To see the other types of publications on this topic, follow the link: Domain Name System over Quic.

Journal articles on the topic 'Domain Name System over Quic'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Domain Name System over Quic.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Blaise, Ohwo Onome, Ajayi Wumi, and Udosen Alfred. "Enhancing DNS Performance with Efficient Cryptographic Algorithms: A Comparative Study of DoT Frameworks." Asian Journal of Computer Science and Technology 13, no. 2 (2024): 48–55. https://doi.org/10.70112/ajcst-2024.13.2.4288.

Full text
Abstract:
The Domain Name System (DNS) is a critical component of the Internet, and its disruption can significantly affect service quality. To enhance security and protect user privacy, encrypted protocols, such as DNS over TLS (DoT), DNS over Quick UDP Internet Connections (DoQ), and DNS over HTTPS (DoH), have been introduced. This study evaluates the performance impact of different cryptographic algorithms within the DoT framework, focusing on how encryption influences DNS query performance and resolver efficiency. Performance evaluations were conducted using various cryptographic algorithms under di
APA, Harvard, Vancouver, ISO, and other styles
2

Mae Reyes Aribon-Libag, Christle. "Billing and online payment portal with multi-factor authentication using one-time password." Journal of Advanced Computer Science & Technology 12, no. 1 (2024): 1–18. http://dx.doi.org/10.14419/ggq10d74.

Full text
Abstract:
NCTVN Cable Network Corporation is a cable/internet distributor in Kidapawan City. Its area of operation covers Makilala, Arakan, Antipas,Matalam, Midsayap,Magpet President Roxas, Kabacan and Kidapawan City. The users of cable and internet rely to them in which they have to extend their services to the Province. By this venture, the number of subscribers of their services has grown and the area covered are widen. Given the number of subscribers there is a need to create a consistent and quick support to their customers in terms of billing presentment and payment. In the current process, Billin
APA, Harvard, Vancouver, ISO, and other styles
3

Victors, Jesse, Ming Li, and Xinwen Fu. "The Onion Name System." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 21–41. http://dx.doi.org/10.1515/popets-2017-0003.

Full text
Abstract:
Abstract Tor onion services, also known as hidden services, are anonymous servers of unknown location and ownership that can be accessed through any Torenabled client. They have gained popularity over the years, but since their introduction in 2002 still suffer from major usability challenges primarily due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in this work we introduce the Onion Name System (OnioNS), a privacy-enhanced decentralized name resolution service. OnioNS allows Tor users to reference an onion service by a meaningful globally-uni
APA, Harvard, Vancouver, ISO, and other styles
4

Gao, Tianfu, and Qingkuan Dong. "DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium Blockchain." Sensors 23, no. 14 (2023): 6366. http://dx.doi.org/10.3390/s23146366.

Full text
Abstract:
The Domain Name System (DNS) is a fundamental component of the internet, responsible for resolving domain names into IP addresses. DNS servers are typically categorized into four types: recursive resolvers, root name servers, Top-Level Domain (TLD) name servers, and authoritative name servers. The latter three types of servers store actual records, while recursive resolvers do not store any real data and are only responsible for querying the other three types of servers and responding to clients. Recursive resolvers typically maintain a caching system to speed up response times, but these cach
APA, Harvard, Vancouver, ISO, and other styles
5

Korobeinikova, Tetiana, and Taras Fedchuk. "OVERVIEW OF SECURE ACCESS TO DOMAIN NAME SYSTEM RESOURCES." Information technology and computer engineering 59, no. 1 (2024): 40–53. http://dx.doi.org/10.31649/1999-9941-2024-59-1-40-53.

Full text
Abstract:
Abstract. The Domain Name System (DNS) is responsible for translating server's IP address into a domain name, enabling an end user to access a resource without having to remember it’s IP address. This protocol is the basis of the modern Internet, but all messages between the client and the server pass through an unprotected communication channel, which makes it vulnerable to various types of attacks (Spoofing, Eavesdropping, Phishing and others). To overcome this problem, DNSSEC (DNS Secure), DoT (DNS over TLS) and DNS over HTTPS (DoH) protocols were developed. The last one was the most effect
APA, Harvard, Vancouver, ISO, and other styles
6

Jeon, Juseong, and Sejin Park. "Setonix: Blockchain-Based Hierarchy Domain Name System for Web3." Applied Sciences 14, no. 23 (2024): 11213. https://doi.org/10.3390/app142311213.

Full text
Abstract:
DNS is an essential component for internet access, but the traditional centralized structure is not suitable for the rapidly growing Web3 ecosystem. Currently, Web3 services rely on Web2-based access paths, revealing limitations such as the Single Point of Failure (SPoF) issue and the compromise of decentralization principles. To address these issues, this paper proposes Setonix, a blockchain-based decentralized DNS. Experimental results of the implemented Setonix showed that it had only a marginal performance difference of up to approximately 5% compared to Google and Cloudflare DNS. Addition
APA, Harvard, Vancouver, ISO, and other styles
7

Hakiki, Nur, and Sanusi Sanusi. "SETTLEMENT OF DISPUTES OVER DOMAIN NAMES OWNERSHIP AND CYBERSQUATTING IN INDONESIA AND SINGAPORE." Student Journal of International Law 3, no. 1 (2023): 95–107. https://doi.org/10.24815/sjil.v3i1.24872.

