1.
On the Determination of Criminal Nature of Making Profit by Taking Advantage of Technological Holes of Telecom
利用电信“技术漏洞”获利行为刑法定性研究
2.
Vulnerability Attack and Defense and Vulnerability Database Design;

漏洞攻击防范技术与漏洞数据库设计
3.
Research of Vulerability Detection and Usage under Win32 Plateform;

基于Win32平台的漏洞挖掘和漏洞利用技术研究
4.
Vulnerability mining model for Windows based on vulnerability characteristics and Fuzz technology
基于漏洞特征和Fuzz技术的Windows漏洞挖掘模型研究
5.
There's a technical gap in the Army's method.

陆军的方法在技术上有一个漏洞。
6.
WATER SEEPAGE CONTROL TECHNIQUE FOR UNDERSEA LPG GAS STORAGE CAVERN

海底液化气储气洞库控制渗漏水技术
7.
Researches on Techniques of Exploiting and Applying MS Office Vulnerabilities;

MS Office漏洞挖掘与利用技术研究
8.
Research on Technologies of Attacks and Detections of Buffer Overflow Vulnerabilities;

缓冲区溢出漏洞攻击和检测技术研究
9.
Research of Mining and Analyzing Technology of Windows Critical Vulnerabilities;

Windows危急级漏洞挖掘及分析技术研究
10.
Danger elimination of construction leakage during reinforcing water release tunnel in Peishan Reservoir
培山水库放水隧洞施工漏水除险技术
11.
New method of software vulnerability detection based on fuzzing

一种基于fuzzing技术的漏洞发掘新思路
12.
Research on Vulnerability Exploit Technique for Adobe Reader Based on Reversed Engineering and Fuzzing Test
基于逆向工程和Fuzzing技术的AdobeReader漏洞发掘技术研究
13.
About the Technique and Loophole Solution of HRC

硬盘还原卡技术及其漏洞解决办法的探讨
14.
Design of Vulnerability Scanning System Based on Plug-in Technology;

基于插件技术的漏洞扫描系统设计与实现
15.
Research on Critical Vulnerability Mining and Analyzing Technology Based on CVE;

基于CVE知识库的危急漏洞挖掘与分析技术研究
16.
On Attack Based on Buffer Overflow Loophole and Protection Technology;

基于缓冲区溢出漏洞的攻击及防范技术探讨
17.
SAT-based technique to detect buffer overflows in C source codes

一种基于SAT的C程序缓冲区溢出漏洞检测技术
18.
Technology combined with local area network's cost gateway and leak scanning

局域网的计费网关与漏洞扫描结合技术