管理的关键作用</a> <b>[C]</b> <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=张云峰&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor"> . 张云峰</a> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=于顺安&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor">,于顺安</a> <span> <a href="/conference-cn-9990/" target="_blank" rel="nofollow" class="tuijian_authcolor"> . 2011中国石油石化企业信息化技术交流会 </a> <span> <span> . 2011</span> </span> </div> </li> <li> <div> <b>7. </b><a class="enjiyixqcontent" href="/academic-degree-domestic_mphd_thesis/020313371051.html">基于不完全预防性维护的最优经济生产批量策略及其应用研究</a> <b>[A] </b> <span> <a href="/search.html?doctypes=4_5_6_1-0_4-0_1_2_3_7_9&sertext=郭巧顺&option=202" target="_blank" rel="nofollow" class="tuijian_auth tuijian_authcolor"> . 郭巧顺</a> <span> . 2015</span> </span> </div> </li> </ul> <ul style="display: none;"> <li> <div> <b>1. </b><a class="enjiyixqcontent" href="/patent-detail/06120103578904.html">用于解决在网络故障情况下与区块链外通道相关出现的安全性相关漏洞的系统和方法</a> <b>[P]</b> . <span> 中国专利: CN110771088A </span> <span> . 2020-02-07</span> </div> </li> <li> <div> <b>2. </b><a class="enjiyixqcontent" href="/patent-detail/061204322990.html">一种漏洞检查方法、持续集成代码的漏洞检查方法及装置</a> <b>[P]</b> . <span> 中国专利: CN111783104B </span> <span> . 2021.04.06</span> </div> </li> <li> <div> <b>3. </b><a class="enjiyixqcontent" href="/patent-detail/06130500127045.html">SOLUTION MANAGEMENT SYSTEMS AND METHODS FOR ADDRESSING CYBERSECURITY VULNERABILITIES</a> <b>[P]</b> . <span> 外国专利: <!-- --> US2021185094A1 </span> <span> . 2021-06-17</span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:解决网络安全漏洞的解决方案管理系统和方法 </span> </p> </li> <li> <div> <b>4. </b><a class="enjiyixqcontent" href="/patent-detail/06130400739138.html">CYBER SECURITY VULNERABILITY AND REGULATION INSPECTION APPARATUS AND METHOD THEREOF</a> <b>[P]</b> . <span> 外国专利: <!-- 韩国专利: --> KR20200052755A </span> <span> . 2020-05-15</span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:网络安全漏洞和管制检查设备及其方法 </span> </p> </li> <li> <div> <b>5. </b><a class="enjiyixqcontent" href="/patent-detail/06130423964303.html">VULNERABILITY INSPECTION DEVICE, VULNERABILITY INSPECTION METHOD AND VULNERABILITY INSPECTION PROGRAM</a> <b>[P]</b> . <span> 外国专利: <!-- 日本专利: --> JP2012078877A </span> <span> . 2012-04-19</span> </div> <p class="zwjiyix translation" style="max-width: initial;height: auto;word-break: break-all;white-space: initial;text-overflow: initial;overflow: initial;"> <span>机译:漏洞检查设备,漏洞检查方法和漏洞检查程序 </span> </p> </li> </ul> </div> </div> </div> <div class="theme cardcommon" style="overflow: auto;display:none"> <h3 class="all_title" id="enpatent55">相关主题</h3> <ul id="subject"> </ul> </div> </div> </div> </div> </div> <div id="thesis_get_original1" class="downloadBth" style="bottom: 19px;z-index: 999;" onclick="ywcd('0704022680022','4',7,2,1,'',this,24)" class="delivery" prompt="010401" title="通过人工服务将文献原文发送至邮箱" >获取原文</div> <div class="journalsub-pop-up" style="display: none"> <div class="journal-sub"> <h2>期刊订阅</h2> <img src="https://cdn.zhangqiaokeyan.com/img/loginclose.png" alt="关闭" onclick="$('.journalsub-pop-up').hide()"> <p class="pardon">抱歉,该期刊暂不可订阅,敬请期待!</p> <p class="current">目前支持订阅全部北京大学中文核心(2020)期刊目录。</p> <div style="display: flex;margin-top: 69px;justify-content: space-between;"> <div class="no-sub" onclick="$('.journalsub-pop-up').hide()">暂不订阅</div> <div class="other-sub" onclick="continueSub('from=pc-detail')">继续订阅其他期刊</div> </div> </div> </div> <div class="right_btn"> <ul> <li class="gouwuche"> <!