Full text
Abstract:
The article was conducted based on the rise of cybersquatting against domain names in Indonesia, while the legal protection against cybersquatting of domain names remained ineffective compared to other Southeast Asian countries such as Sungapore. Singapore can be the best country for Indonesia to compare with, due to its already has a perfect legal system and law enforcement toward domain dispute cases. The litigation settlement of domain names in Indonesia emphasizes on the registration aspect to make the court proceeding procedure easier. Meanwhile, in the non-litigation process, Domain Name
APA, Harvard, Vancouver, ISO, and other styles
8

M. Banadaki, Yaser. "Detecting Malicious DNS over HTTPS Traffic in Domain Name System using Machine Learning Classifiers." Journal of Computer Sciences and Applications 8, no. 2 (2020): 46–55. http://dx.doi.org/10.12691/jcsa-8-2-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Novianto, Dian, Lukas Tommy, Yohanes Setiawan Japriadi, and Sujono. "Mitigasi Serangan DNS Cache Poisoning Pada Local Area Network Berbasis Routerboard Mikrotik." Jurnal Ilmiah Informatika Global 15, no. 3 (2024): 124–30. https://doi.org/10.36982/jiig.v15i3.4816.

Full text
Abstract:
Domain Name System (DNS) enables users to access websites via domain names, offering convenient navigation. However, criminals can exploit this convenience to redirect connections from user devices to fake servers for a variety of purposes. A form of attack known as DNS cache poisoning exploits vulnerabilities in the Domain Name System (DNS) to redirect connections from a legitimate website address to an illegitimate one. As a consequence of the fact that users of networked systems are typically unaware that they are accessing an illegitimate site, this attack can have a particularly damaging
APA, Harvard, Vancouver, ISO, and other styles
10

Tarasenko, Leonid. "LEGAL REGIME OF A DOMAIN NAME AND PROCEDURE FOR RESOLVING DOMAIN DISPUTES IN UKRAINE." Access to Justice in Eastern Europe 8, no. 1 (2025): 387–416. https://doi.org/10.33327/ajee-18-8.1-a000118.

Full text
Abstract:
Background: Domain name disputes arise concerning the protection of rights to domain names. The legal nature of a domain name as an object remains uncertain, leading to ambiguity in its legal regime. This uncertainty creates challenges in law enforcement and affects the procedures for resolving domain disputes. Ukraine's current civil legislation does not clarify the classification of domain names within the system of civil rights objects. However, the growing role of the digital environment has significantly increased the importance of domain names, contributing to increased disputes over the
APA, Harvard, Vancouver, ISO, and other styles
11

Antic, Djordje, and Mladen Veinovic. "Implementation of DNSSEC-secured name servers for ni.rs zone and best practices." Serbian Journal of Electrical Engineering 13, no. 3 (2016): 369–80. http://dx.doi.org/10.2298/sjee1603369a.

Full text
Abstract:
As a backbone of all communications over the Internet, DNS (Domain Name System) is crucial for all entities that need to be visible and provide services outside their internal networks. Public administration is a prime example for various services that have to be provided to citizens. This manuscript presents one possible approach, implemented in the administration of the City of Nis, for improving the robustness and resilience of external domain space, as well as securing it with DNSSEC (DNS Security Extensions).
APA, Harvard, Vancouver, ISO, and other styles
12

Fesl, Jan, Michal Konopa, and Jiří Jelínek. "A novel deep-learning based approach to DNS over HTTPS network traffic detection." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (2023): 6691. http://dx.doi.org/10.11591/ijece.v13i6.pp6691-6700.

Full text
Abstract:
<div align="center"><span lang="EN-US">Domain name system (DNS) over hypertext transfer protocol secure (HTTPS) (DoH) is currently a new standard for secure communication between DNS servers and end-users. Secure sockets layer (SSL)/transport layer security (TLS) encryption should guarantee the user a high level of privacy regarding the impossibility of data content decryption and protocol identification. Our team created a <a name="_Hlk143263730"></a>DoH data set from captured real network traffic and proposed novel deep-learning-based detection models allowing encrypt
APA, Harvard, Vancouver, ISO, and other styles
13

Jan, Fesl, Konopa Michal, and Jelínek Jiří. "A novel deep-learning based approach to DNS over HTTPS network traffic detection." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (2023): 6691–700. https://doi.org/10.11591/ijece.v13i6.pp6691-6700.

