No abstract available.
RFC Downloads
Cited By
- Strachanski F, Petrov D, Schmidbauer T and Wendzel S A Comprehensive Pattern-based Overview of Stegomalware Proceedings of the 19th International Conference on Availability, Reliability and Security, (1-10)
- Heftrig E, Schulmann H, Vogel N and Waidner M Protocol Fixes for KeyTrap Vulnerabilities Proceedings of the 2024 Applied Networking Research Workshop, (74-80)
- Drichel A, Meyer M and Meyer U Towards Robust Domain Generation Algorithm Classification Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, (2-18)
- Sengupta J, Kosek M, Fries J, Ferlin-Reiter S and Bajpai V (2024). On Cross-Layer Interactions of QUIC, Encrypted DNS and HTTP/3: Design, Evaluation, and Dataset, IEEE Transactions on Network and Service Management, 21:3, (2992-3007), Online publication date: 1-Jun-2024.
- Jerabek K, Hynek K and Rysavy O (2024). Comparative analysis of DNS over HTTPS detectors, Computer Networks: The International Journal of Computer and Telecommunications Networking, 247:C, Online publication date: 1-Jun-2024.
- Fernandez S, Hureau O, Duda A and Korczynski M WHOIS Right? An Analysis of WHOIS and RDAP Consistency Passive and Active Measurement, (206-231)
- Gao G, Niu W, Gong J, Gu D, Li S, Zhang M and Zhang X (2024). GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph, IEEE Transactions on Information Forensics and Security, 19, (7705-7719), Online publication date: 1-Jan-2024.
- Arouna A, Livadariu I, Van Rijswijk-Deij R and Jonker M Advancing in Reverse: A Comprehensive Characterization of IN-ADDR.ARPA Deployment Proceedings of the 18th Asian Internet Engineering Conference, (37-45)
- Hasegawa K, Kondo D, Osumi M and Tode H (2023). Collaborative Defense Framework Using FQDN-Based Allowlist Filter Against DNS Water Torture Attack, IEEE Transactions on Network and Service Management, 20:4, (3968-3983), Online publication date: 1-Dec-2023.
- Gibb R, Madhavapeddy A and Crowcroft J Where on Earth is the Spatial Name System? Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, (79-86)
- Xu W, Li X, Lu C, Liu B, Duan H, Zhang J, Chen J and Wan T TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (311-325)
- Linker F and Basin D ADEM: An Authentic Digital EMblem Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (2815-2829)
- Liu S, Duan H, Heimes L, Bearzi M, Vieli J, Basin D and Perrig A A Formal Framework for End-to-End DNS Resolution Proceedings of the ACM SIGCOMM 2023 Conference, (932-949)
- Lyu M, Gharakheili H and Sivaraman V (2022). A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques, ACM Computing Surveys, 55:8, (1-28), Online publication date: 31-Aug-2023.
- Shi J, Wang Z, Feng Z, Lan Y, Qin S, You W, Zou W, Payer M and Zhang C AIFORE Proceedings of the 32nd USENIX Conference on Security Symposium, (4967-4984)
- Fiebig T Crisis, Ethics, Reliability & a measurement.network Proceedings of the 2023 Applied Networking Research Workshop, (44-50)
- Arouna A, Livadariu I and Jonker M Lowering the Barriers to Working with Public RIR-Level Data Proceedings of the 2023 Applied Networking Research Workshop, (24-26)
- Lim S, Lee H, Kim H, Lee H and Kwon T ZTLS: A DNS-based Approach to Zero Round Trip Delay in TLS handshake Proceedings of the ACM Web Conference 2023, (2360-2370)
- Xu C, Zhang Y, Shi F, Ma H, Ding W and Shan H Gushing Resolvers: Measuring Open Resolvers’ Recursive Behavior Proceedings of the 4th International Conference on Advanced Information Science and System, (1-6)
- Moure-Garrido M, Campo C and Garcia-Rubio C Detecting Malicious Use of DoH Tunnels Using Statistical Traffic Analysis Proceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, (25-32)
- Kosek M, Doan T, Huber S and Bajpai V (2022). Measuring DNS over TCP in the era of increasing DNS response sizes, ACM SIGCOMM Computer Communication Review, 52:2, (44-55), Online publication date: 30-Apr-2022.
