Journal articles on the topic 'Domain Name Service'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Domain Name Service.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Victors, Jesse, Ming Li, and Xinwen Fu. "The Onion Name System." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 21–41. http://dx.doi.org/10.1515/popets-2017-0003.
Full textVIXIE, P. "Federated Domain Name Service Using DNS Metazones." IEICE Transactions on Communications E89-B, no. 4 (2006): 1144–49. http://dx.doi.org/10.1093/ietcom/e89-b.4.1144.
Full textZou, Futai, Siyu Zhang, Linsen Li, Li Pan, and Jianhua Li. "Detecting malware based on expired command-and-control traffic." International Journal of Distributed Sensor Networks 13, no. 7 (2017): 155014771772079. http://dx.doi.org/10.1177/1550147717720791.
Full textCheung, S. "Denial of service against the Domain Name System." IEEE Security & Privacy Magazine 4, no. 1 (2006): 40–45. http://dx.doi.org/10.1109/msp.2006.10.
Full textZhang, Denghui, Lijing Ren, and Zhaoquan Gu. "Enhancing the Privacy of Network Services through Trusted Computing." Applied Sciences 12, no. 18 (2022): 9191. http://dx.doi.org/10.3390/app12189191.
Full textMir, Jibran, and Azhar Mahmood. "Movie Aspects Identification Model for Aspect Based Sentiment Analysis." Information Technology And Control 49, no. 4 (2020): 564–82. http://dx.doi.org/10.5755/j01.itc.49.4.25350.
Full textHassanah, Hetty, and Wahyudi Wahyudi. "PENGAKUAN PUTUSAN PENYEDIA LAYANAN PENYELESAIAN SENGKETA NAMA DOMAIN ASING." Jurnal Bina Mulia Hukum 6, no. 1 (2021): 34–46. http://dx.doi.org/10.23920/jbmh.v6i1.240.
Full textYuchi, Xue Biao, An Lei Hu, and Xiao Dong Lee. "Improving Domain Name Service Availability via Cache Optimization Methods." Applied Mechanics and Materials 687-691 (November 2014): 2092–95. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2092.
Full textLiu, Siyuan, Shaoyong Guo, Ziwei Hu, et al. "Domain Name Service Mechanism Based on Master-Slave Chain." Intelligent Automation & Soft Computing 32, no. 2 (2022): 951–62. http://dx.doi.org/10.32604/iasc.2022.021202.
Full textSiamionava, T. V. "RIGHT TO A DOMAIN NAME (Part 1)." Vestnik of Polotsk State University. Part D. Economic and legal sciences, no. 5 (June 27, 2021): 145–51. http://dx.doi.org/10.52928/2070-1632-2021-56-5-145-151.
Full textSiamionava, Т. "Right to a domain name (Part 2)." Vestnik of Polotsk State University. Part D. Economic and legal sciences, no. 6 (August 15, 2021): 136–41. http://dx.doi.org/10.52928/2070-1632-2021-57-6-136-141.
Full textLi, Ruixiang, Rui Xu, Yuanyuan Ma, and Xiangyang Luo. "LandmarkMiner." ACM Transactions on Internet of Things 2, no. 3 (2021): 1–22. http://dx.doi.org/10.1145/3457409.
Full textLiu, Yi, Sha Liu, Junyu Wang, et al. "A Credible Food Traceability System Based on Domain Name System Security Extensions." International Journal of Online Engineering (iJOE) 14, no. 04 (2018): 111. http://dx.doi.org/10.3991/ijoe.v14i04.8385.
Full textGhazaleh, Shereen Abu. "Fighting Cybersquatting: Nominet Disputes Resolution Service Policy." Business Law Review 32, Issue 2 (2011): 31–34. http://dx.doi.org/10.54648/bula2011008.
Full textMaia, Ricardo J. M., Dustin Ray, Sikha Pentyala, et al. "An end-to-end framework for private DGA detection as a service." PLOS ONE 19, no. 8 (2024): e0304476. http://dx.doi.org/10.1371/journal.pone.0304476.
Full textZhang, Ning, Le Jun Chi, and Hai Yan Xu. "Domain Names Based on Fault Tree Analysis." Applied Mechanics and Materials 667 (October 2014): 143–48. http://dx.doi.org/10.4028/www.scientific.net/amm.667.143.
Full textLiddicoat, Joy. "A country road: domain name disputes in .nz—is private dispute resolution working?" International Journal of Law and Information Technology 27, no. 4 (2019): 409–36. http://dx.doi.org/10.1093/ijlit/eaz013.