Full text
Abstract:
Domain name system (DNS) over hypertext transfer protocol secure (HTTPS) (DoH) is currently a new standard for secure communication between DNS servers and end-users. Secure sockets layer (SSL)/transport layer security (TLS) encryption should guarantee the user a high level of privacy regarding the impossibility of data content decryption and protocol identification. Our team created a DoH data set from captured real network traffic and proposed novel deep-learning-based detection models allowing encrypted DoH traffic identification. Our detection models were trained on the network traffi
APA, Harvard, Vancouver, ISO, and other styles
14

Abualghanam, Orieb, Hadeel Alazzam, Basima Elshqeirat, Mohammad Qatawneh, and Mohammed Amin Almaiah. "Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine Learning." Electronics 12, no. 6 (2023): 1467. http://dx.doi.org/10.3390/electronics12061467.

Full text
Abstract:
The domain name system (DNS) plays a vital role in network services for name resolution. By default, this service is seldom blocked by security solutions. Thus, it has been exploited for security breaches using the DNS covert channel (tunnel). One of the greatest current data leakage techniques is DNS tunneling, which uses DNS packets to exfiltrate sensitive and confidential data. Data protection against stealthy exfiltration attacks is critical for human beings and organizations. As a result, many security techniques have been proposed to address exfiltration attacks starting with building se
APA, Harvard, Vancouver, ISO, and other styles
15

Kowalewski, Jacek, and Monika Natkowska. "Wykorzystanie mapy statystyki krótkookresowej w procesie organizacji badań przedsiębiorstw prowadzonych przez statystykę publiczną." Przegląd Statystyczny. Statistical Review 2012, SI2 (2012): 222–36. http://dx.doi.org/10.59139/ps.2012.si2.3.

Full text
Abstract:
Short-Term Statistics (STS) deals with collecting, compiling and providing quick and multi-domain information about economic activity.Within the organizational system of surveys in Polish official statistics, conducting STS surveys is the task of the Statistical Office in Poznań, which specializes in this field. The main source of STS data is the survey of economic activity, code-named DG-1, which covers over 30 thousands reporting units every month. The system of data processing in DG-1 is very complex and involves combining data from other surveys, generalizing and converting data to constan
APA, Harvard, Vancouver, ISO, and other styles
16

Badgley, Robert. "IMPROVING ICANN IN TEN EASY STEPS: TEN SUGGESTIONS FOR ICANN TO IMPROVE ITS ANTI-CYBERSQUATTING ARBITRATION SYSTEM." Journal of Law, Technology & Policy 2001, no. 1 (2001): 109–28. http://dx.doi.org/10.70466/000000.

Full text
Abstract:
With the ICANN domain name dispute resolution regime in place for just over a year, practitioner Robert Badgley critiques its operation and identifies a number of early problems which have permitted different arbitration panels to reach contrary conclusions on the same issue. Badgley then offers ten steps that ICANN should undertake to cure these problems, with the overriding theme being to eliminate ambiguity and facilitate establishment of a uniform body of ICANN "precedent" for cybersquatting disputes. Establishing the context for his analysis, the author first examines the ICANN "statute"
APA, Harvard, Vancouver, ISO, and other styles
17

Sergo, Anton G., and Ekaterina I. Romanenkova. "World Intellectual Property Organisation's experience in domain dispute resolution." Vestnik Tomskogo gosudarstvennogo universiteta. Pravo, no. 43 (2022): 151–63. http://dx.doi.org/10.17223/22253513/43/13.

Full text
Abstract:
The current pace of development of information technology is such that no country's legal system can objectively keep up with its adequate regulation. As a consequence, the Internet community is looking for its own, equally reliable and effective, but fast and modern systems of fair resolution of conflicts that arise between the rightholders of various classic means of individualisation (usually trademarks) and domain names. In today's hightech world, the role and importance of domain names cannot be underestimated. They control destinies, prepare revolutions, crush cults and shape national po
APA, Harvard, Vancouver, ISO, and other styles
18

Ivanisenko, Timofey V., Pavel S. Demenkov, Nikolay A. Kolchanov, and Vladimir A. Ivanisenko. "The New Version of the ANDDigest Tool with Improved AI-Based Short Names Recognition." International Journal of Molecular Sciences 23, no. 23 (2022): 14934. http://dx.doi.org/10.3390/ijms232314934.

Full text
Abstract:
The body of scientific literature continues to grow annually. Over 1.5 million abstracts of biomedical publications were added to the PubMed database in 2021. Therefore, developing cognitive systems that provide a specialized search for information in scientific publications based on subject area ontology and modern artificial intelligence methods is urgently needed. We previously developed a web-based information retrieval system, ANDDigest, designed to search and analyze information in the PubMed database using a customized domain ontology. This paper presents an improved ANDDigest version t
APA, Harvard, Vancouver, ISO, and other styles
19

Singanamalla, Sudheesh, Suphanat Chunhapanya, Jonathan Hoyland, et al. "Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 575–92. http://dx.doi.org/10.2478/popets-2021-0085.