- Park J, Jang R, Mohaisen M and Mohaisen D (2021). A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet, IEEE/ACM Transactions on Networking, 30:1, (76-89), Online publication date: 1-Feb-2022.
- Nawrocki M, Koch M, Schmidt T and Wählisch M Transparent forwarders Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies, (454-462)
- Kakarla S, Beckett R, Millstein T and Varghese G How Complex is DNS? Proceedings of the 20th ACM Workshop on Hot Topics in Networks, (116-122)
- Chhabra R, Murley P, Kumar D, Bailey M and Wang G Measuring DNS-over-HTTPS performance around the world Proceedings of the 21st ACM Internet Measurement Conference, (351-365)
- Nawrocki M, Hiesgen R, Schmidt T and Wählisch M QUICsand Proceedings of the 21st ACM Internet Measurement Conference, (283-291)
- Wang Z and Guo Y (2021). Neural networks based domain name generation, Journal of Information Security and Applications, 61:C, Online publication date: 1-Sep-2021.
- Shimayoshi T, Kasahara Y and Fujimura N Challenge for Consolidation of Individual Email Services into a Cloud Service Proceedings of the 2021 ACM SIGUCCS Annual Conference, (26-29)
- Li H, Zhang X, Cao S, He L and Zhang H Active Measurement of Open Resolver Service Nodes Proceedings of the 4th International Conference on Computer Science and Application Engineering, (1-8)
- Li H, He L, Zhang H, Zhang K, Li X and He C CDN-hosted Domain Detection with Supervised Machine Learning through DNS Records Proceedings of the 3rd International Conference on Information Science and Systems, (144-149)
- Li H, Zhang H, He L, Zhang K, He C and Wei B Role Identification of Domain Name Server Using Machine Learning based on DNS Response Features Proceedings of the 3rd International Conference on Information Science and Systems, (133-137)
- Nakatsuka Y, Paverd A and Tsudik G PDoT Proceedings of the 35th Annual Computer Security Applications Conference, (489-499)
- Ghali C, Tsudik G and Uzun E (2019). In Content We Trust, IEEE/ACM Transactions on Networking, 27:5, (1787-1800), Online publication date: 1-Oct-2019.
- Zhauniarovich Y, Khalil I, Yu T and Dacier M (2018). A Survey on Malicious Domains Detection through DNS Data Analysis, ACM Computing Surveys, 51:4, (1-36), Online publication date: 31-Jul-2019.
- Delaware B, Suriyakarn S, Pit-Claudel C, Ye Q and Chlipala A (2019). Narcissus: correct-by-construction derivation of decoders and encoders from binary formats, Proceedings of the ACM on Programming Languages, 3:ICFP, (1-29), Online publication date: 26-Jul-2019.
- Tomic D, Zagar D and Martinovic G (2019). Implementation and efficiency analysis of composite DNS-metric for dynamic server selection, Telecommunications Systems, 71:1, (1-18), Online publication date: 1-May-2019.
- Ye Q and Delaware B A verified protocol buffer compiler Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and Proofs, (222-233)
- Chiba D, Yagi T, Akiyama M, Shibahara T, Mori T and Goto S (2018). DomainProfiler, International Journal of Information Security, 17:6, (661-680), Online publication date: 1-Nov-2018.
- Moura G, Heidemann J, Müller M, de O. Schmidt R and Davids M When the Dike Breaks Proceedings of the Internet Measurement Conference 2018, (8-21)
- Mwangi X and Sollins K MNDN Proceedings of the 5th ACM Conference on Information-Centric Networking, (117-124)
- Messabi K, Aldwairi M, Yousif A, Thoban A and Belqasmi F Malware detection using DNS records and domain name features Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, (1-7)
- Carrez S (2018). IP Network Stack in Ada 2012 and the Ravenscar Profile, ACM SIGAda Ada Letters, 37:2, (51-58), Online publication date: 13-Jun-2018.
- Casleton E, Osthus D and VanźBuren K (2018). Imputation for multisource data with comparison and assessment techniques, Applied Stochastic Models in Business and Industry, 34:1, (44-60), Online publication date: 1-Jan-2018.
