Results 11 to 20 of about 1,771,148 (183)

Research of phishing detection technology

open access: yes网络与信息安全学报, 2017
The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included ...
Xi ZHANG   +1 more
doaj   +1 more source

Changing the name of the NBPF/DUF1220 domain to the Olduvai domain [PDF]

open access: yes, 2017
We are jointly proposing a new name for a protein domain of approximately 65 amino acids that has been previously termed NBPF or DUF1220. Our two labs independently reported the initial studies of this domain, which is encoded almost entirely within a ...
Sikela, James M, Van Roy, Frans
core   +2 more sources

Sociophonetic Variation in an Internet Place Name

open access: yesNames, 2012
This study provides one of the first published accounts of sociophonetic variation in which the speech community under investigation exists online and text-based communication is the dominant mode of interaction.
Kim Witten
doaj   +1 more source

Discovery of Nuisance Website Domain Name Generation Based on Domain Name Semantic Information and Similarity [PDF]

open access: yesJisuanji gongcheng
Using domain name generation technology to identify nuisance website domains offers benefits such as broad coverage, the provision of substantial research data, and timely prevention of dissemination. Existing domain generation algorithms based on domain
YU Jie, ZHAO Chunlei, DONG Guozhong, REN Huaishuo, YOU Wei
doaj   +1 more source

Perbandingan Bentuk Kelembagaan Pengelola Nama Domain di Indonesia dengan Lembaga Pengelola Nama Domain di Beberapa Negara

open access: yesPadjadjaran: Jurnal Ilmu Hukum, 2014
Abstrak Lembaga pengelolaan dan pendaftaran nama domain di Indonesia dilakukan oleh lembaga yang didirikan oleh masyarakat atau pemerintah. Pengelolaan dan pendaftaran nama domain di Indonesia dilakukan oleh lembaga yang dinamakan PANDI (Pengelola ...
Helni Mutiarsih Jumhur
doaj   +1 more source

N-Trans: Parallel Detection Algorithm for DGA Domain Names

open access: yesFuture Internet, 2022
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang   +4 more
doaj   +1 more source

Trade name and trademark versus domain

open access: yesActa Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 2013
Internet domains have become an integral part of our lives, so one can easily understand that during their use, conflicts can arise, whose participants will search for rules enabling resolution of conflicts.
Jarmila Pokorná, Eva Večerková
doaj   +1 more source

PROVIDE: hiding from automated network scans with proofs of identity [PDF]

open access: yes, 2016
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours.
Bestavros, Azer, Koch, William
core   +3 more sources

Developing an ontology for the domain name system [PDF]

open access: yes, 2005
©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any ...
Coddington, P.   +2 more
core   +1 more source

Analysis of problems in the DNSSEC automation deployment

open access: yes网络与信息安全学报, 2017
Based on the practice of domain name system security extensions protocols' deployment in country code top-level domain,the development background of the domain name system security extensions protocols were summarized,the current applications of the ...
Chuan GUO, Feng LENG
doaj   +3 more sources

Home - About - Disclaimer - Privacy