![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Super-Nash Equilibrium Defense Solution for Client-Side Cache Poisoning Attacks
A new class of DNS poisoning attacks targeting client-side DNS caches has recently emerged. This attack works with external attackers to poison users’ DNS cache through a spy program installed on the client si...
-
Chapter and Conference Paper
Improvement of AFL’s Seed Deterministic Mutation Algorithm
With the continuous development of software technology, software vulnerabilities have become one of the focuses of people’s attention. More and more methods for mining software vulnerabilities are emerging, an...
-
Chapter and Conference Paper
Risk-Aware SFC Placement Method in Edge Cloud Environment
Network Function Virtualization (NFV) is a technology that separates software from hardware, NFV increases the manageability, scalability, and flexibility of network function configuration. However, with these...
-
Chapter and Conference Paper
Optimization of TCP Congestion Control Algorithms Loss-Based in Wireless Network
With the rapid development of computer network, today’s network structure has become very complex. The promotion of Wi-Fi and the widespread use of mobile terminals such as cell phone, laptop and smart watch, ...