- Chen S, Jeng T, Huang C, Chen C and Chou K Doctrina Proceedings of the 2017 7th International Conference on Communication and Network Security, (67-75)
- Müller M, Moura G, de O. Schmidt R and Heidemann J Recursives in the wild Proceedings of the 2017 Internet Measurement Conference, (489-495)
- Chen Y, Kintis P, Antonakakis M, Nadji Y, Dagon D and Farrell M (2017). Measuring lower bounds of the financial abuse to online advertisers, Computers and Security, 67:C, (164-180), Online publication date: 1-Jun-2017.
- Azodi A, Cheng F and Meinel C (2017). Event Driven Network Topology Discovery and Inventory Listing Using REAMS, Wireless Personal Communications: An International Journal, 94:3, (415-430), Online publication date: 1-Jun-2017.
- Kalim U, Gardner M, Brown E and Feng W SLIM Proceedings of the Symposium on Architectures for Networking and Communications Systems, (165-177)
- Chen C, Lehri H, Kuan Loh L, Alur A, Jia L, Loo B and Zhou W Distributed Provenance Compression Proceedings of the 2017 ACM International Conference on Management of Data, (203-218)
- Radwan M and Heckel R Prediction of the domain name system (DNS) quality attributes Proceedings of the Symposium on Applied Computing, (578-585)
- Stevanovic M, Pedersen J, D'alconzo A and Ruehrup S (2017). A method for identifying compromised clients based on DNS traffic analysis, International Journal of Information Security, 16:2, (115-132), Online publication date: 1-Apr-2017.
- Hubballi N and Tripathi N (2017). A closer look into DHCP starvation attack in wireless networks, Computers and Security, 65:C, (387-404), Online publication date: 1-Mar-2017.
- Korczyński M, Król M and van Eeten M Zone Poisoning Proceedings of the 2016 Internet Measurement Conference, (271-278)
- Moura G, Schmidt R, Heidemann J, de Vries W, Muller M, Wei L and Hesselman C Anycast vs. DDoS Proceedings of the 2016 Internet Measurement Conference, (255-270)
- Kirchler M, Herrmann D, Lindemann J and Kloft M Tracked Without a Trace Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, (23-34)
- Yu D, Ranganathan A, Masti R, Soriente C and Capkun S SALVE Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, (401-414)
- D'Urso C (2016). EXPERIENCE, Journal of Data and Information Quality, 7:3, (1-22), Online publication date: 27-Sep-2016.
- Ghali C, Tsudik G and Wood C Network Names in Content-Centric Networking Proceedings of the 3rd ACM Conference on Information-Centric Networking, (132-141)
- Martínez-Herrera A, Mancillas-López C and Mex-Perera C (2016). GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier, Microprocessors & Microsystems, 45:PA, (129-140), Online publication date: 1-Aug-2016.
- Kintis P, Nadji Y, Dagon D, Farrell M and Antonakakis M Understanding the Privacy Implications of ECS Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - Volume 9721, (343-353)
- Chen Y, Kintis P, Antonakakis M, Nadji Y, Dagon D, Lee W and Farrell M Financial Lower Bounds of Online Advertising Abuse Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - Volume 9721, (231-254)
- Gao H, Yegneswaran V, Jiang J, Chen Y, Porras P, Ghosh S and Duan H (2016). Reexamining DNS from a global recursive resolver perspective, IEEE/ACM Transactions on Networking, 24:1, (43-57), Online publication date: 1-Feb-2016.
- Weitl F, Sebih N, Artho C, Hagiya M, Tanabe Y, Yamagata Y and Yamamoto M Cardinality of UDP Transmission Outcomes Proceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications - Volume 9409, (120-134)
- Danielis P, Altmann V, Skodzik J, Wegner T, Koerner A and Timmermann D (2015). P-DONAS, ACM Transactions on Internet Technology, 15:3, (1-21), Online publication date: 28-Sep-2015.
