To see the other types of publications on this topic, follow the link: Multicast Domain Name System.

Journal articles on the topic 'Multicast Domain Name System'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Multicast Domain Name System.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hanna, Fouad, Lionel Droz-Bartholet, and Jean-Christophe Lapayre. "Toward a Faster Fault Tolerant Consensus to Maintain Data Consistency in Collaborative Environments." International Journal of Cooperative Information Systems 26, no. 03 (2017): 1750002. http://dx.doi.org/10.1142/s0218843017500022.

Full text
Abstract:
The consensus problem has become a key issue in the field of collaborative telemedicine systems because of the need to guarantee the consistency of shared data. In this paper, we focus on the performance of consensus algorithms. First, we studied, in the literature, the most well-known algorithms in the domain. Experiments on these algorithms allowed us to propose a new algorithm that enhances the performance of consensus in different situations. During 2014, we presented our very first initial thoughts to enhance the performance of the consensus algorithms, but the proposed solution gave very
APA, Harvard, Vancouver, ISO, and other styles
2

Dettmer, R. "What's in a name [Internet Domain Name System]." IEE Review 49, no. 11 (2003): 38–40. http://dx.doi.org/10.1049/ir:20031105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bonastre, Oscar M., Andreu Vea, and David Walden. "Origins of the Domain Name System." IEEE Annals of the History of Computing 41, no. 2 (2019): 48–60. http://dx.doi.org/10.1109/mahc.2019.2913116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Casalicchio, E., M. Caselli, and A. Coletta. "Measuring the global domain name system." IEEE Network 27, no. 1 (2013): 25–31. http://dx.doi.org/10.1109/mnet.2013.6423188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mockapetris, Paul V., and Kevin J. Dunlap. "Development of the Domain Name System." ACM SIGCOMM Computer Communication Review 25, no. 1 (1995): 112–22. http://dx.doi.org/10.1145/205447.205459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mockapetris, P., and K. J. Dunlap. "Development of the domain name system." ACM SIGCOMM Computer Communication Review 18, no. 4 (1988): 123–33. http://dx.doi.org/10.1145/52325.52338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Qin, Zhen, Chunjing Xiao, Qiyao Wang, Yuehui Jin, and Aleksandar Kuzmanovic. "A CDN-based Domain Name System." Computer Communications 45 (June 2014): 11–20. http://dx.doi.org/10.1016/j.comcom.2014.03.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Bo, and Jinlin Wang. "An Identifier and Locator Decoupled Multicast Approach (ILDM) Based on ICN." Applied Sciences 11, no. 2 (2021): 578. http://dx.doi.org/10.3390/app11020578.

Full text
Abstract:
Many bandwidth-intensive applications (such as online live, online games, etc.) are more suitable for using multicast to transmit information. Due to the advantages in scalability, Shared Tree (ST) is more suitable for large-scale deployment than Source-Based Tree (SBT). However, in ST-based multicast, all multicast sources need to send multicast data to a center node called a core, which will lead to core overload and traffic concentration. Besides, most existing multicast protocols use the shortest path between the source or the core and each receiver to construct the multicast tree, which w
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Bo, and Jinlin Wang. "An Identifier and Locator Decoupled Multicast Approach (ILDM) Based on ICN." Applied Sciences 11, no. 2 (2021): 578. http://dx.doi.org/10.3390/app11020578.

Full text
Abstract:
Many bandwidth-intensive applications (such as online live, online games, etc.) are more suitable for using multicast to transmit information. Due to the advantages in scalability, Shared Tree (ST) is more suitable for large-scale deployment than Source-Based Tree (SBT). However, in ST-based multicast, all multicast sources need to send multicast data to a center node called a core, which will lead to core overload and traffic concentration. Besides, most existing multicast protocols use the shortest path between the source or the core and each receiver to construct the multicast tree, which w
APA, Harvard, Vancouver, ISO, and other styles
10

Chandramouli, R., and S. Rose. "Challenges in securing the domain name system." IEEE Security & Privacy Magazine 4, no. 1 (2006): 84–87. http://dx.doi.org/10.1109/msp.2006.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

