Journal articles on the topic 'Domain Name System over Quic'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Domain Name System over Quic.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Blaise, Ohwo Onome, Ajayi Wumi, and Udosen Alfred. "Enhancing DNS Performance with Efficient Cryptographic Algorithms: A Comparative Study of DoT Frameworks." Asian Journal of Computer Science and Technology 13, no. 2 (2024): 48–55. https://doi.org/10.70112/ajcst-2024.13.2.4288.
Full textMae Reyes Aribon-Libag, Christle. "Billing and online payment portal with multi-factor authentication using one-time password." Journal of Advanced Computer Science & Technology 12, no. 1 (2024): 1–18. http://dx.doi.org/10.14419/ggq10d74.
Full textVictors, Jesse, Ming Li, and Xinwen Fu. "The Onion Name System." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 21–41. http://dx.doi.org/10.1515/popets-2017-0003.
Full textGao, Tianfu, and Qingkuan Dong. "DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium Blockchain." Sensors 23, no. 14 (2023): 6366. http://dx.doi.org/10.3390/s23146366.
Full textKorobeinikova, Tetiana, and Taras Fedchuk. "OVERVIEW OF SECURE ACCESS TO DOMAIN NAME SYSTEM RESOURCES." Information technology and computer engineering 59, no. 1 (2024): 40–53. http://dx.doi.org/10.31649/1999-9941-2024-59-1-40-53.
Full textJeon, Juseong, and Sejin Park. "Setonix: Blockchain-Based Hierarchy Domain Name System for Web3." Applied Sciences 14, no. 23 (2024): 11213. https://doi.org/10.3390/app142311213.
Full textHakiki, Nur, and Sanusi Sanusi. "SETTLEMENT OF DISPUTES OVER DOMAIN NAMES OWNERSHIP AND CYBERSQUATTING IN INDONESIA AND SINGAPORE." Student Journal of International Law 3, no. 1 (2023): 95–107. https://doi.org/10.24815/sjil.v3i1.24872.
Full textM. Banadaki, Yaser. "Detecting Malicious DNS over HTTPS Traffic in Domain Name System using Machine Learning Classifiers." Journal of Computer Sciences and Applications 8, no. 2 (2020): 46–55. http://dx.doi.org/10.12691/jcsa-8-2-2.
Full textNovianto, Dian, Lukas Tommy, Yohanes Setiawan Japriadi, and Sujono. "Mitigasi Serangan DNS Cache Poisoning Pada Local Area Network Berbasis Routerboard Mikrotik." Jurnal Ilmiah Informatika Global 15, no. 3 (2024): 124–30. https://doi.org/10.36982/jiig.v15i3.4816.
Full textTarasenko, Leonid. "LEGAL REGIME OF A DOMAIN NAME AND PROCEDURE FOR RESOLVING DOMAIN DISPUTES IN UKRAINE." Access to Justice in Eastern Europe 8, no. 1 (2025): 387–416. https://doi.org/10.33327/ajee-18-8.1-a000118.
Full textAntic, Djordje, and Mladen Veinovic. "Implementation of DNSSEC-secured name servers for ni.rs zone and best practices." Serbian Journal of Electrical Engineering 13, no. 3 (2016): 369–80. http://dx.doi.org/10.2298/sjee1603369a.
Full textFesl, Jan, Michal Konopa, and Jiří Jelínek. "A novel deep-learning based approach to DNS over HTTPS network traffic detection." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (2023): 6691. http://dx.doi.org/10.11591/ijece.v13i6.pp6691-6700.
Full textJan, Fesl, Konopa Michal, and Jelínek Jiří. "A novel deep-learning based approach to DNS over HTTPS network traffic detection." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (2023): 6691–700. https://doi.org/10.11591/ijece.v13i6.pp6691-6700.
Full textAbualghanam, Orieb, Hadeel Alazzam, Basima Elshqeirat, Mohammad Qatawneh, and Mohammed Amin Almaiah. "Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine Learning." Electronics 12, no. 6 (2023): 1467. http://dx.doi.org/10.3390/electronics12061467.
Full textKowalewski, Jacek, and Monika Natkowska. "Wykorzystanie mapy statystyki krótkookresowej w procesie organizacji badań przedsiębiorstw prowadzonych przez statystykę publiczną." Przegląd Statystyczny. Statistical Review 2012, SI2 (2012): 222–36. http://dx.doi.org/10.59139/ps.2012.si2.3.
Full textBadgley, Robert. "IMPROVING ICANN IN TEN EASY STEPS: TEN SUGGESTIONS FOR ICANN TO IMPROVE ITS ANTI-CYBERSQUATTING ARBITRATION SYSTEM." Journal of Law, Technology & Policy 2001, no. 1 (2001): 109–28. http://dx.doi.org/10.70466/000000.