- Madhavapeddy A, Leonard T, Skjegstad M, Gazagnaire T, Sheets D, Scott D, Mortier R, Chaudhry A, Singh B, Ludlam J, Crowcroft J and Leslie I Jitsu Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, (559-573)
- Flavel A, Mani P, Maltz D, Holt N, Liu J, Chen Y and Surmachev O FastRoute Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, (381-394)
- van Rijswijk-Deij R, Sperotto A and Pras A DNSSEC and its potential for DDoS attacks Proceedings of the 2014 Conference on Internet Measurement Conference, (449-460)
- Wachs M, Schanzenbach M and Grothoff C A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System Proceedings of the 13th International Conference on Cryptology and Network Security - Volume 8813, (127-142)
- Bangert J and Zeldovich N Nail Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation, (615-628)
- Carpenter B (2014). IP addresses considered harmful, ACM SIGCOMM Computer Communication Review, 44:2, (65-69), Online publication date: 8-Apr-2014.
- Thomas M and Mohaisen A Kindred domains Proceedings of the 23rd International Conference on World Wide Web, (707-712)
- Gran E, Dreibholz T and Kvalbein A (2014). NorNet Core - A multi-homed research testbed, Computer Networks: The International Journal of Computer and Telecommunications Networking, 61:C, (75-87), Online publication date: 14-Mar-2014.
- Schomp K, Callahan T, Rabinovich M and Allman M Assessing DNS Vulnerability to Record Injection Proceedings of the 15th International Conference on Passive and Active Measurement - Volume 8362, (214-223)
- Sargent M, Blanton E and Allman M Modern Application Layer Transmission Patterns from a Transport Perspective Proceedings of the 15th International Conference on Passive and Active Measurement - Volume 8362, (141-150)
- Jayarathna D, Tupakula U and Varadharajan V Hypervisor-based security architecture for validating DNS services (poster) Proceedings of the Twelfth Australasian Information Security Conference - Volume 149, (83-86)
- Rafiee H, Mueller C, Niemeier L, Streek J, Sterz C and Meinel C A flexible framework for detecting IPv6 vulnerabilities Proceedings of the 6th International Conference on Security of Information and Networks, (196-202)
- López J, Maag S and Morales G A formal distributed network monitoring approach for enhancing trust management systems Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, (76-83)
- Berger A, Weaver N, Beverly R and Campbell L Internet nameserver IPv4 and IPv6 address relationships Proceedings of the 2013 conference on Internet measurement conference, (91-104)
- Gao H, Yegneswaran V, Chen Y, Porras P, Ghosh S, Jiang J and Duan H (2013). An empirical reexamination of global DNS behavior, ACM SIGCOMM Computer Communication Review, 43:4, (267-278), Online publication date: 19-Sep-2013.
- Gao H, Yegneswaran V, Chen Y, Porras P, Ghosh S, Jiang J and Duan H An empirical reexamination of global DNS behavior Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, (267-278)
- Yevseyeva I, Basto-Fernandes V, Ruano-OrdáS D and MéNdez J (2013). Optimising anti-spam filters with evolutionary algorithms, Expert Systems with Applications: An International Journal, 40:10, (4010-4021), Online publication date: 1-Aug-2013.
- Callahan T, Allman M and Rabinovich M (2013). On modern DNS behavior and properties, ACM SIGCOMM Computer Communication Review, 43:3, (7-15), Online publication date: 1-Jul-2013.
- Shue C and Kalafut A (2013). Resolvers Revealed, ACM Transactions on Internet Technology, 12:4, (1-17), Online publication date: 1-Jul-2013.
- Rose S Progress of DNS security deployment in the federal government Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques, (223-228)
- Dolberg L, François J and Engel T Efficient multidimensional aggregation for large scale monitoring Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques, (163-180)
- Alves R, Campista M, Costa L and Duarte O Towards a pluralist internet using a virtual machine server for network customization Proceedings of the 8th Asian Internet Engineering Conference, (9-16)
- Dagon D Large-scale DNS data analysis Proceedings of the 2012 ACM conference on Computer and communications security, (1054-1055)
- Marchal S, François J, State R and Engel T Proactive discovery of phishing related domain names Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses, (190-209)
- Sollins K Pervasive persistent identification for information centric networking Proceedings of the second edition of the ICN workshop on Information-centric networking, (1-6)
- Anonymous (2012). The collateral damage of internet censorship by DNS injection, ACM SIGCOMM Computer Communication Review, 42:3, (21-27), Online publication date: 26-Jun-2012.