SUZUKI, S. "Domain Name System--Past, Present and Future." IEICE Transactions on Communications E88-B, no. 3 (2005): 857–64. http://dx.doi.org/10.1093/ietcom/e88-b.3.857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Henry, Gavin. "Bert Hubert on the Domain Name System." IEEE Software 37, no. 5 (2020): 122–24. http://dx.doi.org/10.1109/ms.2020.3000883.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Tariq Banday, M. "Recent Developments in the Domain Name System." International Journal of Computer Applications 31, no. 2 (2011): 18–25. http://dx.doi.org/10.5120/3796-5227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Foner, Lenny. "Viewpoint: fixing a flawed domain name system." Communications of the ACM 44, no. 1 (2001): 19–21. http://dx.doi.org/10.1145/357489.357496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Minkel, J. R. "Could the Internet fragment? [domain name system]." IEEE Spectrum 43, no. 6 (2006): 20–21. http://dx.doi.org/10.1109/mspec.2006.1638039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Victors, Jesse, Ming Li, and Xinwen Fu. "The Onion Name System." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 21–41. http://dx.doi.org/10.1515/popets-2017-0003.

Full text
Abstract:
Abstract Tor onion services, also known as hidden services, are anonymous servers of unknown location and ownership that can be accessed through any Torenabled client. They have gained popularity over the years, but since their introduction in 2002 still suffer from major usability challenges primarily due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in this work we introduce the Onion Name System (OnioNS), a privacy-enhanced decentralized name resolution service. OnioNS allows Tor users to reference an onion service by a meaningful globally-uni
APA, Harvard, Vancouver, ISO, and other styles
17

Cheung, S. "Denial of service against the Domain Name System." IEEE Security & Privacy Magazine 4, no. 1 (2006): 40–45. http://dx.doi.org/10.1109/msp.2006.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Massey, Daniel, and Dorothy E. Denning. "Guest Editors' Introduction: Securing the Domain Name System." IEEE Security & Privacy Magazine 7, no. 5 (2009): 11–13. http://dx.doi.org/10.1109/msp.2009.121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Calabrich, Bruno Freire de Carvalho. "Domain name system (DNS), ICANN and Brazilian stakes." Law, State and Telecommunications Review 11, no. 2 (2019): 127–52. http://dx.doi.org/10.26512/lstr.v11i2.27027.

Full text
Abstract:
Purpose – The article addresses the Brazilian participation in ICANN and the interests of Brazil. As an introduction to the topic, a synthesis is presented on the DNS system, as well as on the origins, nature and role of ICANN, its structure, functioning, principles and governance mechanisms. Then, the main criticisms by the doctrine regarding the (lack of) participation of peripheral countries in ICANN are summarized. The next topic lists the groups and support organizations that have Brazilian members and presents some concrete cases analyzed within the scope of ICANN that affect Brazilian i
APA, Harvard, Vancouver, ISO, and other styles
20

Lawton, George. "Stronger Domain Name System Thwarts Root-Server Attacks." Computer 40, no. 5 (2007): 14–17. http://dx.doi.org/10.1109/mc.2007.184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

You, Li, Wenjin Wang, and Xiqi Gao. "Energy-Efficient Multicast Precoding for Massive MIMO Transmission with Statistical CSI." Energies 11, no. 11 (2018): 3175. http://dx.doi.org/10.3390/en11113175.

Full text
Abstract:
In this paper, we investigate energy-efficient multicast precoding for massive multiple-input multiple-output (MIMO) transmission. In contrast with most previous work, where instantaneous channel state information (CSI) is exploited to facilitate energy-efficient wireless transmission design, we assume that the base station can only exploit statistical CSI of the user terminals for downlink multicast precoding. First, in terms of maximizing the system energy efficiency, the eigenvectors of the optimal energy-efficient multicast transmit covariance matrix are identified in closed form, which in
APA, Harvard, Vancouver, ISO, and other styles
22

