Works matching Domain Name System (DNS)
1
- Law, State & Telecommunications Review / Revista de Direito, Estado e Telecomunicações, 2019, v. 11, n. 2, p. 127, doi. 10.26512/lstr.v11i2.27027
- de Carvalho Calabrich, Bruno Freire
- Article
2
- Sensors (14248220), 2023, v. 23, n. 14, p. 6366, doi. 10.3390/s23146366
- Gao, Tianfu;
- Dong, Qingkuan
- Article
3
- International Dialogue: East-West, 2020, v. 7, n. 1, p. 301
- Zajmović, Mahir;
- Obhođaš, Ibrahim
- Article
4
- Chinese Journal of Network & Information Security, 2024, v. 10, n. 5, p. 39, doi. 10.11959/j.issn.2096-109x.2024065
- Article
5
- Journal of Computer Engineering & Applications, 2024, v. 60, n. 21, p. 73, doi. 10.3778/j.issn.1002-8331.2405-0302
- Article
6
- Journal of Cyber Policy, 2023, v. 8, n. 2, p. 137, doi. 10.1080/23738871.2024.2312922
- Article
7
- Computer Engineering & Science / Jisuanji Gongcheng yu Kexue, 2025, v. 47, n. 5, p. 823, doi. 10.3969/j.issn.1007-130X.2025.05.006
- Article
8
- Computers (2073-431X), 2020, v. 9, n. 3, p. 64, doi. 10.3390/computers9030064
- Papadopoulos, Pavlos;
- Pitropakis, Nikolaos;
- Buchanan, William J.;
- Lo, Owen;
- Katsikas, Sokratis
- Article
9
- Telecommunication Systems, 2022, v. 81, n. 3, p. 417, doi. 10.1007/s11235-022-00950-x
- Mahjabin, Tasnuva;
- Xiao, Yang;
- Li, Tieshan;
- Guizani, Mohsen
- Article
10
- Discover Artificial Intelligence, 2024, v. 4, n. 1, p. 1, doi. 10.1007/s44163-024-00154-z
- Demmese, Fikirte Ayalke;
- Shajarian, Shaghayegh;
- Khorsandroo, Sajad
- Article
11
- Electronics (2079-9292), 2019, v. 8, n. 4, p. 442, doi. 10.3390/electronics8040442
- Khudoyberdiev, Azimbek;
- Jin, Wenquan;
- Kim, DoHyeun
- Article
12
- Sensors (14248220), 2023, v. 23, n. 7, p. 3489, doi. 10.3390/s23073489
- Abu Al-Haija, Qasem;
- Alohaly, Manar;
- Odeh, Ammar
- Article
13
- Wireless Personal Communications, 2009, v. 48, n. 4, p. 605, doi. 10.1007/s11277-008-9550-x
- Shuigen Yang;
- Hongbin Luo;
- Yajuan Qin;
- Hongke Zhang
- Article
14
- Information Society, 2002, v. 18, n. 3, p. 193, doi. 10.1080/01972240290074959
- Article
15
- Communications of the Association for Information Systems, 2012, v. 30, p. 329, doi. 10.17705/1CAIS.03021
- Pope, Michael Brian;
- Warkentin, Merrill;
- Mutchler, Leigh A.;
- Luo, Xin (Robert)
- Article
16
- Research & Exploration in Laboratory, 2017, v. 36, n. 5, p. 97
- Article
17
- IUP Journal of Telecommunications, 2022, v. 14, n. 3, p. 7
- Roshith, Inapagolla;
- Padmapriya V. M.
- Article
18
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 1, p. 507, doi. 10.1007/s12083-023-01597-4
- Niktabe, Sepideh;
- Lashkari, Arash Habibi;
- Roudsari, Arousha Haghighian
- Article
19
- Computer Engineering & Science / Jisuanji Gongcheng yu Kexue, 2023, v. 45, n. 9, p. 1572, doi. 10.3969/j.issn.1007-130X.2023.09.006
- Article
20
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 7, p. 306, doi. 10.14569/ijacsa.2024.0150730
- Nadagoudar, Ranjana B.;
- Ramakrishna, M.
