Works matching DE "INTERNET domain naming system"
Results: 274
A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 3, p. 1263, doi. 10.1007/s11277-016-3681-2
- By:
- Publication type:
- Article
Efficient Malicious Packet Capture Through Advanced DNS Sinkhole.
- Published in:
- Wireless Personal Communications, 2017, v. 93, n. 1, p. 21, doi. 10.1007/s11277-016-3443-1
- By:
- Publication type:
- Article
Utilizing the Domain Name System for Scalable and Secure Named Data Networking.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 3, p. 2135, doi. 10.1007/s11277-015-2537-5
- By:
- Publication type:
- Article
Enhancing TCP Fairness in Wireless Networks using Dual Queue Approach with Optimal Queue Selection.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 2, p. 1359, doi. 10.1007/s11277-015-2455-6
- By:
- Publication type:
- Article
A Lease Algorithm to Maintain Strong Mapping Cache Consistency.
- Published in:
- Wireless Personal Communications, 2014, v. 76, n. 4, p. 713, doi. 10.1007/s11277-013-1530-0
- By:
- Publication type:
- Article
An Adaptive Delayed Acknowledgment Strategy to Improve TCP Performance in Multi-hop Wireless Networks.
- Published in:
- Wireless Personal Communications, 2013, v. 69, n. 1, p. 307, doi. 10.1007/s11277-012-0575-9
- By:
- Publication type:
- Article
Transfer learning with ResNet50 for malicious domains classification using image visualization.
- Published in:
- Discover Artificial Intelligence, 2024, v. 4, n. 1, p. 1, doi. 10.1007/s44163-024-00154-z
- By:
- Publication type:
- Article
Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography.
- Published in:
- EAI Endorsed Transactions on Pervasive Health & Technology, 2022, v. 8, n. 4, p. 1, doi. 10.4108/eetpht.v8i4.3081
- By:
- Publication type:
- Article
Defining Domain.
- Published in:
- Brooklyn Law Review, 2015, v. 80, n. 3, p. 857
- By:
- Publication type:
- Article
Detection of DoH Traffic Tunnels Using Deep Learning for Encrypted Traffic Classification.
- Published in:
- Computers (2073-431X), 2023, v. 12, n. 3, p. 47, doi. 10.3390/computers12030047
- By:
- Publication type:
- Article
Privacy-Preserving Passive DNS.
- Published in:
- Computers (2073-431X), 2020, v. 9, n. 3, p. 64, doi. 10.3390/computers9030064
- By:
- Publication type:
- Article
A Critical and Comparative Review of auDRP and UDRP Domain Name Decisions.
- Published in:
- Journal of World Intellectual Property, 2016, v. 19, n. 5/6, p. 203, doi. 10.1111/jwip.12059
- By:
- Publication type:
- Article
An approach to application-layer DoS detection.
- Published in:
- Journal of Big Data, 2023, v. 10, n. 1, p. 1, doi. 10.1186/s40537-023-00699-3
- By:
- Publication type:
- Article
Towards Countering the Insider Reconnaissance Using a Combination of Shuffling and Diversity Moving Target Defense Techniques .
- Published in:
- Engineering, Technology & Applied Science Research, 2021, v. 11, n. 6, p. 7745, doi. 10.48084/etasr.4417
- By:
- Publication type:
- Article
DNSSEC DEPLOYMENT AND CHALLENGES.
- Published in:
- Singidunum Journal of Applied Sciences, 2014, p. 678, doi. 10.15308/SInteZa-2014-678-682
- By:
- Publication type:
- Article
A Secure Scheme to Counter the Man in the Middle Attacks in SDN Networks-Based Domain Name System.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 10, p. 1195, doi. 10.14569/ijacsa.2024.01510121
- By:
- Publication type:
- Article
Data Structure and Management Protocol to Enhance Name Resolving in Named Data Networking.
- Published in:
- Future Internet, 2024, v. 16, n. 4, p. 118, doi. 10.3390/fi16040118
- By:
- Publication type:
- Article
N-Trans: Parallel Detection Algorithm for DGA Domain Names.
