Ke-xin Yang

  • Citations Per Year
Learn More
All successful cyber attacks begin with successful information gathering. Now more and more web servers no longer show their product tokens in the “Server” header field of the responses indiscreetly, and they want to protect the system information from reconnaissance by hiding their banners. Web servers have some unique characteristics because of different(More)
  • 1