Results 11 to 20 of about 1,771,148 (183)
Research of phishing detection technology
The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included ...
Xi ZHANG +1 more
doaj +1 more source
Changing the name of the NBPF/DUF1220 domain to the Olduvai domain [PDF]
We are jointly proposing a new name for a protein domain of approximately 65 amino acids that has been previously termed NBPF or DUF1220. Our two labs independently reported the initial studies of this domain, which is encoded almost entirely within a ...
Sikela, James M, Van Roy, Frans
core +2 more sources
Sociophonetic Variation in an Internet Place Name
This study provides one of the first published accounts of sociophonetic variation in which the speech community under investigation exists online and text-based communication is the dominant mode of interaction.
Kim Witten
doaj +1 more source
Discovery of Nuisance Website Domain Name Generation Based on Domain Name Semantic Information and Similarity [PDF]
Using domain name generation technology to identify nuisance website domains offers benefits such as broad coverage, the provision of substantial research data, and timely prevention of dissemination. Existing domain generation algorithms based on domain
YU Jie, ZHAO Chunlei, DONG Guozhong, REN Huaishuo, YOU Wei
doaj +1 more source
Abstrak Lembaga pengelolaan dan pendaftaran nama domain di Indonesia dilakukan oleh lembaga yang didirikan oleh masyarakat atau pemerintah. Pengelolaan dan pendaftaran nama domain di Indonesia dilakukan oleh lembaga yang dinamakan PANDI (Pengelola ...
Helni Mutiarsih Jumhur
doaj +1 more source
N-Trans: Parallel Detection Algorithm for DGA Domain Names
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang +4 more
doaj +1 more source
Trade name and trademark versus domain
Internet domains have become an integral part of our lives, so one can easily understand that during their use, conflicts can arise, whose participants will search for rules enabling resolution of conflicts.
Jarmila Pokorná, Eva Večerková
doaj +1 more source
PROVIDE: hiding from automated network scans with proofs of identity [PDF]
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours.
Bestavros, Azer, Koch, William
core +3 more sources
Developing an ontology for the domain name system [PDF]
©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any ...
Coddington, P. +2 more
core +1 more source
Analysis of problems in the DNSSEC automation deployment
Based on the practice of domain name system security extensions protocols' deployment in country code top-level domain,the development background of the domain name system security extensions protocols were summarized,the current applications of the ...
Chuan GUO, Feng LENG
doaj +3 more sources