- Article
21
- Jurisprudence / Jurisprudencija, 2014, v. 21, n. 2, p. 531, doi. 10.13165/JUR-14-21-2-10
- Article
22
- International Journal of Education & Development using Information & Communication Technology, 2009, v. 5, n. 3, p. 1
- Article
23
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2019, v. 36, n. 1, p. 194, doi. 10.19734/j.issn.1001-3695.2017.07.0680
- Article
24
- Medien & Erziehung, 2018, v. 62, n. 6, p. 53, doi. 10.21240/merz/2018.6.6
- Article
25
- Chinese Journal of Network & Information Security, 2024, v. 10, n. 5, p. 56, doi. 10.11959/j.issn.2096-109x.2024066
- Article
26
- Chinese Journal of Network & Information Security, 2024, v. 10, n. 5, p. 81, doi. 10.11959/j.issn.2096-109x.2024068
- 刘林晖;
- 涂菲帆;
- 陈勇;
- 左鹏;
- 刘东杰;
- 张银炎;
- 耿光刚
- Article
27
- Policy & Internet, 2019, v. 11, n. 1, p. 16, doi. 10.1002/poi3.195
- Bradshaw, Samantha;
- DeNardis, Laura
- Article
28
- Science Technology & Engineering, 2024, v. 24, n. 35, p. 15137, doi. 10.12404/j.issn.1671-1815.2308268
- Article
29
- Computers (2073-431X), 2023, v. 12, n. 3, p. 47, doi. 10.3390/computers12030047
- Article
30
- Information Technology & Network Security / Xinxi Jishu yu Wangluo Anquan, 2022, v. 41, n. 1, p. 30, doi. 10.19358/j.issn.2096-5133.2022.01.005
- Zhang Jiufa;
- Huang Bing;
- Xu Yanbin;
- Chai Chuchu;
- Hao Jiao
- Article
31
- Computers, Materials & Continua, 2020, v. 65, n. 2, p. 1531, doi. 10.32604/cmc.2020.010949
- Ning Hu;
- Shi Yin;
- Shen Su;
- Xudong Jia;
- Qiao Xiang;
- Hao Liu
- Article
32
- Technical Gazette / Tehnički Vjesnik, 2022, v. 29, n. 6, p. 1796, doi. 10.17559/TV-20210325173601
- PEJIĆ, Denis;
- KRIŽANOVIĆ, Višnja;
- ŽAGAR, Drago
- Article
33
- Informatica (03505596), 2025, v. 49, n. 2, p. 333, doi. 10.31449/inf.v49i2.6956
- Rawat, Romil;
- Borana, Kamal;
- Gupta, Shweta;
- Ingle, Mandakini;
- Dibouliya, Ashish;
- Bhardwaj, Purvee;
- Rawat, Anjali
- Article
34
- International Journal on Information Technologies & Security, 2025, v. 17, n. 2, p. 111
- Article
35
- Scalable Computing: Practice & Experience, 2025, v. 26, n. 4, p. 1789, doi. 10.12694/scpe.v26i4.4452
- Article
36
- International Review of Law, Computers & Technology, 2003, v. 17, n. 3, p. 267, doi. 10.1080/1360086032000174379
- Schiavetta, Susan;
- Komaitis, Konstantinos
- Article
37
- International Review of Law, Computers & Technology, 2002, v. 16, n. 1, p. 67, doi. 10.1080/13600860220136110
- Article
39
- International Journal of Network Management, 2025, v. 35, n. 1, p. 1, doi. 10.1002/nem.2309
- Azevedo, Andrei C.;
- Scheid, Eder J.;
- Franco, Muriel F.;
- Boeira, Demétrio F. F.;
- Zembruzki, Luciano;
- Granville, Lisandro Z.
- Article
40
- Applied Economics, 2012, v. 44, n. 14, p. 1765, doi. 10.1080/00036846.2011.554375
- Levin, SharonG.;
- Stephan, PaulaE.;
- Winkler, AnneE.
- Article
41
- Neural Computing & Applications, 2018, v. 29, n. 7, p. 483, doi. 10.1007/s00521-016-2531-1
- Article
42
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01931-y
- Li, Zhenyu;
- Ding, Yong;
- Yi, Chen
- Article
43
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 2, p. 1211, doi. 10.1007/s12083-023-01455-3
- Lu, Genhua;
- Jia, Xiaofeng;
- Zhang, Yi;
- Shao, Jun;
- Wei, Guiyi
- Article
44
- ComputerWorld Hong Kong, 2009, v. 26, n. 5, p. 76
- Article
45
- International Journal of Information Technology & Web Engineering, 2007, v. 2, n. 3, p. 17, doi. 10.4018/jitwe.2007070102
- Article
46
- Complex & Intelligent Systems, 2023, v. 9, n. 4, p. 3857, doi. 10.1007/s40747-022-00838-y
- Huang, Yonghong;
- Negrete, Joanna;
- Wagener, John;
- Fralick, Celeste;
- Rodriguez, Armando;
- Peterson, Eric;
- Wosotowsky, Adam
- Article
47
- International Journal of Intelligent Systems, 2022, v. 37, n. 10, p. 8170, doi. 10.1002/int.22934
- Ma, Tengchao;
- Xu, Changqiao;
- Yang, Shujie;
- Huang, Yiting;
- Kuang, Xiaohui;
- Tang, Hong;
- Grieco, Luigi Alfredo
- Article
48
- Journal of Information System Security, 2011, v. 7, n. 2, p. 27
- Born, Kenton;
- Gustafson, David A.
- Article
50
- Multimedia Tools & Applications, 2024, v. 83, n. 11, p. 32945, doi. 10.1007/s11042-023-16956-9
- Aggarwal, Akarsh;
- Kumar, Manoj
- Article