- Yu Y, Wessels D, Larson M and Zhang L (2012). Authority server selection in DNS caching resolvers, ACM SIGCOMM Computer Communication Review, 42:2, (80-86), Online publication date: 29-Mar-2012.
- Deri L, Trombacchi L, Martinelli M and Vannozzi D Towards a passive DNS monitoring system Proceedings of the 27th Annual ACM Symposium on Applied Computing, (629-630)
- Deccio C, Sedayao J, Kant K and Mohapatra P (2012). Quantifying DNS namespace influence, Computer Networks: The International Journal of Computer and Telecommunications Networking, 56:2, (780-794), Online publication date: 1-Feb-2012.
- Rafetseder A, Metzger F, Stezenbach D and Tutschku K Exploring YouTube's content distribution network through distributed application-layer measurements Proceedings of the 2011 International Workshop on Modeling, Analysis, and Control of Complex Networks, (31-36)
- Xu Q, Migault D, Sénécal S and Francfort S K-means and adaptive k-means algorithms for clustering DNS traffic Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (281-290)
- Antunes J and Neves N Automatically complementing protocol specifications from network traces Proceedings of the 13th European Workshop on Dependable Computing, (87-92)
- Borkar G, Pund M and Jawade P Implementation of round robin policy in DNS for thresholding of distributed web server system Proceedings of the International Conference & Workshop on Emerging Trends in Technology, (198-201)
- Shue C and Gupta M (2010). An Internet without the Internet protocol, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:18, (3232-3245), Online publication date: 1-Dec-2010.
- Khosrowshahi B and Graham P Component placement and location for a dynamic software composition system Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering, (127-130)
- Zhang R, Wang X, Farley R, Yang X and Jiang X On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (61-69)
- Jackson C, Barth A, Bortz A, Shao W and Boneh D (2009). Protecting browsers from DNS rebinding attacks, ACM Transactions on the Web, 3:1, (1-26), Online publication date: 1-Jan-2009.
- Cui W, Peinado M, Chen K, Wang H and Irun-Briz L Tupni Proceedings of the 15th ACM conference on Computer and communications security, (391-402)
- Dagon D, Antonakakis M, Vixie P, Jinmei T and Lee W Increased DNS forgery resistance through 0x20-bit encoding Proceedings of the 15th ACM conference on Computer and communications security, (211-222)
- Ballani H and Francis P Mitigating DNS DoS attacks Proceedings of the 15th ACM conference on Computer and communications security, (189-198)
- Luckie M, Hyun Y and Huffaker B Traceroute probe method and forward IP path inference Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, (311-324)
- Plonka D and Barford P Context-aware clustering of DNS query traffic Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, (217-230)
- Elz R and Kamolphiwong S Towards universal mobile-IP Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-6)
- Rikitake K, Nakao K, Shimojo S and Nogawa H (2008). UDP Large-Payload Capability Detection for DNSSEC, IEICE - Transactions on Information and Systems, E91-D:5, (1261-1273), Online publication date: 1-May-2008.
- Akcan H, Suel T and Brönnimann H Geographic web usage estimation by monitoring DNS caches Proceedings of the first international workshop on Location and the web, (85-92)
- Khoury J, Jerez H and De Cicco L Design and implementation of a framework for persistent identification and communication in emerging networks Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities, (1-8)
- Jin S, Gyeong G and Eom Y Design and implementation of VoIP device management scheme in SOHO environments Proceedings of the 2nd international conference on Ubiquitous information management and communication, (580-584)
- Jackson C, Barth A, Bortz A, Shao W and Boneh D Protecting browsers from dns rebinding attacks Proceedings of the 14th ACM conference on Computer and communications security, (421-431)
- Caballero J, Yin H, Liang Z and Song D Polyglot Proceedings of the 14th ACM conference on Computer and communications security, (317-329)
- Chen X, Wang H, Ren S and Zhang X (2007). Maintaining Strong Cache Consistency for the Domain Name System, IEEE Transactions on Knowledge and Data Engineering, 19:8, (1057-1071), Online publication date: 1-Aug-2007.