Full textBagnato, Domenica. "The network information systems directive (EU) 2016/1148: internet service providers and registraties." Central and Eastern European eDem and eGov Days 338 (July 15, 2020): 111–22. http://dx.doi.org/10.24989/ocg.v.338.9.
Full textMason, Paul Eric. "Como Resolver Disputas Sobre Nomes de Domínio na Internet." Revista Brasileira de Arbitragem 9, Issue 33 (2012): 122–35. http://dx.doi.org/10.54648/rba2012005.
Full textZhang, Mingming, Xiang Li, Baojun Liu, et al. "Detecting and Measuring Security Risks of Hosting-Based Dangling Domains." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 1 (2023): 1–28. http://dx.doi.org/10.1145/3579440.
Full textTian, Hong Cheng, Hong Wang, and Jin Kui Ma. "Domain Name System during the Transition from IPv4 to IPv6." Applied Mechanics and Materials 687-691 (November 2014): 1912–15. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1912.
Full textTian, Hong Cheng, and Hong Wang. "Deployment and Exploration of Domain Name System Based on IPv6." Applied Mechanics and Materials 668-669 (October 2014): 1247–52. http://dx.doi.org/10.4028/www.scientific.net/amm.668-669.1247.
Full textTalib, Muhammad Adeel, Muhammad Nabeel Talib, and Madiha Akhtar. "Service Packaging: A Pattern Based Approach Towards Service Delivery." Computer and Information Science 12, no. 2 (2019): 14. http://dx.doi.org/10.5539/cis.v12n2p14.
Full textLi, Yunliang, Zhiqiang Du, Yanfang Fu, and Liangxin Liu. "Role-Based Access Control Model for Inter-System Cross-Domain in Multi-Domain Environment." Applied Sciences 12, no. 24 (2022): 13036. http://dx.doi.org/10.3390/app122413036.
Full textLi, Chao, Yanan Cheng, Hao Men, Zhaoxin Zhang, and Ning Li. "Performance Analysis of Root Anycast Nodes Based on Active Measurement." Electronics 11, no. 8 (2022): 1194. http://dx.doi.org/10.3390/electronics11081194.
Full textYuan, Lihua, Chao-Chih Chen, Prasant Mohapatra, Chen-Nee Chuah, and Krishna Kant. "A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival Strategies." ACM Transactions on Internet Technology 12, no. 3 (2013): 1–26. http://dx.doi.org/10.1145/2461321.2461324.
Full textZaka Ullah. "Infrastructure of DNS/DNSSEC." Lahore Garrison University Research Journal of Computer Science and Information Technology 1, no. 3 (2017): 58–66. http://dx.doi.org/10.54692/lgurjcsit.2017.010323.
Full textTedja, Andreas, Charles Lim, and Heru Purnomo Ipung. "Detecting Network Anomalies In ISP Network Using DNS And NetFlow." ICONIET PROCEEDING 2, no. 3 (2019): 238–42. http://dx.doi.org/10.33555/iconiet.v2i3.38.
Full textKatzan, Jr., Harry. "Cybersecurity Service Model." Journal of Service Science (JSS) 5, no. 2 (2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.
Full textLuo, Xi, Yixin Li, Hongyuan Cheng, and Lihua Yin. "AGCN-Domain: Detecting Malicious Domains with Graph Convolutional Network and Attention Mechanism." Mathematics 12, no. 5 (2024): 640. http://dx.doi.org/10.3390/math12050640.
Full textHasan, Dana, Rebeen R. Hama Amin, and Masnida Hussin. "Efficient Authentication Mechanism for Defending Against Reflection-Based Attacks on Domain Name System." Kurdistan Journal of Applied Research 5, no. 1 (2020): 164–74. http://dx.doi.org/10.24017/science.2020.1.12.
Full textKirstein, Peter T. "Edge Networks & Devices for the Internet of Things." Daedalus 145, no. 1 (2016): 33–42. http://dx.doi.org/10.1162/daed_a_00363.
Full textSchneider, J., A. Klein, C. Mannweiler, and H. D. Schotten. "An efficient architecture for the integration of sensor and actuator networks into the future internet." Advances in Radio Science 9 (August 1, 2011): 231–35. http://dx.doi.org/10.5194/ars-9-231-2011.