Full text
Abstract:
Abstract The Internet’s Domain Name System (DNS) responds to client hostname queries with corresponding IP addresses and records. Traditional DNS is unencrypted and leaks user information to on-lookers. Recent efforts to secure DNS using DNS over TLS (DoT) and DNS over HTTPS (DoH) have been gaining traction, ostensibly protecting DNS messages from third parties. However, the small number of available public large-scale DoT and DoH resolvers has reinforced DNS privacy concerns, specifically that DNS operators could use query contents and client IP addresses to link activities with identities. O
APA, Harvard, Vancouver, ISO, and other styles
20

Alzighaibi, Ahmad Reda. "Detection of DoH Traffic Tunnels Using Deep Learning for Encrypted Traffic Classification." Computers 12, no. 3 (2023): 47. http://dx.doi.org/10.3390/computers12030047.

Full text
Abstract:
Currently, the primary concerns on the Internet are security and privacy, particularly in encrypted communications to prevent snooping and modification of Domain Name System (DNS) data by hackers who may attack using the HTTP protocol to gain illegal access to the information. DNS over HTTPS (DoH) is the new protocol that has made remarkable progress in encrypting Domain Name System traffic to prevent modifying DNS traffic and spying. To alleviate these challenges, this study explored the detection of DoH traffic tunnels of encrypted traffic, with the aim to determine the gained information th
APA, Harvard, Vancouver, ISO, and other styles
21

Zhang, Mingming, Xiang Li, Baojun Liu, et al. "Detecting and Measuring Security Risks of Hosting-Based Dangling Domains." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 1 (2023): 1–28. http://dx.doi.org/10.1145/3579440.

Full text
Abstract:
Public hosting services provide convenience for domain owners to build web applications with better scalability and security. However, if a domain name points to released service endpoints (e.g., nameservers allocated by a provider), adversaries can take over the domain by applying the same endpoints. Such a security threat is called "hosting-based domain takeover''. In recent years, a large number of domain takeover incidents have occurred; even well-known websites like the subdomains of microsoft.com have been impacted. However, until now, there has been no effective detection system to iden
APA, Harvard, Vancouver, ISO, and other styles
22

Nakatsuka, Yoshimichi, Andrew Paverd, and Gene Tsudik. "PDoT." Digital Threats: Research and Practice 2, no. 1 (2021): 1–22. http://dx.doi.org/10.1145/3431171.

Full text
Abstract:
Security and privacy of the Internet Domain Name System (DNS) have been longstanding concerns. Recently, there is a trend to protect DNS traffic using Transport Layer Security (TLS). However, at least two major issues remain: (1) How do clients authenticate DNS-over-TLS endpoints in a scalable and extensible manner? and (2) How can clients trust endpoints to behave as expected? In this article, we propose a novel Private DNS-over-TLS (PDoT) architecture. PDoT includes a DNS Recursive Resolver (RecRes) that operates within a Trusted Execution Environment. Using Remote Attestation , DNS clients
APA, Harvard, Vancouver, ISO, and other styles
23

Heikkinen, Mikko, Anniina Kuusijärvi, Ville-Matti Riihikoski, and Leif Schulman. "Multi-domain Collection Management Simplified — the Finnish National Collection Management System Kotka." Biodiversity Information Science and Standards 4 (October 9, 2020): e59119. https://doi.org/10.3897/biss.4.59119.

Full text
Abstract:
Many natural history museums share a common problem: a multitude of legacy collection management systems (CMS) and the difficulty of finding a new system to replace them. Kotka is a CMS developed starting in 2011 at the Finnish Museum of Natural History (Luomus) and Finnish Biodiversity Information Facility (FinBIF) (Heikkinen et al. 2019, Schulman et al. 2019) to solve this problem. It has grown into a national system used by all natural history museums in Finland, and currently contains over two million specimens from several domains (zoological, botanical, paleontological, microbial, tissue
APA, Harvard, Vancouver, ISO, and other styles
24

Salat, Lehel, Mastaneh Davis, and Nabeel Khan. "DNS Tunnelling, Exfiltration and Detection over Cloud Environments." Sensors 23, no. 5 (2023): 2760. http://dx.doi.org/10.3390/s23052760.

Full text
Abstract:
The domain name system (DNS) protocol is fundamental to the operation of the internet, however, in recent years various methodologies have been developed that enable DNS attacks on organisations. In the last few years, the increased use of cloud services by organisations has created further security challenges as cyber criminals use numerous methodologies to exploit cloud services, configurations and the DNS protocol. In this paper, two different DNS tunnelling methods, Iodine and DNScat, have been conducted in the cloud environment (Google and AWS) and positive results of exfiltration have be
APA, Harvard, Vancouver, ISO, and other styles
25

Abu Al-Haija, Qasem, Manar Alohaly, and Ammar Odeh. "A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach." Sensors 23, no. 7 (2023): 3489. http://dx.doi.org/10.3390/s23073489.

Full text
Abstract:
The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. Despite its major role, DNS is vulnerable to various security loopholes that attackers have continually abused. Therefore, delivering secure DNS traffic has become challenging since attackers use advanced and fast malicious information-stealing approaches. To overcome DNS vulnerabilities, the DNS over HTTPS (DoH) protocol was introduced to improve the security of the DNS protocol by encrypting the DNS traffic and communicating it over a covert net
APA, Harvard, Vancouver, ISO, and other styles
26

Kadhim, Huda Yousif, Karim Hashim Al-saedi, and Mustafa Dhiaa Al-Hassani. "Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 10 (2019): 205. http://dx.doi.org/10.3991/ijim.v13i10.10797.