-- <a href="javascript:void(0);" onclick="link_analysis('/shoppingcart/auth/list.html',this)">购物车</a>--> </li> <li class="yijian"> <a href="javascript:void(0);" onclick="link_analysis('/mycenter/auth/complaint.html',this)" title="意见反馈">意见反馈</a> </li> <li class="top"> <a href="javascript:scrollTo(0,0);" title="回到顶部">回到顶部</a> </li> <li class="shouye"> <a href="/" title="首页">回到首页</a> </li> </ul> </div> <div class="xllindexfooter"> <div class="xllindexfootercenter"> <div class="xllindexfooterleft left" > <div class="xllindexfooterleftli"> <ul> <li><a href="/about.html" title="关于掌桥">关于掌桥</a></li> <li><a href="/help/helpmap.html" title="资源导航">资源导航</a></li> <li><a href="/help/helpguide.html" title="新手指南">新手指南</a></li> <li><a href="/help/helpcenter.html" title="常见问题">常见问题</a></li> <li><a href="/sitemap.html" title="网站地图">网站地图</a></li> <li><a href="/help/helpcenter.html?type=9" title="版权声明">版权声明</a></li> </ul> </div> <div class="xllindexfooterleft"> <p class="xllindexfooterlefteamil">客服邮箱:kefu@zhangqiaokeyan.com</p> <div class="xllindexfooterlefttcp"> <div class="xllindexfooterpoliceiimg"></div> <div class="xllindexfooterpoliceispan"> <span>京公网安备:11010802029741号 </span> <span>ICP备案号:<a href="https://beian.miit.gov.cn" rel="nofollow" target="_blank" title="ICP备案号">京ICP备15016152号-6</a></span> <span>六维联合信息科技 (北京) 有限公司©版权所有</span> </div> </div> </div> </div> <div class="xllindexfooterright left"> <ul> <li> <p style="font-weight: bold;">客服微信</p> <div></div> </li> <li> <p style="font-weight: bold;">服务号</p> <div></div> </li> </ul> </div> </div> </div> <span id="0704022680022down" data-source="7," data-out-id="89Y0cfnhOyoYXToZ06zhCwPe3zHF0B/4DMYiBJFVUXMdNmt7fHK+11EblGdIJz+K," data-f-source-id="7" data-title="Cyber vulnerability maintenance policies that address the incomplete nature of inspection" data-price="20" data-site-name="" data-transnum="24" style="display:none;"></span> <input type="hidden" value="4" id="sourcetype"> <input type="hidden" value="19344" id="journalid"> <input type="hidden" value="4" id="inyn_provide_service_level"> <input type="hidden" value="https://cdn.zhangqiaokeyan.com" id="imgcdn"> <input type="hidden" value="1" id="isdeatail"> <input type="hidden" value="" id="syyn_indexed_database"> <input type="hidden" value="" id="servicetype"> <input type="hidden" id="pagename" value="Cyber vulnerability maintenance policies that address the incomplete nature of inspection"/> <input type="hidden" value="thesis_get_original" id="pageIdentification"> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/jquery-1.12.4.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/lwlh_ajax.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/zq.js?v=5.7.8"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/common.js?v=5.7.8"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/jquery.cookie.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/top.js?v=5.7.8"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/tip.js?v=5.7.8"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/login.js?v=5.7.8"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/down.js?v=5.7.8"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/search.js?v=5.7.8"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/newmail.js?v=5.7.8"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/searchtype.js?v=5.7.8"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/user/regist.js?v=5.7.8"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/zxs_solor/detail.js?v=5.7.8"></script> <script type="text/javascript" src="https://www.zhangqiaokeyan.com/statistics/static/pagecollection.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/tj.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/sse.js?v=5.7.8"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/pushbaidu.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/common/history.js"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/util/cookie.js?v=5.7.8"></script> <script type="text/javascript" src="https://cdn.zhangqiaokeyan.com/js/weipu/weipu.js?v=5.7.8"></script> </body> <script> $(function(){ var weiPuStatus = getCookie('WeiPuStatus'); if(weiPuStatus){ tipWeiPuStatus(weiPuStatus); delCookie('WeiPuStatus'); } getFacetKeywordVoInId(); var sourcetype = $("#sourcetype").val(); var inyn_provide_service_level = $("#inyn_provide_service_level").val(); if((sourcetype ==1||sourcetype==4)&&inyn_provide_service_level!=4){ getJournal(); } }) </script> </html>