Works matching DE "INTERNET domain naming system"
Results: 272
Do generic gTLDs require their own ex ante regulation?
- Published in:
- International Review of Law, Computers & Technology, 2016, v. 30, n. 3, p. 150, doi. 10.1080/13600869.2016.1145869
- By:
- Publication type:
- Article
Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance: Analyzing IANA Transition.
- Published in:
- Contexto Internacional, 2023, v. 45, n. 3, p. 1, doi. 10.1590/S0102-8529.20234503e20220022
- By:
- Publication type:
- Article
Things are (not) Gonna Get Easier: Teaching Online Information Evaluation with Tupac.
- Published in:
- Alki: The Washington Library Association Journal, 2017, v. 33, n. 2, p. 20
- By:
- Publication type:
- Article
Drug–target interaction prediction through domain-tuned network-based inference.
- Published in:
- Bioinformatics, 2013, v. 29, n. 16, p. 2004, doi. 10.1093/bioinformatics/btt307
- By:
- Publication type:
- Article
PUMD: a PU learning-based malicious domain detection framework.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00124-x
- By:
- Publication type:
- Article
Italy: Enforcement of Blocking Order Against an ISP.
- Published in:
- Computer Law Review International, 2023, v. 24, n. 2, p. 63, doi. 10.9785/cri-2023-240207
- By:
- Publication type:
- Article
EU: No direct actions for annulment against binding decisions of the European Data Protection Board.
- Published in:
- Computer Law Review International, 2023, v. 24, n. 2, p. 60, doi. 10.9785/cri-2023-240206
- Publication type:
- Article
50<sup>th</sup> Anniversary of TPRC—Research Conference on Communications, Information and Internet Policy: Looking Ahead to the Next 50 Years.
- Published in:
- Journal of Information Policy, 2022, v. 12, p. 1, doi. 10.5325/jinfopoli.12.2022.0000
- By:
- Publication type:
- Article
TRUST ZONES: A Path to a More Secure Internet Infrastructure.
- Published in:
- Journal of Information Policy, 2021, v. 11, p. 26, doi. 10.5325/jinfopoli.11.2021.0026
- By:
- Publication type:
- Article
MEASURING MOBILE BROADBAND PERFORMANCE IN NIGERIA: 2G AND 3G.
- Published in:
- Nigerian Journal of Technology, 2019, v. 38, n. 2, p. 422, doi. 10.4314/njt.v38i2.19
- By:
- Publication type:
- Article
A novel deep-learning based approach to DNS over HTTPS network traffic detection.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 6, p. 6691, doi. 10.11591/ijece.v13i6.pp6691-6700
- By:
- Publication type:
- Article
A hybrid method of genetic algorithm and support vector machine for DNS tunneling detection.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2021, v. 11, n. 2, p. 1666, doi. 10.11591/ijece.v11i2.pp1666-1674
- By:
- Publication type:
- Article
A flexible method to create wave file features.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2021, v. 11, n. 2, p. 1311, doi. 10.11591/ijece.v11i2.pp1311-1318
- By:
- Publication type:
- Article
Design and Performance Evaluation of a Transport Protocol for Ad hoc Networks.
- Published in:
- Computer Journal, 2009, v. 52, n. 2, p. 186
- By:
- Publication type:
- Article
Domain‐based distributed identifier‐locator mapping management in Internet‐of‐Things networks.
- Published in:
- International Journal of Network Management, 2018, v. 28, n. 5, p. 1, doi. 10.1002/nem.2035
- By:
- Publication type:
- Article
An economic mechanism for request routing and resource allocation in hybrid CDN-P2P networks.
- Published in:
- International Journal of Network Management, 2015, v. 25, n. 6, p. 375, doi. 10.1002/nem.1891
- By:
- Publication type:
- Article
DNS-Class: immediate classification of IP flows using DNS.