- Published in:
- Future Internet, 2022, v. 14, n. 7, p. 209, doi. 10.3390/fi14070209
- By:
- Publication type:
- Article
Botnet Detection Technology Based on DNS.
- Published in:
- Future Internet, 2017, v. 9, n. 4, p. 55, doi. 10.3390/fi9040055
- By:
- Publication type:
- Article
Active Queue Management in TCP Networks Based on Fuzzy-Pid Controller.
- Published in:
- Journal of Applied Computer Science & Mathematics, 2012, n. 12, p. 9
- By:
- Publication type:
- Article
PREVENTION OF DNS AMPLIFICATION ATTACKS.
- Published in:
- Annals of DAAAM & Proceedings, 2023, v. 34, p. 82, doi. 10.2507/34th.daaam.proceedings.012
- By:
- Publication type:
- Article
DNS rule-based schema to botnet detection.
- Published in:
- Enterprise Information Systems, 2021, v. 15, n. 4, p. 545, doi. 10.1080/17517575.2019.1644673
- By:
- Publication type:
- Article
Design, Implementation and Performance Estimation of mtd64-ng, a New Tiny DNS64 Proxy.
- Published in:
- Journal of Computing & Information Technology, 2017, v. 25, n. 2, p. 91, doi. 10.20532/cit.2017.1003419
- By:
- Publication type:
- Article
Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the Internet.
- Published in:
- Kurdistan Journal of Applied Research (KJAR), 2020, v. 5, n. 2, p. 60, doi. 10.24017/science.2020.2.6
- By:
- Publication type:
- Article
Efficient Authentication Mechanism For Defending Against Reflection-Based Attacks on Domain Name System.
- Published in:
- Kurdistan Journal of Applied Research (KJAR), 2020, v. 5, n. 1, p. 164, doi. 10.24017/science.2020.1.12
- By:
- Publication type:
- Article
Physics-embedded graph network for accelerating phase-field simulation of microstructure evolution in additive manufacturing.
- Published in:
- NPJ Computational Materials, 2022, v. 8, n. 1, p. 1, doi. 10.1038/s41524-022-00890-9
- By:
- Publication type:
- Article
Italy: Enforcement of Blocking Order Against an ISP.
- Published in:
- Computer Law Review International, 2023, v. 24, n. 2, p. 63, doi. 10.9785/cri-2023-240207
- By:
- Publication type:
- Article
EU: No direct actions for annulment against binding decisions of the European Data Protection Board.
- Published in:
- Computer Law Review International, 2023, v. 24, n. 2, p. 60, doi. 10.9785/cri-2023-240206
- Publication type:
- Article
IoT identifier resolver with intelligent predictive cache.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2819, doi. 10.3969/j.issn.1001-3695.2013.09.066
- By:
- Publication type:
- Article
Core concerns: The need for a governance framework to protect global Internet infrastructure.
- Published in:
- Policy & Internet, 2024, v. 16, n. 2, p. 411, doi. 10.1002/poi3.382
- By:
- Publication type:
- Article
Privacy by Infrastructure: The Unresolved Case of the Domain Name System.
- Published in:
- Policy & Internet, 2019, v. 11, n. 1, p. 16, doi. 10.1002/poi3.195
- By:
- Publication type:
- Article
Internet Architecture and Human Rights: Beyond the Human Rights Gap.
- Published in:
- Policy & Internet, 2019, v. 11, n. 1, p. 6, doi. 10.1002/poi3.200
- By:
- Publication type:
- Article
Domain‐based distributed identifier‐locator mapping management in Internet‐of‐Things networks.
- Published in:
- International Journal of Network Management, 2018, v. 28, n. 5, p. 1, doi. 10.1002/nem.2035
- By:
- Publication type:
- Article
An economic mechanism for request routing and resource allocation in hybrid CDN-P2P networks.
- Published in:
- International Journal of Network Management, 2015, v. 25, n. 6, p. 375, doi. 10.1002/nem.1891
- By:
- Publication type:
- Article
DNS-Class: immediate classification of IP flows using DNS.
