Works matching DE "INTERNET domain naming system"
Results: 273
MTL-DoHTA: Multi-Task Learning-Based DNS over HTTPS Traffic Analysis for Enhanced Network Security.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 993, doi. 10.3390/s25040993
- By:
- Publication type:
- Article
Things are (not) Gonna Get Easier: Teaching Online Information Evaluation with Tupac.
- Published in:
- Alki: The Washington Library Association Journal, 2017, v. 33, n. 2, p. 20
- By:
- Publication type:
- Article
An enhanced mechanism for detection of Domain Name System‐based distributed reflection denial of service attacks depending on modified metaheuristic algorithms and adaptive thresholding techniques.
- Published in:
- IET Networks (Wiley-Blackwell), 2022, v. 11, n. 5, p. 169, doi. 10.1049/ntw2.12043
- By:
- Publication type:
- Article
Physics-embedded graph network for accelerating phase-field simulation of microstructure evolution in additive manufacturing.
- Published in:
- NPJ Computational Materials, 2022, v. 8, n. 1, p. 1, doi. 10.1038/s41524-022-00890-9
- By:
- Publication type:
- Article
FIDO: Fast IDentity Online.
- Published in:
- ISSA Journal, 2020, v. 18, n. 12, p. 22
- By:
- Publication type:
- Article
S/MIME Certificate Management through DNS DANE: A NEW APPROACH.
- Published in:
- ISSA Journal, 2018, v. 16, n. 6, p. 20
- By:
- Publication type:
- Article
AGCN-Domain: Detecting Malicious Domains with Graph Convolutional Network and Attention Mechanism.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 5, p. 640, doi. 10.3390/math12050640
- By:
- Publication type:
- Article
Software defined networking based network traffic classification using machine learning techniques.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-70983-6
- By:
- Publication type:
- Article
THE BUSINESS (IN)SIGNIFICANCE OF THE PRE-DOT DOMAIN NAME WORDING.
- Published in:
- Scientific Papers of the University of Pardubice. Series D, Faculty of Economics & Administration, 2013, v. 20, n. 28, p. 67
- By:
- Publication type:
- Article
Web of-Things Devices Based on Dns Name Auto Pattern In Ipv4 System Using Dnsnav4.
- Published in:
- Indian Journal of Public Health Research & Development, 2018, v. 9, n. 3, p. 475, doi. 10.5958/0976-5506.2018.00330.3
- By:
- Publication type:
- Article
Data Structure and Management Protocol to Enhance Name Resolving in Named Data Networking.
- Published in:
- Future Internet, 2024, v. 16, n. 4, p. 118, doi. 10.3390/fi16040118
- By:
- Publication type:
- Article
N-Trans: Parallel Detection Algorithm for DGA Domain Names.
- Published in:
- Future Internet, 2022, v. 14, n. 7, p. 209, doi. 10.3390/fi14070209
- By:
- Publication type:
- Article
Botnet Detection Technology Based on DNS.
- Published in:
- Future Internet, 2017, v. 9, n. 4, p. 55, doi. 10.3390/fi9040055
- By:
- Publication type:
- Article
WELCOME FROM THE INTELLECTUAL PROPERTY LAW SECTION.
- Published in:
- Advocate (05154987), 2012, v. 55, n. 10, p. 16
- By:
- Publication type:
- Article
The End of HTTP and the Library Website: The Growing Need for HTTPS in Library Services.
- Published in:
- Christian Librarian, 2015, v. 58, n. 2, p. 102
- By:
- Publication type:
- Article
BEYOND THE GOVERNANCE GAP IN INTERNATIONAL DOMAIN NAME LAW: BRINGING THE UDRP IN LINE WITH INTERNATIONALLY RECOGNIZED HUMAN RIGHTS.
- Published in:
- Stanford Journal of International Law, 2020, v. 56, n. 1, p. 79
- By:
- Publication type:
- Article
DIVERSIFYING THE DOMAIN NAME GOVERNANCE FRAMEWORK.
- Published in:
- Berkeley Technology Law Journal, 2017, v. 32, n. 1, p. 137, doi. 10.15779/Z38599Z19K
- By:
- Publication type:
- Article
Notice and Takedown in the Domain Name System: ICANN's Ambivalent Drift into Online Content Regulation.