Full textSergo, Anton G., and Ekaterina I. Romanenkova. "World Intellectual Property Organisation's experience in domain dispute resolution." Vestnik Tomskogo gosudarstvennogo universiteta. Pravo, no. 43 (2022): 151–63. http://dx.doi.org/10.17223/22253513/43/13.
Full textIvanisenko, Timofey V., Pavel S. Demenkov, Nikolay A. Kolchanov, and Vladimir A. Ivanisenko. "The New Version of the ANDDigest Tool with Improved AI-Based Short Names Recognition." International Journal of Molecular Sciences 23, no. 23 (2022): 14934. http://dx.doi.org/10.3390/ijms232314934.
Full textSinganamalla, Sudheesh, Suphanat Chunhapanya, Jonathan Hoyland, et al. "Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 575–92. http://dx.doi.org/10.2478/popets-2021-0085.
Full textAlzighaibi, Ahmad Reda. "Detection of DoH Traffic Tunnels Using Deep Learning for Encrypted Traffic Classification." Computers 12, no. 3 (2023): 47. http://dx.doi.org/10.3390/computers12030047.
Full textZhang, Mingming, Xiang Li, Baojun Liu, et al. "Detecting and Measuring Security Risks of Hosting-Based Dangling Domains." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 1 (2023): 1–28. http://dx.doi.org/10.1145/3579440.
Full textNakatsuka, Yoshimichi, Andrew Paverd, and Gene Tsudik. "PDoT." Digital Threats: Research and Practice 2, no. 1 (2021): 1–22. http://dx.doi.org/10.1145/3431171.
Full textHeikkinen, Mikko, Anniina Kuusijärvi, Ville-Matti Riihikoski, and Leif Schulman. "Multi-domain Collection Management Simplified — the Finnish National Collection Management System Kotka." Biodiversity Information Science and Standards 4 (October 9, 2020): e59119. https://doi.org/10.3897/biss.4.59119.
Full textSalat, Lehel, Mastaneh Davis, and Nabeel Khan. "DNS Tunnelling, Exfiltration and Detection over Cloud Environments." Sensors 23, no. 5 (2023): 2760. http://dx.doi.org/10.3390/s23052760.
Full textAbu Al-Haija, Qasem, Manar Alohaly, and Ammar Odeh. "A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach." Sensors 23, no. 7 (2023): 3489. http://dx.doi.org/10.3390/s23073489.
Full textKadhim, Huda Yousif, Karim Hashim Al-saedi, and Mustafa Dhiaa Al-Hassani. "Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 10 (2019): 205. http://dx.doi.org/10.3991/ijim.v13i10.10797.
Full textDíaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †." Sensors 19, no. 15 (2019): 3292. http://dx.doi.org/10.3390/s19153292.
Full textDhiya Eddine, Abid, and Ghazli Abdelkader. "Securing DNS over HTTPS traffic: a real-time analysis tool." Computer Science and Information Technologies 5, no. 3 (2024): 227–34. http://dx.doi.org/10.11591/csit.v5i3.p227-234.
Full textAbid, Dhiya Eddine, and Abdelkader Ghazli. "Securing DNS over HTTPS traffic: a real-time analysis tool." Computer Science and Information Technologies 5, no. 3 (2024): 227–34. https://doi.org/10.11591/csit.v5i3.pp227-234.
Full textBerendt-Marchel, M., and A. Wawrzynczak. "Does the Zero Carry Essential Information for Artificial Neural Network learning to simulate the contaminant transport in Urban Areas?" Journal of Physics: Conference Series 2090, no. 1 (2021): 012027. http://dx.doi.org/10.1088/1742-6596/2090/1/012027.
Full textStvan, Laurel Smith. "The contingent meaning of –ex brand names in English." Corpora 1, no. 2 (2006): 217–50. http://dx.doi.org/10.3366/cor.2006.1.2.217.
Full textChiari, Mattia, Alfonso Emilio Gerevini, Francesco Percassi, Luca Putelli, Ivan Serina, and Matteo Olivato. "Goal Recognition as a Deep Learning Task: The GRNet Approach." Proceedings of the International Conference on Automated Planning and Scheduling 33, no. 1 (2023): 560–68. http://dx.doi.org/10.1609/icaps.v33i1.27237.
Full textververis, vasilis, Steffen Sassala, Felix Roth, and Vaibhav Bajpai. "Path to Encrypted DNS with DDR: Adoption, Configuration Patterns, and Privacy Implications." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 465–84. https://doi.org/10.56553/popets-2025-0140.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textAgrawal, Sanjay A. "Advancements in Motorcycle Safety: Automatic Helmet Detection Systems Through Machine Learning." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem28483.