Full text
Abstract:
<strong>Abstract</strong>— The widespread use of smart phones nowadays makes them vulnerable to phishing. Phishing is the process of trying to steal user information over the Internet by claiming they are a trusted entity and thus access and steal the victim's data(user name, password and credit card details). Consequently, the need for mobile phishing detection system has become an urgent need. And this is what we are attempting to introduce in this paper, where we introduce a system to detect phishing websites on Android phones. That predicts and prevents phishing websites from d
APA, Harvard, Vancouver, ISO, and other styles
27

Díaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †." Sensors 19, no. 15 (2019): 3292. http://dx.doi.org/10.3390/s19153292.

Full text
Abstract:
IoT devices provide real-time data to a rich ecosystem of services and applications. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core networks. To alleviate the core of the network, other technologies like fog computing can be used. On the security side, designers of IoT low-cost devices and applications often reuse old versions of development frameworks and software components that contain vulnerabilities. Many server applications today are designed using microservice architectures where components are easier to update. Thu
APA, Harvard, Vancouver, ISO, and other styles
28

Dhiya Eddine, Abid, and Ghazli Abdelkader. "Securing DNS over HTTPS traffic: a real-time analysis tool." Computer Science and Information Technologies 5, no. 3 (2024): 227–34. http://dx.doi.org/10.11591/csit.v5i3.p227-234.

Full text
Abstract:
DNS over HTTPS (DoH) is a developing protocol that uses encryption to secure domain name system (DNS) queries within hypertext transfer protocol secure (HTTPS) connections, thereby improving privacy and security while browsing the web. This study involved the development of a live tool that captures and analyzes DoH traffic in order to classify it as either benign or malicious. We employed machine learning (ML) algorithms such as K-Nearest Neighbors (K-NN), random forest (RF), decision tree (DT), deep neural network (DNN), and support vector machine (SVM) to categorize the data. All of the alg
APA, Harvard, Vancouver, ISO, and other styles
29

Abid, Dhiya Eddine, and Abdelkader Ghazli. "Securing DNS over HTTPS traffic: a real-time analysis tool." Computer Science and Information Technologies 5, no. 3 (2024): 227–34. https://doi.org/10.11591/csit.v5i3.pp227-234.

Full text
Abstract:
DNS over HTTPS (DoH) is a developing protocol that uses encryption to secure domain name system (DNS) queries within hypertext transfer protocol secure (HTTPS) connections, thereby improving privacy and security while browsing the web. This study involved the development of a live tool that captures and analyzes DoH traffic in order to classify it as either benign or malicious. We employed machine learning (ML) algorithms such as K-nearest neighbors (K-NN), random forest (RF), decision tree (DT), deep neural network (DNN), and support vector machine (SVM) to categorize the data. All of the alg
APA, Harvard, Vancouver, ISO, and other styles
30

Berendt-Marchel, M., and A. Wawrzynczak. "Does the Zero Carry Essential Information for Artificial Neural Network learning to simulate the contaminant transport in Urban Areas?" Journal of Physics: Conference Series 2090, no. 1 (2021): 012027. http://dx.doi.org/10.1088/1742-6596/2090/1/012027.

Full text
Abstract:
Abstract The release of hazardous materials in urbanized areas is a considerable threat to human health and the environment. Therefore, it is vital to detect the contamination source quickly to limit the damage. In systems localizing the contamination source based on the measured concentrations, the dispersion models are used to compare the simulated and registered point concentrations. These models are run tens of thousands of times to find their parameters, giving the model output’s best fit to the registration. Artificial Neural Networks (ANN) can replace in localization systems the dispers
APA, Harvard, Vancouver, ISO, and other styles
31

Stvan, Laurel Smith. "The contingent meaning of –ex brand names in English." Corpora 1, no. 2 (2006): 217–50. http://dx.doi.org/10.3366/cor.2006.1.2.217.

Full text
Abstract:
The –ex string found in English product and company names (e.g., Kleenex, Timex and Virex), is investigated to discover whether this ending has consistent meaning across coined words and to observe any constraints on its attachment and interpretation. Seven hundred and ninety-three –exbrand name types were collected and examined, derived from American English texts in the Brown and Frown corpora as well as over 600 submissions to the US Patent and Trademark Office's Trademark Electronic Search System database (TESS); American native English speakers were also surveyed to assess interpretations
APA, Harvard, Vancouver, ISO, and other styles
32

Chiari, Mattia, Alfonso Emilio Gerevini, Francesco Percassi, Luca Putelli, Ivan Serina, and Matteo Olivato. "Goal Recognition as a Deep Learning Task: The GRNet Approach." Proceedings of the International Conference on Automated Planning and Scheduling 33, no. 1 (2023): 560–68. http://dx.doi.org/10.1609/icaps.v33i1.27237.