- Published in:
- Washington & Lee Law Review, 2017, v. 74, n. 3, p. 1345
- By:
- Publication type:
- Article
Design, Implementation and Performance Estimation of mtd64-ng, a New Tiny DNS64 Proxy.
- Published in:
- Journal of Computing & Information Technology, 2017, v. 25, n. 2, p. 91, doi. 10.20532/cit.2017.1003419
- By:
- Publication type:
- Article
historical explanation of Chinese cybersovereignty.
- Published in:
- International Relations of the Asia-Pacific, 2022, v. 22, n. 3, p. 469, doi. 10.1093/irap/lcab009
- By:
- Publication type:
- Article
Implementation Strategy Analysis of Network Security using dalo RADIUS and Pi-hole DNS Server to enhance Computer Network Security, Case Study: XYZ as a Fintech Company.
- Published in:
- Jurnal Indonesia Sosial Teknologi, 2024, v. 5, n. 10, p. 4364, doi. 10.59141/jist.v5i10.5321
- By:
- Publication type:
- Article
CYBER SOVEREIGNTY AT ITS BOLDEST: A CHINESE PERSPECTIVE.
- Published in:
- Ohio State Technology Law Journal, 2020, v. 16, n. 2, p. 395
- By:
- Publication type:
- Article
Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography.
- Published in:
- EAI Endorsed Transactions on Pervasive Health & Technology, 2022, v. 8, n. 4, p. 1, doi. 10.4108/eetpht.v8i4.3081
- By:
- Publication type:
- Article
Advancing DNS Performance Through an Adaptive Transport Layer Security Model (ad-TLSM).
- Published in:
- Ingénierie des Systèmes d'Information, 2023, v. 28, n. 3, p. 777, doi. 10.18280/isi.280329
- By:
- Publication type:
- Article
Design and Performance Evaluation of a Transport Protocol for Ad hoc Networks.
- Published in:
- Computer Journal, 2009, v. 52, n. 2, p. 186
- By:
- Publication type:
- Article
An intelligent proactive defense against the client‐side DNS cache poisoning attack via self‐checking deep reinforcement learning.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 10, p. 8170, doi. 10.1002/int.22934
- By:
- Publication type:
- Article
Fast-Start Video Delivery in Future Internet Architectures with Intra-domain Caching.
- Published in:
- Mobile Networks & Applications, 2017, v. 22, n. 1, p. 98, doi. 10.1007/s11036-016-0694-8
- By:
- Publication type:
- Article
A machine learning approach for imputation and anomaly detection in IoT environment.
- Published in:
- Expert Systems, 2020, v. 37, n. 5, p. 1, doi. 10.1111/exsy.12556
- By:
- Publication type:
- Article
Active Queue Management in TCP Networks Based on Fuzzy-Pid Controller.
- Published in:
- Journal of Applied Computer Science & Mathematics, 2012, n. 12, p. 9
- By:
- Publication type:
- Article
A Solution for Improving Communication in Desktop Grid Systems.
- Published in:
- Petroleum - Gas University of Ploiesti Bulletin, Mathematics - Informatics - Physics Series, 2009, v. 61, n. 2, p. 27
- By:
- Publication type:
- Article
Blacklists and whitelists in the framework of a domain reputation system.
- Published in:
- Romanian Journal of Information Technology & Automatic Control / Revista Română de Informatică și Automatică, 2023, v. 33, n. 4, p. 33, doi. 10.33436/v33i4y202303
- By:
- Publication type:
- Article
Considerații teoretice privind stabilirea reputației unui domeniu Internet.
- Published in:
- Romanian Journal of Information Technology & Automatic Control / Revista Română de Informatică și Automatică, 2023, v. 33, n. 1, p. 81, doi. 10.33436/v33i1y202307
- By:
- Publication type:
- Article
Context-aware Fuzzy Control Systems.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2014, v. 24, n. 5, p. 825, doi. 10.1142/S0218194014500326
- By:
- Publication type:
- Article
THE MODEL FOR A PATH FORWARD. A PROPOSAL FOR A MODEL LAW DEALING WITH CYBER-SQUATTING AND OTHER ABUSIVE DOMAIN NAME PRACTICES.