- Zhang G, Ehlert S, Magedanz T and Sisalem D Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, (57-66)
- Zeinalipour-Yazti D, Kalogeraki V and Gunopulos D (2007). pFusion, IEEE Transactions on Parallel and Distributed Systems, 18:6, (804-817), Online publication date: 1-Jun-2007.
- Zhang J and Honeyman P NFSv4 replication for grid storage middleware Proceedings of the 4th international workshop on Middleware for grid computing
- Pang R, Paxson V, Sommer R and Peterson L binpac Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, (289-300)
- Castro M, O'Shea G and Rowstron A Zero servers with zero broadcasts Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, (36-41)
- Lutz P NetDev Proceedings of the 6th conference on Information technology education, (113-119)
- Ramasubramanian V and Sirer E Perils of transitive trust in the domain name system Proceedings of the 5th ACM SIGCOMM conference on Internet measurement, (35-35)
- Ishibashi K, Toyono T, Toyama K, Ishino M, Ohshima H and Mizukoshi I Detecting mass-mailing worm infected hosts by mining DNS traffic data Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, (159-164)
- Saito Y and Shapiro M (2005). Optimistic replication, ACM Computing Surveys, 37:1, (42-81), Online publication date: 1-Mar-2005.
- Cohen E, Halperin E and Kaplan H (2005). Performance aspects of distributed caches using, TTL-based consistency, Theoretical Computer Science, 331:1, (73-96), Online publication date: 15-Feb-2005.
- Giordano M DNS-Based discovery system in service oriented programming Proceedings of the 2005 European conference on Advances in Grid Computing, (840-850)
- Park K, Pai V, Peterson L and Wang Z CoDNS Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (14-14)
- Malone D The root of the matter Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, (15-20)
- Pappas V, Fältström P, Massey D and Zhang L Distributed DNS troubleshooting Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality, (265-270)
- Balakrishnan H, Lakshminarayanan K, Ratnasamy S, Shenker S, Stoica I and Walfish M (2004). A layered naming architecture for the internet, ACM SIGCOMM Computer Communication Review, 34:4, (343-352), Online publication date: 30-Aug-2004.
- Ramasubramanian V and Sirer E (2004). The design and implementation of a next generation name service for the internet, ACM SIGCOMM Computer Communication Review, 34:4, (331-342), Online publication date: 30-Aug-2004.
- Argyraki K and Cheriton D Loose source routing as a mechanism for traffic policies Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (57-64)
- Balakrishnan H, Lakshminarayanan K, Ratnasamy S, Shenker S, Stoica I and Walfish M A layered naming architecture for the internet Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (343-352)
- Ramasubramanian V and Sirer E The design and implementation of a next generation name service for the internet Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (331-342)
- Preechaveerakul L and Bhattarakosol P One name—many objects—one result Proceedings of the 2004 international symposium on Information and communication technologies, (63-67)
- Wills C, Mikhailov M and Shang H Inferring relative popularity of internet applications by actively querying DNS caches Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, (78-90)
- Sollins K (2003). Designing for scale and differentiation, ACM SIGCOMM Computer Communication Review, 33:4, (267-276), Online publication date: 1-Oct-2003.
- Clark D, Sollins K, Wroclawski J and Faber T (2003). Addressing reality, ACM SIGCOMM Computer Communication Review, 33:4, (247-257), Online publication date: 1-Oct-2003.
- Carter C, Yi S, Ratanchandani P and Kravets R Manycast Proceedings of the 9th annual international conference on Mobile computing and networking, (273-285)
- Huebsch R, Hellerstein J, Lanham N, Loo B, Shenker S and Stoica I Querying the internet with PIER Proceedings of the 29th international conference on Very large data bases - Volume 29, (321-332)
- Sollins K Designing for scale and differentiation Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (267-276)
- Clark D, Sollins K, Wroclawski J and Faber T Addressing reality Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (247-257)
- Krishnamurthy B, Liston R and Rabinovich M DEW Proceedings of the 12th international conference on World Wide Web, (310-320)
- Li H and Wang Y Public-key infrastructure Payment technologies for E-commerce, (39-70)
- Liston R, Srinivasan S and Zegura E Diversity in DNS performance measures Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, (19-31)
- Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M, Larsen R, Shankar A and Agrawala A (2002). Rover, Computer, 35:10, (46-53), Online publication date: 1-Oct-2002.
