![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Critical Server Security Protection Strategy Based on Traffic Log Analysis
Traditional perimeter-based security systems provide a level of defense against external attacks. However, with the increasing prevalence of advanced network attacks and the continual emergence of novel attack...
-
Chapter and Conference Paper
A Survey on IPv6 Security Threats and Defense Mechanisms
Compared with IPv4 network, IPv6 network has some new characteristics, such as larger address space and more simplified message header structure. These new characteristics in IPv6 network may introduce both se...
-
Chapter and Conference Paper
A Survey on the Classic Active Measurement Methods for IPv6
With the rapid development of the Internet, the IP network has become the infrastructure of human society and plays an important role in life. However, the IPv4 network is criticized as it faces address exhaus...
-
Chapter and Conference Paper
Survey on IMD and Wearable Devices Security Threats and Protection Methods
In recent years, the developments in electronic science and technology have led to abundant new wearable devices and IMDs, but with the use of those devices increases, the concern about their security also be...
-
Chapter and Conference Paper
JSPRE: A Large-Scale Detection of Malicious JavaScript Code Based on Pre-filter
Malicious web pages that use drive-by-download attacks or social engineering technique have become a popular means for compromising hosts on the Internet. To search for malicious web pages, researchers have de...