Full text
Abstract:
Recognising the goal of an agent from a trace of observations is an important task with many applications. The state-of-the-art approach to goal recognition (GR) relies on the application of automated planning techniques. We study an alternative approach, called GRNet, where GR is formulated as a classification task addressed by machine learning. GRNet is primarily aimed at solving GR instances more accurately and more quickly by learning how to solve them in a given domain, which is specified by a set of propositions and a set of action names. The goal classification instances in the domain a
APA, Harvard, Vancouver, ISO, and other styles
33

ververis, vasilis, Steffen Sassala, Felix Roth, and Vaibhav Bajpai. "Path to Encrypted DNS with DDR: Adoption, Configuration Patterns, and Privacy Implications." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 465–84. https://doi.org/10.56553/popets-2025-0140.

Full text
Abstract:
DNS is crucial for the Internet, but vulnerable due to plaintext traffic. Despite efforts to standardize Domain Name System (DNS) encryption, its adoption remains limited. Users often lack awareness of privacy risks and the knowledge to enable encryption. To address this, the IETF standardized a new protocol; Discovery of Designated Resolvers (DDR), enabling automatic discovery and upgrade from unencrypted to encrypted DNS traffic. In this study, we present an empirical investigation of the DDR protocol, focusing on its adoption, configuration, and the operational challenges associated with en
APA, Harvard, Vancouver, ISO, and other styles
34

Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Full text
Abstract:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection sy
APA, Harvard, Vancouver, ISO, and other styles
35

Agrawal, Sanjay A. "Advancements in Motorcycle Safety: Automatic Helmet Detection Systems Through Machine Learning." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem28483.

Full text
Abstract:
Motorcycle accidents are a huge concern today. The number of accidents occurring every day has increased rapidly which in turn results in loss of lives. One of the main factors in these fatal accidents is the lack of use of helmets. Even though the use of a helmet is mandatory people fail to follow it which causes these unfortunate events. The government has taken various initiatives regarding the increase in the use of helmets by creating awareness and also increasing the fines but people seem to be least bothered. To tackle these situations, we propose an automated solution for helmet detect
APA, Harvard, Vancouver, ISO, and other styles
36

Al-Nawasrah, Ahmad, Ammar Ali Almomani, Samer Atawneh, and Mohammad Alauthman. "A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing." International Journal of Cloud Applications and Computing 10, no. 3 (2020): 17–53. http://dx.doi.org/10.4018/ijcac.2020070102.

Full text
Abstract:
A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets are considered the basis of numerous security threats around the world. Command and control (C&C) servers are the backbone of botnet communications, in which bots send a report to the botmaster, and the latter sends attack orders to those bots. Botnets are also categorized according to their C&C protocols, such as internet relay chat (IRC) and peer-to-peer (P2P) botnets. A domain name system (DNS) method known as fast-flux is used by bot herders to cover malicious botnet activities and increas
APA, Harvard, Vancouver, ISO, and other styles
37

Papadopoulos, Pavlos, Nikolaos Pitropakis, William J. Buchanan, Owen Lo, and Sokratis Katsikas. "Privacy-Preserving Passive DNS." Computers 9, no. 3 (2020): 64. http://dx.doi.org/10.3390/computers9030064.

Full text
Abstract:
The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has exposed the global DNS infrastructure to malicious actors. The passive DNS data collection process creates a database containing various DNS data elements, some of which are personal and need to be protected to preserve the privacy of the end users. To this end, we propose the use of distributed ledger technology. We use Hyperledger Fabric to create a permissioned b
APA, Harvard, Vancouver, ISO, and other styles
38

Kosek, Mike, Trinh Viet Doan, Simon Huber, and Vaibhav Bajpai. "Measuring DNS over TCP in the era of increasing DNS response sizes." ACM SIGCOMM Computer Communication Review 52, no. 2 (2022): 44–55. http://dx.doi.org/10.1145/3544912.3544918.

Full text
Abstract:
The Domain Name System (DNS) is one of the most crucial parts of the Internet. Although the original standard defined the usage of DNS over UDP (DoUDP) as well as DNS over TCP (DoTCP), UDP has become the predominant protocol used in the DNS. With the introduction of new Resource Records (RRs), the sizes of DNS responses have increased considerably. Since this can lead to truncation or IP fragmentation , the fallback to DoTCP as required by the standard ensures successful DNS responses by overcoming the size limitations of DoUDP. However, the effects of the usage of DoTCP by stub resolvers are
APA, Harvard, Vancouver, ISO, and other styles
39

Ivanov, Ievgen, Artur Korniłowicz, and Mykola Nikitchenko. "On an Algorithmic Algebra over Simple-Named Complex-Valued Nominative Data." Formalized Mathematics 26, no. 2 (2018): 149–58. http://dx.doi.org/10.2478/forma-2018-0012.