- Balzarotti D, Ghezzi C and Monga M Supporting configuration management for virtual workgroups in a peer-to-peer setting Proceedings of the 14th international conference on Software engineering and knowledge engineering, (507-511)
- Bayardo Jr. R, Agrawal R, Gruhl D and Somani A YouServ Proceedings of the 11th international conference on World Wide Web, (345-354)
- Ateniese G and Mangard S A new approach to DNS security (DNSSEC) Proceedings of the 8th ACM conference on Computer and Communications Security, (86-95)
- Jung J, Sit E, Balakrishnan H and Morris R DNS performance and the effectiveness of caching Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (153-167)
- Paxson V (2001). An analysis of using reflectors for distributed denial-of-service attacks, ACM SIGCOMM Computer Communication Review, 31:3, (38-47), Online publication date: 1-Jul-2001.
- Carpenter T, Carter R, Cochinwala M and Eiger M (2001). Client-Server Caching with Expiration Timestamps, Distributed and Parallel Databases, 10:1, (5-22), Online publication date: 1-Jul-2001.
- Tzagarakis M, Karousos N, Christodoulakis D and Reich S Naming as a fundamental concept of open hypermedia systems Proceedings of the eleventh ACM on Hypertext and hypermedia, (103-112)
- Iyengar A, Challenger J, Dias D and Dantzig P (2000). High-Performance Web Site Design Techniques, IEEE Internet Computing, 4:2, (17-26), Online publication date: 1-Mar-2000.
- LeFebvre W and Craig K Rapid reverse DNS lookups for web servers Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2, (21-21)
- Raman S and McCanne S (1999). A model, analysis, and protocol framework for soft state-based communication, ACM SIGCOMM Computer Communication Review, 29:4, (15-25), Online publication date: 1-Oct-1999.
- Raman S and McCanne S A model, analysis, and protocol framework for soft state-based communication Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, (15-25)
- Guttman E (1999). Service Location Protocol, IEEE Internet Computing, 3:4, (71-80), Online publication date: 1-Jul-1999.
- Hutchins R, Camp T and Enslow P (1999). A novel approach to mobility management, ACM SIGCOMM Computer Communication Review, 29:1, (86-96), Online publication date: 1-Jan-1999.
- Grubb M and Carter R Single Sign-On and the System Administrator Proceedings of the 12th USENIX conference on System administration, (63-86)
- Belaïd D, Provenzano N and Taconet C Dynamic management of CORBA trader federation Proceedings of the 4th conference on USENIX Conference on Object-Oriented Technologies and Systems - Volume 4, (4-4)
- Maltzahn C, Richardson K and Grunwald D (1997). Performance issues of enterprise level web proxies, ACM SIGMETRICS Performance Evaluation Review, 25:1, (13-23), Online publication date: 1-Jun-1997.
- Maltzahn C, Richardson K and Grunwald D Performance issues of enterprise level web proxies Proceedings of the 1997 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (13-23)
- Mansfield G, Jayanthi K, Ika T, Ohta K, Nemoto Y and Kato N Network cartographer Proceedings of the fourth ACM international conference on Multimedia, (439-440)
- Galvin J Public Key distribution with secure DNS Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (16-16)
- Chankhunthod A, Danzig P, Neerdaels C, Schwartz M and Worrell K A hierarchical internet object cache Proceedings of the 1996 annual conference on USENIX Annual Technical Conference, (13-13)
- Sollins K and Van Dyke J Linking in a Global Information Architecture Proceedings of the Fourth International Conference on World Wide Web, (493-508)
- Bellovin S Using the domain name system for system break-ins Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5, (18-18)
- Blackwell T, Chan K, Chang K, Charuhas T, Gwertzman J, Karp B, Kung H, Li W, Lin D, Morris R, Polansky R, Tang D, Young C and Zao J Secure short-cut routing for mobile IP Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1, (21-21)
- Rao H and Peterson L (1993). Accessing Files in an Internet, IEEE Transactions on Software Engineering, 19:6, (613-624), Online publication date: 1-Jun-1993.