- Published in:
- International Journal of Network Management, 2014, v. 24, n. 4, p. 272, doi. 10.1002/nem.1864
- By:
- Publication type:
- Article
Performance analysis and comparison of four DNS64 implementations under different free operating systems.
- Published in:
- Telecommunication Systems, 2016, v. 63, n. 4, p. 557, doi. 10.1007/s11235-016-0142-x
- By:
- Publication type:
- Article
SHIP: Cross-layer mobility management scheme based on Session Initiation Protocol and Host Identity Protocol.
- Published in:
- Telecommunication Systems, 2009, v. 42, n. 1/2, p. 5, doi. 10.1007/s11235-009-9164-y
- By:
- Publication type:
- Article
A cross-layer congestion and contention window control scheme for TCP performance improvement in wireless LANs.
- Published in:
- Telecommunication Systems, 2009, v. 42, n. 1/2, p. 17, doi. 10.1007/s11235-009-9166-9
- By:
- Publication type:
- Article
Review of Alpana Roy, Australian Domain Name Law.
- Published in:
- Journal of Law, Information & Science, 2015, v. 24, n. 1, p. 144
- By:
- Publication type:
- Article
A country road: domain name disputes in.nz—is private dispute resolution working?
- Published in:
- International Journal of Law & Information Technology, 2019, v. 27, n. 4, p. 409, doi. 10.1093/ijlit/eaz013
- By:
- Publication type:
- Article
On domain registries and unlawful website contentShifts in intermediaries' role in light of unlawful content or just another brick in the wall?
- Published in:
- International Journal of Law & Information Technology, 2018, v. 26, n. 4, p. 273, doi. 10.1093/ijlit/eay012
- By:
- Publication type:
- Article
Give it away now? Renewal of the IANA functions contract and its role in internet governance.
- Published in:
- International Journal of Law & Information Technology, 2014, v. 22, n. 1, p. 3, doi. 10.1093/ijlit/eat017
- By:
- Publication type:
- Article
A gTLD right? Conceptual challenges in the expanding internet domain namespace.
- Published in:
- International Journal of Law & Information Technology, 2014, v. 22, n. 1, p. 27, doi. 10.1093/ijlit/eat018
- By:
- Publication type:
- Article
Guest Editorial.
- Published in:
- International Journal of Law & Information Technology, 2014, v. 22, n. 1, p. 1, doi. 10.1093/ijlit/eat015
- By:
- Publication type:
- Article
Hybrid net: the regulatory framework of ICANN and the DNS.
- Published in:
- International Journal of Law & Information Technology, 2014, v. 22, n. 1, p. 49, doi. 10.1093/ijlit/eat016
- By:
- Publication type:
- Article
Developing Transparent IDS for VANETs Using LIME and SHAP: An Empirical Study.
- Published in:
- Computers, Materials & Continua, 2023, v. 77, n. 3, p. 3185, doi. 10.32604/cmc.2023.044650
- By:
- Publication type:
- Article
CLEC: Combination Locality Based Erasure Code for Permissioned Blockchain Storage.
- Published in:
- Computers, Materials & Continua, 2022, v. 73, n. 3, p. 5137, doi. 10.32604/cmc.2022.028305
- By:
- Publication type:
- Article
Blockzone: A Decentralized and Trustworthy Data Plane for DNS.
- Published in:
- Computers, Materials & Continua, 2020, v. 65, n. 2, p. 1531, doi. 10.32604/cmc.2020.010949
- By:
- Publication type:
- Article
Self-Certificating Root: A Root Zone Security Enhancement Mechanism for DNS.
- Published in:
- Computers, Materials & Continua, 2020, v. 63, n. 1, p. 521, doi. 10.32604/cmc.2020.07982
- By:
- Publication type:
- Article
Context-aware Fuzzy Control Systems.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2014, v. 24, n. 5, p. 825, doi. 10.1142/S0218194014500326
- By:
- Publication type:
- Article
Improving the Performance and Security of the TOTD DNS64 Implementation.
