Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Chengxi XU"'
Publikováno v:
网络与信息安全学报, Vol 9, Pp 56-66 (2023)
With the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the exis
Externí odkaz:
https://doaj.org/article/30e74a9cce1e42c481d8228a7bc10d74
Publikováno v:
Applied Sciences, Vol 13, Iss 9, p 5739 (2023)
The centralization of the global DNS ecosystem may accelerate the creation of an oligopoly market, thereby, increasing the risk of a single point of failure and network traffic manipulation. Earlier studies have revealed the level of centralization i
Externí odkaz:
https://doaj.org/article/5a0cf31eba5b43499a1828666f6c14a4
Publikováno v:
IEEE Access, Vol 8, Pp 148315-148330 (2020)
Due to the increasing number of network security vulnerabilities, vulnerability risk assessment must be performed to prioritize the repair of high-risk vulnerabilities. Traditional vulnerability risk assessment is based primarily on the Common Vulner
Externí odkaz:
https://doaj.org/article/d72872dda9f741d2b8ca838b4ec52847
Publikováno v:
Applied Sciences, Vol 11, Iss 20, p 9733 (2021)
Internet users have suffered from phishing attacks for a long time. Attackers deceive users through malicious constructed phishing websites to steal sensitive information, such as bank account numbers, website usernames, and passwords. In recent year
Externí odkaz:
https://doaj.org/article/790c09338a25459591a88864642b91b9
Publikováno v:
Proceedings of the 4th International Conference on Advanced Information Science and System.
Publikováno v:
IEEE Access, Vol 8, Pp 148315-148330 (2020)
Due to the increasing number of network security vulnerabilities, vulnerability risk assessment must be performed to prioritize the repair of high-risk vulnerabilities. Traditional vulnerability risk assessment is based primarily on the Common Vulner
Publikováno v:
2021 17th International Conference on Mobility, Sensing and Networking (MSN).
Publikováno v:
Applied Sciences
Volume 11
Issue 20
Applied Sciences, Vol 11, Iss 9733, p 9733 (2021)
Volume 11
Issue 20
Applied Sciences, Vol 11, Iss 9733, p 9733 (2021)
Internet users have suffered from phishing attacks for a long time. Attackers deceive users through malicious constructed phishing websites to steal sensitive information, such as bank account numbers, website usernames, and passwords. In recent year
Publikováno v:
ICCCS
As the Internet continues to evolve, the Domain Name System (DNS), which is originally designated as distributed service, starts to aggregate to fewer DNS servers. Thus, it is of great significance to dig out these name servers and carry out specific
Publikováno v:
The Journal of Horticultural Science and Biotechnology. 93:409-415
Spinach (Spinacia oleracea L.) accumulates high amounts of carotenoids, vitamin C, nitrate and oxalate. Breeding to reduce nitrate and oxalate levels and increase vitamin C and carotenoid levels is...