Weber, R. H. "Looking ahead: more harmonisation in the domain name system?" International Journal of Intercultural Information Management 1, no. 1 (2007): 74. http://dx.doi.org/10.1504/ijiim.2007.014372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zheng, Wang. "Estimation of domain name system (DNS) server load distribution." Scientific Research and Essays 9, no. 13 (2014): 619–24. http://dx.doi.org/10.5897/sre2013.5740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Zheng, Wang. "Seamless transition of domain name system (DNS) authoritative servers." Scientific Research and Essays 9, no. 12 (2014): 566–70. http://dx.doi.org/10.5897/sre2013.5741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Xin, Haining Wang, Shansi Ren, and Xiaodong Zhang. "Maintaining Strong Cache Consistency for the Domain Name System." IEEE Transactions on Knowledge and Data Engineering 19, no. 8 (2007): 1057–71. http://dx.doi.org/10.1109/tkde.2007.1049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Koç, Yakup, Almerima Jamakovic, and Bart Gijsen. "A global reference model of the domain name system." International Journal of Critical Infrastructure Protection 5, no. 3-4 (2012): 108–17. http://dx.doi.org/10.1016/j.ijcip.2012.08.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Khormali, Aminollah, Jeman Park, Hisham Alasmary, Afsah Anwar, Muhammad Saad, and David Mohaisen. "Domain name system security and privacy: A contemporary survey." Computer Networks 185 (February 2021): 107699. http://dx.doi.org/10.1016/j.comnet.2020.107699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kröhnke, Lars, Jelte Jansen, and Harald Vranken. "Resilience of the Domain Name System: A case study of the .nl-domain." Computer Networks 139 (July 2018): 136–50. http://dx.doi.org/10.1016/j.comnet.2018.04.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Liu, Yi, Sha Liu, Junyu Wang, et al. "A Credible Food Traceability System Based on Domain Name System Security Extensions." International Journal of Online Engineering (iJOE) 14, no. 04 (2018): 111. http://dx.doi.org/10.3991/ijoe.v14i04.8385.

Full text
Abstract:
Food safety has drawn worldwide attention because of its enormous impact on human health and social stability. Although traceability systems based on Internet of Things (IoT) can improve the visibility of the food supply chain, the trust service is necessary to ensure the data origin and data integrity. This paper proposes a food traceability system supported by a trust service based on Domain Name System Security Extensions(DNSSEC). A DNSSEC-enabled traceability system is implemented for food safety in China. In the traceability system, the master data and event data of the products is stored
APA, Harvard, Vancouver, ISO, and other styles
30

ZHAO, Fangming, Yoshiaki HORI, and Kouichi SAKURAI. "Analysis of Existing Privacy-Preserving Protocols in Domain Name System." IEICE Transactions on Information and Systems E93-D, no. 5 (2010): 1031–43. http://dx.doi.org/10.1587/transinf.e93.d.1031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Tian, Hong Cheng, Hong Wang, and Jin Kui Ma. "Domain Name System during the Transition from IPv4 to IPv6." Applied Mechanics and Materials 687-691 (November 2014): 1912–15. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1912.

Full text
Abstract:
IPv4 and IPv6 will coexist for a long time, due to ISPes’ inertia in the transition from IPv4 to IPv6. Domain Name System (DNS) is a very important functional unit in the Internet. This paper describres the hierarchy and operating process of IPv6 DNS, IPv6 DNS resolver, and presents the DNS transition from IPv4 to IPv6 in particular. We suggest two methods to implement DNS service during the transition period: DNS-Application Level Gateway (DNS-ALG) with Network Address Translation-Protocol Translation (NAT-PT), and dual stacks. And we also propose their respective operational principles. This
APA, Harvard, Vancouver, ISO, and other styles
32

Tian, Hong Cheng, and Hong Wang. "Deployment and Exploration of Domain Name System Based on IPv6." Applied Mechanics and Materials 668-669 (October 2014): 1247–52. http://dx.doi.org/10.4028/www.scientific.net/amm.668-669.1247.

Full text
Abstract:
IPv6 is intended to replace IPv4 in the Internet. Domain Name System (DNS) is an essential component of functionality of Internet. This paper presents new IPv6 characteristics, IPv6 DNS hierarchy, working process of IPv6 DNS, IPv6 address types, representation formats of IPv6 address, forward (reverse) resolver of IPv6 DNS, and the DNS transition from IPv4 to IPv6, combined with the practice to build the IPv6 experimental network of Peking University. We give corresponding solutions for the problems encountered in the IPv6 DNS deployment. This paper is of important reference value for IPv6 net
APA, Harvard, Vancouver, ISO, and other styles
33