- Published in:
- Journal of Computer Science & Technology (JCS&T), 2014, v. 14, n. 1, p. 9
- By:
- Publication type:
- Article
THE NEW .AFRICA TOP LEVEL DOMAIN: AN AFRICAN INITIATIVE IN ENSURING AFRICA'S RIGHTFUL PLACE ON THE GLOBAL NETWORK.
- Published in:
- Potchefstroom Electronic Law Journal, 2014, v. 17, n. 3, p. 1071, doi. 10.4314/pelj.v17i3.07
- By:
- Publication type:
- Article
The Domain Name System--Past, Present, and Future.
- Published in:
- Communications of the Association for Information Systems, 2012, v. 30, p. 329, doi. 10.17705/1CAIS.03021
- By:
- Publication type:
- Article
IDV: Internet Domain Name Verification Based on Blockchain.
- Published in:
- Computer Modeling in Engineering & Sciences (CMES), 2021, v. 129, n. 1, p. 299, doi. 10.32604/cmes.2021.016839
- By:
- Publication type:
- Article
Detection of DoH Traffic Tunnels Using Deep Learning for Encrypted Traffic Classification.
- Published in:
- Computers (2073-431X), 2023, v. 12, n. 3, p. 47, doi. 10.3390/computers12030047
- By:
- Publication type:
- Article
Privacy-Preserving Passive DNS.
- Published in:
- Computers (2073-431X), 2020, v. 9, n. 3, p. 64, doi. 10.3390/computers9030064
- By:
- Publication type:
- Article
A Critical and Comparative Review of auDRP and UDRP Domain Name Decisions.
- Published in:
- Journal of World Intellectual Property, 2016, v. 19, n. 5/6, p. 203, doi. 10.1111/jwip.12059
- By:
- Publication type:
- Article
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 4, p. 2531, doi. 10.1007/s10207-024-00850-y
- By:
- Publication type:
- Article
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1293, doi. 10.1007/s10207-023-00790-z
- By:
- Publication type:
- Article
DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 6, p. 1865, doi. 10.1007/s10207-023-00723-w
- By:
- Publication type:
- Article
A wrinkle in time: a case study in DNS poisoning.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 3, p. 313, doi. 10.1007/s10207-020-00502-x
- By:
- Publication type:
- Article
DomainProfiler: toward accurate and early discovery of domain names abused in future.
- Published in:
- International Journal of Information Security, 2018, v. 17, n. 6, p. 661, doi. 10.1007/s10207-017-0396-7
- By:
- Publication type:
- Article
OnionDNS: a seizure-resistant top-level domain.
- Published in:
- International Journal of Information Security, 2018, v. 17, n. 6, p. 645, doi. 10.1007/s10207-017-0391-z
- By:
- Publication type:
- Article
A method for identifying compromised clients based on DNS traffic analysis.
- Published in:
- International Journal of Information Security, 2017, v. 16, n. 2, p. 115, doi. 10.1007/s10207-016-0331-3
- By:
- Publication type:
- Article
Double-authentication-preventing signatures.
- Published in:
- International Journal of Information Security, 2017, v. 16, n. 1, p. 1, doi. 10.1007/s10207-015-0307-8
- By:
- Publication type:
- Article
New facets of mobile botnet: architecture and evaluation.
- Published in:
- International Journal of Information Security, 2016, v. 15, n. 5, p. 455, doi. 10.1007/s10207-015-0310-0
- By:
- Publication type:
- Article
La búsqueda local sustituye a la guía telefónica clásica.
- Published in:
- El Profesional de la Información, 2009, v. 18, n. 4, p. 424, doi. 10.3145/epi.2009.jul.10
- By:
- Publication type:
- Article
Ada-related Resources.
- Published in:
- Ada User Journal, 2021, v. 42, n. 2, p. 68
- By:
- Publication type:
- Article