Full text
Abstract:
Summary This paper continues formalization in the Mizar system [2, 1] of basic notions of the composition-nominative approach to program semantics [14] which was started in [8, 12, 10]. The composition-nominative approach studies mathematical models of computer programs and data on various levels of abstraction and generality and provides tools for reasoning about their properties. In particular, data in computer systems are modeled as nominative data [15]. Besides formalization of semantics of programs, certain elements of the composition-nominative approach were applied to abstract systems i
APA, Harvard, Vancouver, ISO, and other styles
40

Su, Ming-Yang, and Kuan-Lin Su. "BERT-Based Approaches to Identifying Malicious URLs." Sensors 23, no. 20 (2023): 8499. http://dx.doi.org/10.3390/s23208499.

Full text
Abstract:
Malicious uniform resource locators (URLs) are prevalent in cyberattacks, particularly in phishing attempts aimed at stealing sensitive information or distributing malware. Therefore, it is of paramount importance to accurately detect malicious URLs. Prior research has explored the use of deep-learning models to identify malicious URLs, using the segmentation of URL strings into character-level or word-level tokens, and embedding and employing trained models to differentiate between URLs. In this study, a bidirectional encoder representation from a transformers-based (BERT) model was devised t
APA, Harvard, Vancouver, ISO, and other styles
41

Yoder, Matthew, and Dmitry Dmitriev. "Nomenclature over 5 years in TaxonWorks: Approach, implementation, limitations and outcomes." Biodiversity Information Science and Standards 5 (September 20, 2021): e75441. https://doi.org/10.3897/biss.5.75441.

Full text
Abstract:
We are now over four decades into digitally managing the names of Earth's species. As the number of federating (i.e., software that brings together previously disparate projects under a common infrastructure, for example TaxonWorks) and aggregating (e.g., International Plant Name Index, Catalog of Life (CoL)) efforts increase, there remains an unmet need for both the migration forward of old data, and for the production of new, precise and comprehensive nomenclatural catalogs. Given this context, we provide an overview of how TaxonWorks seeks to contribute to this effort, and where it might ev
APA, Harvard, Vancouver, ISO, and other styles
42

Nguyen, Tuan Anh, and Minho Park. "DoH Tunneling Detection System for Enterprise Network Using Deep Learning Technique." Applied Sciences 12, no. 5 (2022): 2416. http://dx.doi.org/10.3390/app12052416.

Full text
Abstract:
In spite of protection mechanisms for Domain Name System (DNS), such as IP blacklist and DNS Firewall, DNS still has privacy issues in reality, since DNS is a plain-text protocol. Recently, to resolve this problem, an encrypted DNS, called DNS-over-HTTPS (DoH), has been developed, and is becoming more widespread. As the secured version of DNS, DoH guarantees privacy and security to prevent various attacks such as eavesdropping and manipulating DNS data by using the HTTPS protocol to encrypt the data between the DoH client and the DoH-based DNS resolver. DoH is one of the best security options
APA, Harvard, Vancouver, ISO, and other styles
43

Müller, Andreas, Walter Berendsohn, Andreas Kohlbecker, Anton Güntsch, Patrick Plitzner, and Katja Luther. "A Comprehensive and Standards-Aware Common Data Model (CDM) for Taxonomic Research." Biodiversity Information Science and Standards 1 (August 16, 2017): e20367. https://doi.org/10.3897/tdwgproceedings.1.20367.

Full text
Abstract:
The EDIT Common Data Model (CDM) (FUB, BGBM 2008) is the centrepiece of the EDIT Platform for Cybertaxonomy (FUB, BGBM 2011, Ciardelli et al. 2009). Building on modelling efforts reaching back to the 1990ies, it aims to combine existing standards relevant to the taxonomic domain (but often designed for data exchange) with requirements of modern taxonomic tools. Modelled in the Unified Modelling Language (UML) (Booch et al. 2005), it offers an object oriented view on the information domain managed by expert taxonomists that is implemented independent of the used operating system and database ma
APA, Harvard, Vancouver, ISO, and other styles
44

Rizal, Saepul, Popy Novita Pasaribu, and Nandang Sutisna. "Understanding Zalora's Neuromarketing-Based Online Marketplace Customer Choices." inovator 12, no. 2 (2023): 264–87. https://doi.org/10.32832/inovator.v12i2.17633.

Full text
Abstract:
The development of the internet has popularized Digital commerce (e-commerce). There are various types online marketplaces with unique customer bases. Customers develop preferences or choices for certain online marketplaces over competitors. This research is to find out the choice variables that can influence. This study looks at online parameters that affect user experience when shopping. Included in this research are the discoveries of neuroscience, a type of limbic system that is basically similar to a client's personality. Descriptive analysis was used to analyze the customer's limbic pers
APA, Harvard, Vancouver, ISO, and other styles
45

Budiansyah, Arie, Rudi Arif Candra, Dirja Nur Ilham, and Alim Misbullah. "Detection of DNS Spoofing Attacks on Campus Networks Using LightGBM with Hybrid Feature Selection (SelectKBest + SHAP)." Brilliance: Research of Artificial Intelligence 5, no. 1 (2025): 298–304. https://doi.org/10.47709/brilliance.v5i1.5962.

