Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Critical Server Security Protection Strategy Based on Traffic Log Analysis

    Traditional perimeter-based security systems provide a level of defense against external attacks. However, with the increasing prevalence of advanced network attacks and the continual emergence of novel attack...

    Haiyong Zhu, Chengyu Wang, Bingnan Hou, Yonghao Tang in Computer Networks and IoT (2024)

  2. No Access

    Chapter and Conference Paper

    A Survey on IPv6 Security Threats and Defense Mechanisms

    Compared with IPv4 network, IPv6 network has some new characteristics, such as larger address space and more simplified message header structure. These new characteristics in IPv6 network may introduce both se...

    Ning Liu, **g **a, Zhi** Cai, Tao Yang in Artificial Intelligence and Security (2022)

  3. No Access

    Chapter and Conference Paper

    A Survey on the Classic Active Measurement Methods for IPv6

    With the rapid development of the Internet, the IP network has become the infrastructure of human society and plays an important role in life. However, the IPv4 network is criticized as it faces address exhaus...

    Yipeng Wang, Tongqing Zhou, Changsheng Hou, Bingnan Hou in Theoretical Computer Science (2021)

  4. No Access

    Chapter and Conference Paper

    Survey on IMD and Wearable Devices Security Threats and Protection Methods

    In recent years, the developments in electronic science and technology have led to abundant new wearable devices and IMDs, but with the use of those devices increases, the concern about their security also be...

    Jia** Yu, Bingnan Hou in Cloud Computing and Security (2018)

  5. No Access

    Chapter and Conference Paper

    JSPRE: A Large-Scale Detection of Malicious JavaScript Code Based on Pre-filter

    Malicious web pages that use drive-by-download attacks or social engineering technique have become a popular means for compromising hosts on the Internet. To search for malicious web pages, researchers have de...

    Bingnan Hou, Jia** Yu, Bixin Liu, Zhi** Cai in Cloud Computing and Security (2018)