- Neufeld G and Brachman B A transactional API for the EAN X.500 directory service Proceedings of the 1992 conference of the Centre for Advanced Studies on Collaborative research - Volume 2, (81-91)
- Danzig P, Obraczka K and Kumar A (1992). An analysis of wide-area name server traffic, ACM SIGCOMM Computer Communication Review, 22:4, (281-292), Online publication date: 1-Oct-1992.
- Danzig P, Obraczka K and Kumar A An analysis of wide-area name server traffic Conference proceedings on Communications architectures & protocols, (281-292)
- Shaheen-Gouda A and Loucks L Name borders Proceedings of the 5th workshop on ACM SIGOPS European workshop: Models and paradigms for distributed systems structuring, (1-6)
- Znati T and Molka J A simulation based analysis of naming schemes for distributed systems Proceedings of the 25th annual symposium on Simulation, (42-51)
- Chang R, Ravishankar C and Slonim J A service acquisition mechanism for the client/service model in cygnus Proceedings of the 1991 conference of the Centre for Advanced Studies on Collaborative research, (323-345)
- Tsuchiya P (1991). Efficient and robust policy routing using multiple hierarchical addresses, ACM SIGCOMM Computer Communication Review, 21:4, (53-65), Online publication date: 1-Aug-1991.
- Tsuchiya P Efficient and robust policy routing using multiple hierarchical addresses Proceedings of the conference on Communications architecture & protocols, (53-65)
- Hutchinson N and Peterson L (1991). The X-Kernel, IEEE Transactions on Software Engineering, 17:1, (64-76), Online publication date: 1-Jan-1991.
- Comer D and Droms R (1990). Uniform access to Internet directory services, ACM SIGCOMM Computer Communication Review, 20:4, (50-59), Online publication date: 1-Aug-1990.
- Comer D and Droms R Uniform access to Internet directory services Proceedings of the ACM symposium on Communications architectures & protocols, (50-59)
- Peterson L, Hutchinson N, O'Malley S and Abbott M (1989). RPC in the x-Kernel: evaluating new design techniques, ACM SIGOPS Operating Systems Review, 23:5, (91-101), Online publication date: 1-Nov-1989.
- Peterson L, Hutchinson N, O'Malley S and Abbott M RPC in the x-Kernel: evaluating new design techniques Proceedings of the twelfth ACM symposium on Operating systems principles, (91-101)
- Mockapetris P and Dunlap K (1988). Development of the domain name system, ACM SIGCOMM Computer Communication Review, 18:4, (123-133), Online publication date: 1-Aug-1988.
- Mills D (1988). The fuzzball, ACM SIGCOMM Computer Communication Review, 18:4, (115-122), Online publication date: 1-Aug-1988.
- Hutchinson N and Peterson L (1988). Design of the x-kernel, ACM SIGCOMM Computer Communication Review, 18:4, (65-75), Online publication date: 1-Aug-1988.
- Mockapetris P and Dunlap K Development of the domain name system Symposium proceedings on Communications architectures and protocols, (123-133)
- Mills D The fuzzball Symposium proceedings on Communications architectures and protocols, (115-122)
- Hutchinson N and Peterson L Design of the x-kernel Symposium proceedings on Communications architectures and protocols, (65-75)
Recommendations
Arabic domain names
SEPADS'06: Proceedings of the 5th WSEAS International Conference on Software Engineering, Parallel and Distributed SystemsDomain names are a very crucial part of applied Internet technology. To this day, they remain dependent upon Latin characters regardless of the global reach of the Internet itself. Other languages are not yet fully supported to locate resources and ...
Time-series Measurement of Parked Domain Names
GLOBECOM 2020 - 2020 IEEE Global Communications ConferenceDomain parking is a monetization mechanism for displaying online advertisements in unused domain names. Some domain names used in cyber attacks are known to leverage domain parking services after the attack. However, the temporal relationships between ...
Domain names (panel session, abstract only): hierarchy in need of organization
The DARPA Domain Name project is an attempt to move from a centralized naming authority to a distributed one. In essence, the domain system computes a single binding from a character string known as a host name to another string known as the host ...