Full text
Abstract:
This study investigates the detection of Domain Name System over HTTPS (DoH) spoofing attacks utilizing the CIRA-CIC-DoHBrw-2020 dataset, which encompasses over 100,000 labeled DNS records categorized as either normal or malicious. Features such as packet timing, packet size, and TLS parameters are utilized for detection purposes. A systematic feature selection process is conducted utilizing the Elbow and Kneedle methods based on F-Score values derived from a built-in model evaluation. This method ensures that the top features are selected objectively and quantitatively, thereby enhancing the
APA, Harvard, Vancouver, ISO, and other styles
46

Nguyen, Nhung, Roselyn Gabud, and Sophia Ananiadou. "COPIOUS: A gold standard corpus of named entities towards extracting species occurrence from biodiversity literature." Biodiversity Data Journal 7 (January 22, 2019): e29626. https://doi.org/10.3897/BDJ.7.e29626.

Full text
Abstract:
<b>Background</b> Species occurrence records are very important in the biodiversity domain. While several available corpora contain only annotations of species names or habitats and geographical locations, there is no consolidated corpus that covers all types of entities necessary for extracting species occurrence from biodiversity literature. In order to alleviate this issue, we have constructed the COPIOUS corpus—a gold standard corpus that covers a wide range of biodiversity entities. <b>Results</b> Two annotators manually annotated the corpus with five categories of entities, i.e. taxon na
APA, Harvard, Vancouver, ISO, and other styles
47

Ashraf, A. Karani, and A. Karani Salima. "A systematic literature review to highlight the causes and destructive impact of stigmatization on health status of mentally challenged clients in developing countries." International Journal of Endorsing Health Science Research 3, no. 2 (2015): 31–33. https://doi.org/10.29052/IJEHSR.v3.i2.2015.31-33.

Full text
Abstract:
Abstract <strong>Introduction:&nbsp;</strong>Mental illness is a major obstacle of the health care system throughout the world. The solutions and knowledge about mental health issues have increased many folds over time. However, in many parts of the world, the stigma is still attached to the mental illness. It is felt that it will bring a bad name to the family if any of the family members are mentally unstable.&nbsp;<strong>Purpose:</strong>&nbsp;This paper aims to highlight major causes, probable consequences and suggest recommendations to demark stigmatized mentally ill patients in the deve
APA, Harvard, Vancouver, ISO, and other styles
48

Woodlief, Trey, Felipe Toledo, Matthew Dwyer, and Sebastian Elbaum. "Scene Flow Specifications: Encoding and Monitoring Rich Temporal Safety Properties of Autonomous Systems." Proceedings of the ACM on Software Engineering 2, FSE (2025): 2524–47. https://doi.org/10.1145/3729382.

Full text
Abstract:
To ensure the safety of autonomous systems, it is imperative for them to abide by their safety properties. The specification of such safety properties is challenging because of the gap between the input sensor space (e.g., pixels, point clouds) and the semantic space over which safety properties are specified (e.g. people, vehicles, road). Recent work utilized scene graphs to overcome portions of that gap, enabling the specification and synthesis of monitors targeting many safe driving properties for autonomous vehicles. However, scene graphs are not rich enough to express the many driving pro
APA, Harvard, Vancouver, ISO, and other styles
49

Klots, Y. P., I. V. Muliar, V. M. Cheshun, and O. V. Burdyug. "USE OF DISTRIBUTED HASH TABLES TO PROVIDE ACCESS TO CLOUD SERVICES." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 67 (2020): 85–95. http://dx.doi.org/10.17721/2519-481x/2020/67-09.

Full text
Abstract:
In the article the urgency of the problem of granting access to services of distributed cloud system is disclosed, in particular, the peer distributed cloud system is characterized. The process of interaction of the main components is provided to access the domain name web resource. It is researched that the distribution of resources between nodes of a peer distributed cloud system with the subsequent provision of services on request is implemented using the Kademlia protocol on a local network or Internet and contains processes for publishing the resource at the initial stage of its owner, re
APA, Harvard, Vancouver, ISO, and other styles
50

Hong, Jeongkwan, Minho Won, and Hyunju Ro. "The Molecular and Pathophysiological Functions of Members of the LNX/PDZRN E3 Ubiquitin Ligase Family." Molecules 25, no. 24 (2020): 5938. http://dx.doi.org/10.3390/molecules25245938.

Full text
Abstract:
The ligand of Numb protein-X (LNX) family, also known as the PDZRN family, is composed of four discrete RING-type E3 ubiquitin ligases (LNX1, LNX2, LNX3, and LNX4), and LNX5 which may not act as an E3 ubiquitin ligase owing to the lack of the RING domain. As the name implies, LNX1 and LNX2 were initially studied for exerting E3 ubiquitin ligase activity on their substrate Numb protein, whose stability was negatively regulated by LNX1 and LNX2 via the ubiquitin-proteasome pathway. LNX proteins may have versatile molecular, cellular, and developmental functions, considering the fact that besides
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!