Full textChen, Min-Xiou, and Chi-Hsun Wu. "The Network Live Migration Design Based On The Mobile IPv6 Network Mobility For Hybrid Cloud Network." International Journal of Advanced Networking and Applications 13, no. 06 (2022): 5229–36. http://dx.doi.org/10.35444/ijana.2022.13609.
Full textHuang, Zhen Sheng. "Liner Model of Two-Stage Server Numbers and Load Throughputs." Applied Mechanics and Materials 182-183 (June 2012): 1303–7. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.1303.
Full textDövényi-Nagy, Tamás. "Internet Browsing Habits and Domain Choice Preferences of Economic Agricultural Engineers." Acta Agraria Debreceniensis, no. 13 (May 4, 2004): 134–37. http://dx.doi.org/10.34101/actaagrar/13/3398.
Full textAl-Shehri, Saleh Fadel S., and Chun Lin Li. "Quality of Service for Cloud Computing." Advanced Materials Research 905 (April 2014): 683–86. http://dx.doi.org/10.4028/www.scientific.net/amr.905.683.
Full textAsswad, Mohammad Mourhaf AL, Sergio de Cesare, and Mark Lycett. "A Query-based Approach for Semi-Automatic Annotation of Web Services." International Journal of Information Systems and Social Change 2, no. 2 (2011): 37–54. http://dx.doi.org/10.4018/jissc.2011040103.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textBenyó, Balázs, Miklós Hatwágner, Tamás Heckenast, Katalin Kovács, Ágnes Varga, and Norbert Varjasi. "Design and Implementation of Enum-Based Services." JUCS - Journal of Universal Computer Science 12, no. (9) (2006): 1128–38. https://doi.org/10.3217/jucs-012-09-1128.
Full textBenkler, Yochai. "WikiLeaks and the protect-ip Act: A New Public-Private Threat to the Internet Commons." Daedalus 140, no. 4 (2011): 154–64. http://dx.doi.org/10.1162/daed_a_00121.
Full textWang, Jiachen, Zhiping Li, Zhaoxin Zhang, Jian Chen, Chao Li, and Yanan Cheng. "Root Mirror Sites Identification and Service Area Analysis." Electronics 12, no. 7 (2023): 1737. http://dx.doi.org/10.3390/electronics12071737.
Full textGao, Tianfu, and Qingkuan Dong. "DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium Blockchain." Sensors 23, no. 14 (2023): 6366. http://dx.doi.org/10.3390/s23146366.
Full textSekhar, Sirish. "Serverless Deployment of a Next.js Application Using AWS." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 2617–20. https://doi.org/10.22214/ijraset.2025.72702.
Full textBabo, Winarto, and Metty Mustikasari. "EVALUATION OF MOBILE APPLICATION BPJSTKU USING COBIT 5 FRAMEWORK (STUDY CASE: BPJS KETENAGAKERJAAN)." International Journal of Engineering Technologies and Management Research 8, no. 7 (2021): 103–14. http://dx.doi.org/10.29121/ijetmr.v8.i7.2021.963.
Full textVos, Rutger, Jordan Biserkov, Bachir Balech, et al. "Enriched biodiversity data as a resource and service." Biodiversity Data Journal 2 (June 16, 2014): e1125. https://doi.org/10.3897/BDJ.2.e1125.
Full textFirdausillah, Fahri, Muhammad Hafidz, Erika Devi Udayanti, and Etika Kartikadarma. "Sistem Deteksi Surel SPAM Dengan DNSBL Dan Support Vector Machine Pada Penyedia Layanan Mail Marketing." Journal of Information System Research (JOSH) 3, no. 4 (2022): 618–25. http://dx.doi.org/10.47065/josh.v3i4.1795.
Full textChen, Hong Ming, Hui Zhang, and Da Feng Shen. "Research of the DNS Server Deployment in Multi-Export Network." Applied Mechanics and Materials 475-476 (December 2013): 915–19. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.915.
Full textWidyaningsih, Pipin, and Intan Oktaviani. "Induksi Teknologi Informasi Untuk Penguatan Usaha “Hasbuna Catering” Pada Masa Pandemi Covid 2019." Duta Abdimas 1, no. 1 (2022): 1–6. http://dx.doi.org/10.47701/abdimas.v1i1.1581.
Full textPattiwar, Shravan Kumar, and Harish Ballu. "Improved way of Content Delivery Network Management with Authenticated Delegation Service." International Journal of Trend in Scientific Research and Development 3, no. 1 (2018): 1250–68. https://doi.org/10.31142/ijtsrd20218.
Full text