- Published in:
- International Journal of Network Management, 2014, v. 24, n. 4, p. 272, doi. 10.1002/nem.1864
- By:
- Publication type:
- Article
Fast-Start Video Delivery in Future Internet Architectures with Intra-domain Caching.
- Published in:
- Mobile Networks & Applications, 2017, v. 22, n. 1, p. 98, doi. 10.1007/s11036-016-0694-8
- By:
- Publication type:
- Article
Traffic-aware auto-configuration protocol for service oriented low-power and lossy networks in IoT.
- Published in:
- Wireless Networks (10220038), 2019, v. 25, n. 7, p. 4231, doi. 10.1007/s11276-019-02086-4
- By:
- Publication type:
- Article
A channel reservation based cooperative multi-channel MAC protocol for the next generation WLAN.
- Published in:
- Wireless Networks (10220038), 2018, v. 24, n. 2, p. 627, doi. 10.1007/s11276-016-1355-3
- By:
- Publication type:
- Article
Enhancing the performance of TCP over Wi-Fi power saving mechanisms.
- Published in:
- Wireless Networks (10220038), 2012, v. 18, n. 8, p. 893, doi. 10.1007/s11276-012-0441-4
- By:
- Publication type:
- Article
ONLINE AT RISK! ONLINE ACTIVITIES OF CHILDREN IN DORMITORIES: EXPERIENCES IN A CROATIAN COUNTY.
- Published in:
- International Journal of Child, Youth & Family Studies, 2020, v. 11, n. 4, Part 1, p. 54, doi. 10.18357/ijcyfs114202019938
- By:
- Publication type:
- Article
Developing Transparent IDS for VANETs Using LIME and SHAP: An Empirical Study.
- Published in:
- Computers, Materials & Continua, 2023, v. 77, n. 3, p. 3185, doi. 10.32604/cmc.2023.044650
- By:
- Publication type:
- Article
CLEC: Combination Locality Based Erasure Code for Permissioned Blockchain Storage.
- Published in:
- Computers, Materials & Continua, 2022, v. 73, n. 3, p. 5137, doi. 10.32604/cmc.2022.028305
- By:
- Publication type:
- Article
Blockzone: A Decentralized and Trustworthy Data Plane for DNS.
- Published in:
- Computers, Materials & Continua, 2020, v. 65, n. 2, p. 1531, doi. 10.32604/cmc.2020.010949
- By:
- Publication type:
- Article
Self-Certificating Root: A Root Zone Security Enhancement Mechanism for DNS.
- Published in:
- Computers, Materials & Continua, 2020, v. 63, n. 1, p. 521, doi. 10.32604/cmc.2020.07982
- By:
- Publication type:
- Article
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
- Published in:
- IEEE Internet Computing, 2015, v. 19, n. 1, p. 80, doi. 10.1109/MIC.2015.3
- By:
- Publication type:
- Article
Retrofitting Security into Network Protocols: The Case of DNSSEC.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 1, p. 66, doi. 10.1109/MIC.2014.14
- By:
- Publication type:
- Article
Unfinished Business.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 1, p. 88, doi. 10.1109/MIC.2014.18
- By:
- Publication type:
- Article
Concerns over ICANN's accountability, control.
- Published in:
- ComputerWorld Hong Kong, 2008, v. 25, n. 10, p. 24
- By:
- Publication type:
- Article
TERRITORIALITY CHALLENGES IN PROTECTING TRADEMARK INTERESTS IN THE SYSTEM OF GENERIC TOP-LEVEL DOMAINS (GTLDS).
- Published in:
- Marquette Intellectual Property Law Review, 2014, v. 18, n. 1, p. 217
- By:
- Publication type:
- Article
THE CORRECT [DOMAIN] NAME OF THE CHURCH: TECHNOLOGY, NAMING, AND LEGITIMACY IN THE LATTER-DAY SAINT TRADITION.
- Published in:
- Dialogue: A Journal of Mormon Thought, 2023, v. 56, n. 1, p. 1, doi. 10.5406/15549399.56.1.01
- By:
- Publication type:
- Article