- Published in:
- Denning Law Journal, 2015, v. 27, p. 204, doi. 10.5750/dlj.v27i0.989
- By:
- Publication type:
- Article
A site selection method of DNS using the particle swarm optimization algorithm.
- Published in:
- Transactions in GIS, 2017, v. 21, n. 5, p. 969, doi. 10.1111/tgis.12244
- By:
- Publication type:
- Article
SOFT LAW IN U.S. ICT SECTORS: FOUR CASE STUDIES.
- Published in:
- Jurimetrics: The Journal of Law, Science & Technology, 2020, v. 61, n. 1, p. 79
- By:
- Publication type:
- Article
Delivering resilient access to global climate projections data for the Copernicus Climate Data Store using a distributed data infrastructure and hybrid cloud model.
- Published in:
- Geophysical Research Abstracts, 2019, v. 21, p. 1
- By:
- Publication type:
- Article
Malicious Domain Names Detection by Improved Relief-C5.0.
- Published in:
- Journal of Computer Engineering & Applications, 2022, v. 58, n. 11, p. 100, doi. 10.3778/j.issn.1002-8331.2012-0475
- By:
- Publication type:
- Article
基于域名系统知识图谱的 CDN 域名识别技术.
- Published in:
- Journal of Computer Engineering & Applications, 2022, v. 58, n. 6, p. 149, doi. 10.3778/j.issn.1002-8331.2010-0338
- By:
- Publication type:
- Article
SCATTER SEARCH WITH MULTIPLE IMPROVEMENT METHODS FOR THE LINEAR ORDERING PROBLEM.
- Published in:
- Malaysian Journal of Computer Science, 2012, v. 25, n. 2, p. 76, doi. 10.22452/mjcs.vol25no2.2
- By:
- Publication type:
- Article
DEVELOPMENT OF AN ALGORITHM TO PROTECT USER COMMUNICATION DEVICES AGAINST DATA LEAKS.
- Published in:
- Eastern-European Journal of Enterprise Technologies, 2021, v. 109, n. 2, p. 24, doi. 10.15587/1729-4061.2021.225339
- By:
- Publication type:
- Article
MEASURING MOBILE BROADBAND PERFORMANCE IN NIGERIA: 2G AND 3G.
- Published in:
- Nigerian Journal of Technology, 2019, v. 38, n. 2, p. 422, doi. 10.4314/njt.v38i2.19
- By:
- Publication type:
- Article
Ada-related Resources.
- Published in:
- Ada User Journal, 2021, v. 42, n. 2, p. 68
- By:
- Publication type:
- Article
Performance analysis of relative service using TCP-aware marking and dynamic WRED.
- Published in:
- International Journal of Communication Systems, 2009, v. 22, n. 3, p. 277, doi. 10.1002/dac.971
- By:
- Publication type:
- Article
Optimal choice of threshold in Two Level Processor Sharing.
- Published in:
- Annals of Operations Research, 2009, v. 170, n. 1, p. 21, doi. 10.1007/s10479-008-0430-2
- By:
- Publication type:
- Article
Review of Alpana Roy, Australian Domain Name Law.
- Published in:
- Journal of Law, Information & Science, 2015, v. 24, n. 1, p. 144
- By:
- Publication type:
- Article
BGP Neighbor Trust Establishment Mechanism Based on the Bargaining Game.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 3, p. 110, doi. 10.3390/info12030110
- By:
- Publication type:
- Article
Another Step in the Ladder of DNS-Based Covert Channels: Hiding Ill-Disposed Information in DNSKEY RRs.
- Published in:
- Information (2078-2489), 2019, v. 10, n. 9, p. 284, doi. 10.3390/info10090284
- By:
- Publication type:
- Article
A Framework to Mitigate Attacks in Web Applications.
- Published in:
- IUP Journal of Computer Sciences, 2021, v. 15, n. 1, p. 22
- By:
- Publication type:
- Article
PREVENTION OF DNS AMPLIFICATION ATTACKS.
- Published in:
- Annals of DAAAM & Proceedings, 2023, v. 34, p. 82, doi. 10.2507/34th.daaam.proceedings.012
- By:
- Publication type:
- Article