Results 41 to 50 of about 1,554,188 (179)

Design and Implementation of Domain Hijacking Detection System

open access: yesMATEC Web of Conferences, 2015
As the basement of Internet application, DNS plays a very critical role in the network running. On Jan. 21st, 2014, the occurrence of a serious DNS hijacking in Internet has aroused the attentions to the DNS security incident again.
Xue Jupo, Liu Yang, Chang Peng, Xiao Jun
doaj   +1 more source

Toward a Boundary Regional Control Problem for Boolean Cellular Automata

open access: yes, 2016
An important question to be addressed regarding system control on a time interval $[0, T]$ is whether some particular target state in the configuration space is reachable from a given initial state. When the target of interest refers only to a portion of
Bagnoli, Franco   +2 more
core   +5 more sources

ComTax: community-driven curation for taxonomic databases [PDF]

open access: yes, 2013
This poster presents the work of the ComTax project to develop a community-driven curation process among practicing scientists and citizen scientists. The project provides tools to help scientists identify and validate appropriate taxonomic names from ...
De Roeck, Anne   +4 more
core  

Method for the discovery of IPv6 DNS services based on the dynamic domain name watermarks

open access: yes网络与信息安全学报
DNS (domain name system) services in the IPv6 environment experienced rapid development. Research on methods for discovering DNS services in an IPv6 environment was of paramount importance in order to analyze the global developmental trends of DNS ...
HAN Dingkang   +4 more
doaj  

Realistic, Extensible DNS and mDNS Models for INET/OMNeT++ [PDF]

open access: yes, 2015
The domain name system (DNS) is one of the core services in today's network structures. In local and ad-hoc networks DNS is often enhanced or replaced by mDNS. As of yet, no simulation models for DNS and mDNS have been developed for INET/OMNeT++.
Kaiser, Daniel   +2 more
core  

Detection of denial of service attacks against domain name system using neural networks [PDF]

open access: yes, 2009
In this paper we introduce an intrusion detection system for Denial of Service (DoS) attacks against Domain Name System (DNS). Our system architecture consists of two most important parts: a statistical preprocessor and a neural network classifier.
A. Rasid, Mohd Fadlee   +2 more
core   +1 more source

Quality of name resolution in the Domain Name System

open access: yes2009 17th IEEE International Conference on Network Protocols, 2009
The Domain Name System (DNS) is integral to today's Internet. Name resolution for a domain is often dependent on servers well outside the control of the domain's owner. In this paper we propose a formal model for analyzing the name dependencies inherent in DNS, based on protocol specification and actual implementations.
Casey Deccio   +4 more
openaire   +2 more sources

Recognition and translation Arabic-French of Named Entities: case of the Sport places [PDF]

open access: yes, 2009
The recognition of Arabic Named Entities (NE) is a problem in different domains of Natural Language Processing (NLP) like automatic translation. Indeed, NE translation allows the access to multilingual in-formation.
Fehri, Héla   +2 more
core   +3 more sources

Key technology and solution of intelligent resolution for the huge carrier DNS

open access: yesDianxin kexue, 2016
The principles and advantages of intelligent DNS resolution were mainly analyzed.The carrier DNS's intelligent resolution was studied,such as the key intelligent resolution techniques of cache server,recursion server and cache view.According to the ...
Wei PENG, Weihua CAO, Xiaodong HE
doaj   +2 more sources

Terminology Extraction for and from Communications in Multi-disciplinary Domains [PDF]

open access: yes, 2016
Terminology extraction generally refers to methods and systems for identifying term candidates in a uni-disciplinary and uni-lingual environment such as engineering, medical, physical and geological sciences, or administration, business and leisure ...
Ahmad, Khurshid   +3 more
core  

Home - About - Disclaimer - Privacy