Full textAl-Nawasrah, Ahmad, Ammar Ali Almomani, Samer Atawneh, and Mohammad Alauthman. "A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing." International Journal of Cloud Applications and Computing 10, no. 3 (2020): 17–53. http://dx.doi.org/10.4018/ijcac.2020070102.
Full textPapadopoulos, Pavlos, Nikolaos Pitropakis, William J. Buchanan, Owen Lo, and Sokratis Katsikas. "Privacy-Preserving Passive DNS." Computers 9, no. 3 (2020): 64. http://dx.doi.org/10.3390/computers9030064.
Full textKosek, Mike, Trinh Viet Doan, Simon Huber, and Vaibhav Bajpai. "Measuring DNS over TCP in the era of increasing DNS response sizes." ACM SIGCOMM Computer Communication Review 52, no. 2 (2022): 44–55. http://dx.doi.org/10.1145/3544912.3544918.
Full textIvanov, Ievgen, Artur Korniłowicz, and Mykola Nikitchenko. "On an Algorithmic Algebra over Simple-Named Complex-Valued Nominative Data." Formalized Mathematics 26, no. 2 (2018): 149–58. http://dx.doi.org/10.2478/forma-2018-0012.
Full textSu, Ming-Yang, and Kuan-Lin Su. "BERT-Based Approaches to Identifying Malicious URLs." Sensors 23, no. 20 (2023): 8499. http://dx.doi.org/10.3390/s23208499.
Full textYoder, Matthew, and Dmitry Dmitriev. "Nomenclature over 5 years in TaxonWorks: Approach, implementation, limitations and outcomes." Biodiversity Information Science and Standards 5 (September 20, 2021): e75441. https://doi.org/10.3897/biss.5.75441.
Full textNguyen, Tuan Anh, and Minho Park. "DoH Tunneling Detection System for Enterprise Network Using Deep Learning Technique." Applied Sciences 12, no. 5 (2022): 2416. http://dx.doi.org/10.3390/app12052416.
Full textMüller, Andreas, Walter Berendsohn, Andreas Kohlbecker, Anton Güntsch, Patrick Plitzner, and Katja Luther. "A Comprehensive and Standards-Aware Common Data Model (CDM) for Taxonomic Research." Biodiversity Information Science and Standards 1 (August 16, 2017): e20367. https://doi.org/10.3897/tdwgproceedings.1.20367.
Full textRizal, Saepul, Popy Novita Pasaribu, and Nandang Sutisna. "Understanding Zalora's Neuromarketing-Based Online Marketplace Customer Choices." inovator 12, no. 2 (2023): 264–87. https://doi.org/10.32832/inovator.v12i2.17633.
Full textBudiansyah, Arie, Rudi Arif Candra, Dirja Nur Ilham, and Alim Misbullah. "Detection of DNS Spoofing Attacks on Campus Networks Using LightGBM with Hybrid Feature Selection (SelectKBest + SHAP)." Brilliance: Research of Artificial Intelligence 5, no. 1 (2025): 298–304. https://doi.org/10.47709/brilliance.v5i1.5962.
Full textNguyen, Nhung, Roselyn Gabud, and Sophia Ananiadou. "COPIOUS: A gold standard corpus of named entities towards extracting species occurrence from biodiversity literature." Biodiversity Data Journal 7 (January 22, 2019): e29626. https://doi.org/10.3897/BDJ.7.e29626.
Full textAshraf, A. Karani, and A. Karani Salima. "A systematic literature review to highlight the causes and destructive impact of stigmatization on health status of mentally challenged clients in developing countries." International Journal of Endorsing Health Science Research 3, no. 2 (2015): 31–33. https://doi.org/10.29052/IJEHSR.v3.i2.2015.31-33.
Full textWoodlief, Trey, Felipe Toledo, Matthew Dwyer, and Sebastian Elbaum. "Scene Flow Specifications: Encoding and Monitoring Rich Temporal Safety Properties of Autonomous Systems." Proceedings of the ACM on Software Engineering 2, FSE (2025): 2524–47. https://doi.org/10.1145/3729382.
Full textKlots, Y. P., I. V. Muliar, V. M. Cheshun, and O. V. Burdyug. "USE OF DISTRIBUTED HASH TABLES TO PROVIDE ACCESS TO CLOUD SERVICES." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 67 (2020): 85–95. http://dx.doi.org/10.17721/2519-481x/2020/67-09.
Full textHong, Jeongkwan, Minho Won, and Hyunju Ro. "The Molecular and Pathophysiological Functions of Members of the LNX/PDZRN E3 Ubiquitin Ligase Family." Molecules 25, no. 24 (2020): 5938. http://dx.doi.org/10.3390/molecules25245938.
Full text