Radwan, Marwan, and Reiko Heckel. "Detecting and Refactoring Operational Smells within the Domain Name System." Electronic Proceedings in Theoretical Computer Science 181 (April 10, 2015): 113–28. http://dx.doi.org/10.4204/eptcs.181.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Gannoun, L., J. Francioli, S. Chachkov, F. Schutz, J. G. Hulaas, and J. Harms. "Domain Name eXchange: a mobile-agent-based shared registry system." IEEE Internet Computing 4, no. 2 (2000): 59–64. http://dx.doi.org/10.1109/4236.832947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Mitchell, Rosanne T. "Domain name trademark disputes need a new cyberspace ADR system." Alternatives to the High Cost of Litigation 17, no. 8 (1999): 147–49. http://dx.doi.org/10.1002/alt.3810170805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Elavarasan, S. Pari, and K. Sampath Kumar. "Reliable Strong Cache and Security for the Domain Name System." International Journal of Engineering Trends and Technology 9, no. 4 (2014): 182–87. http://dx.doi.org/10.14445/22315381/ijett-v9p237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Zheng, Wang, and Tseng Shian Shyong. "Anomaly detection of domain name system (DNS) query traffic at top level domain servers." Scientific Research and Essays 6, no. 18 (2011): 3858–72. http://dx.doi.org/10.5897/sre11.439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Karavas, Vaios, and Gunther Teubner. "http://www.CompanyNameSucks.com: The Horizontal Effect of Fundamental Rights on ‘Private Parties’ within Autonomous Internet Law." German Law Journal 4, no. 12 (2003): 1335–58. http://dx.doi.org/10.1017/s2071832200012153.

Full text
Abstract:
In previous conflicts about domain names within the global address system, German judges only had to answer relatively simply legal questions. Under which conditions does a domain name, which is easily confused with another name, infringe the rights of the name owner? Pervious decisions have identified infringement in the following cases:- The name and domain name are, to a significant degree, identical or may be easily confused with one another,- The user of the domain name possesses no personal right to the name, and- The name usage is likely to promote mistakes about the origin of the web-s
APA, Harvard, Vancouver, ISO, and other styles
39

Bubnov, Ya V., and N. N. Ivanov. "Text analysis of DNS queries for data exfiltration protection of computer networks." Informatics 17, no. 3 (2020): 78–86. http://dx.doi.org/10.37661/1816-0301-2020-17-3-78-86.

Full text
Abstract:
The paper proposes effective method of computer network protection from data exfiltration by the system of domain names. Data exfiltration by Domain Name System (DNS) is an approach to conceal the transfer of confidential data to remote adversary using data encapsulation into the requesting domain name. The DNS requests that transfer stolen information from a host infected by malicious software to an external host controlled by a malefactor are considered. The paper proposes a method of detecting such DNS requests based on text classification of domain names by convolutional neural network. Th
APA, Harvard, Vancouver, ISO, and other styles
40

차경자. "China's Domain Name Dispute Resolution System -focused on DNDRC of CIETAC-." KOREA INTERNATIONAL COMMERCIAL REVIEW 23, no. 4 (2008): 171–90. http://dx.doi.org/10.18104/kaic.23.4.200812.171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Bradshaw, Samantha, and Laura DeNardis. "Privacy by Infrastructure: The Unresolved Case of the Domain Name System." Policy & Internet 11, no. 1 (2019): 16–36. http://dx.doi.org/10.1002/poi3.195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Yanindra, Kartika Eka, Aghus Sofwan, and Maman Somantri. "PERANCANGAN APLIKASI MONITORING AUTHORITATIVE DOMAIN NAME SYSTEM SERVER MENGGUNAKAN FRAMEWORK CODEIGNITER." TRANSIENT 6, no. 3 (2017): 349. http://dx.doi.org/10.14710/transient.6.3.349-355.

