![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
RARE: A Systematic Augmented Router Emulation for Malware Analysis
How can we analyze and profile the behavior of a router malware? This is the motivating question behind our work focusing on router. Router-specific malware has emerged as a new vector for hackers, but has rec...
-
Chapter and Conference Paper
Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts
As we move into the mobile era, many functionalities in standard web services are being re-implemented in mobile apps and services, including many security-related functionalities. However, it has been observe...
-
Chapter and Conference Paper
M/I Adaptation Layer Network Protocol for IoT Based on 6LoWPAN
The four-layer network protocol architecture for Internet of Things is proposed based on 6LoWPAN, and the M/I adaptation layer, as the key of the protocol architecture, achieve the integration between underlyi...
-
Chapter and Conference Paper
Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks
Managing numerous security vulnerabilities has long been a difficult and daunting task especially due to the complexity, heterogeneity, and various operational constraints of the network. In this paper, we foc...