Full text
Abstract:
Teknologi jaringan mengalami perkembangan yang cepat. Perkembangan teknologi membuat banyak alat yang mempermudah kerja manusia. Salah satu alat yang digunakan disebut dengan DNS server yang berguna untuk menerjemahkan domain website menjadi alamat IP. DNS yang banyak digunakan pada jaringan adalah DNS recursor dan DNS authoritative. Penggunaan DNS server dalam sebuah jaringan membutuhkan juga aplikasi untuk memonitor kerja dari DNS server. Monitoring DNS server yang saat ini digunakan adalah menampilkan grafik kinerja dari DNS server. Salah satu grafik yang ditampilkan pada aplikasi monitorin
APA, Harvard, Vancouver, ISO, and other styles
43

Abri, Abdul Aziz Al, Ahmed Al Maashri, Mohamed Ould-Khaoua, and Hadj Bourdoucen. "Game-theoretic modeling of the behavior of Domain Name System attacker." Computers & Electrical Engineering 87 (October 2020): 106801. http://dx.doi.org/10.1016/j.compeleceng.2020.106801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Yang, Luhui, Guangjie Liu, Jinwei Wang, Huiwen Bai, Jiangtao Zhai, and Yuewei Dai. "Fast3DS: A real-time full-convolutional malicious domain name detection system." Journal of Information Security and Applications 61 (September 2021): 102933. http://dx.doi.org/10.1016/j.jisa.2021.102933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Han, Luchao, Zhichuan Guo, and Xuewen Zeng. "Research on Multicore Key-Value Storage System for Domain Name Storage." Applied Sciences 11, no. 16 (2021): 7425. http://dx.doi.org/10.3390/app11167425.

Full text
Abstract:
This article proposes a domain name caching method for the multicore network-traffic capture system, which significantly improves insert latency, throughput and hit rate. The caching method is composed of caching replacement algorithm, cache set method. The method is easy to implement, low in deployment cost, and suitable for various multicore caching systems. Moreover, it can reduce the use of locks by changing data structures and algorithms. Experimental results show that compared with other caching system, our proposed method reaches the highest throughput under multiple cores, which indica
APA, Harvard, Vancouver, ISO, and other styles
46

Brahara, Beni, Dedy Syamsuar, and Yesi Novaria Kunang. "Analysis of Malware Dns Attack on the Network Using Domain Name System Indicators." Journal of Information Systems and Informatics 2, no. 1 (2020): 131–53. http://dx.doi.org/10.33557/journalisi.v2i1.30.

Full text
Abstract:
University of Bina Darma Palembang has its own DNS server and in this study using log data from the Bina Darma University DNS server as data in the study, DNS log server data is analyzed by network traffic, using Network Analyzer tools to see the activity of a normal traffic or anomaly traffic, or even contains DGA Malware (Generating Algorthm Domain).DGA malware produces a number of random domain names that are used to infiltrate DNS servers. To detect DGA using DNS traffic, NXDomain. The result is that each domain name in a group domain is generated by one domain that is often used at short
APA, Harvard, Vancouver, ISO, and other styles
47

Yan, Zhiwei, Jong-Hyouk Lee, Xiaodong Lee, and Yong-Jin Park. "Utilizing the Domain Name System for Scalable and Secure Named Data Networking." Wireless Personal Communications 84, no. 3 (2015): 2135–49. http://dx.doi.org/10.1007/s11277-015-2537-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Zhang, Ning, Le Jun Chi, and Hai Yan Xu. "Domain Names Based on Fault Tree Analysis." Applied Mechanics and Materials 667 (October 2014): 143–48. http://dx.doi.org/10.4028/www.scientific.net/amm.667.143.

Full text
Abstract:
The success rate of domain name resolution has a direct influence on the service of DNS. Analytical performance of DNS server is the key to measure the satisfaction degree of users when they access to the network. This article establishes the dependence model for the domain name server. In order to get DNS fault model and analytical model, this article uses Fault Tree Analysis theory to describe the relationship of tree basic events and target events of fault tree of dependency. On the basis of fault tree model, dependencies of domain names are qualitative analyzed, including number of sets an
APA, Harvard, Vancouver, ISO, and other styles
49

Futai, Zou, Zhang Siyu, and Rao Weixiong. "Hybrid detection and tracking of fast-flux botnet on domain name system traffic." China Communications 10, no. 11 (2013): 81–94. http://dx.doi.org/10.1109/cc.2013.6674213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Xue, Hong. "Territorialism versus Universalism: International Intellectual Property Law in the Internationalized Domain Name System." Journal of World Intellectual Property 9, no. 1 (2006): 1–24. http://dx.doi.org/10.1111/j.1422-2213.2006.00271.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!