A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Measuring Availability in the Domain Name System
2010
2010 Proceedings IEEE INFOCOM
The domain name system (DNS) is critical to Internet functionality. The availability of a domain name refers to its ability to be resolved correctly. ...
We introduce the minimum servers queried (MSQ) and redundancy as availability metrics and show how common DNS misconfigurations impact the availability of domain names. ...
In this paper we formalize the concept of domain name availability and develop a model for measuring availability. ...
doi:10.1109/infcom.2010.5462270
dblp:conf/infocom/DeccioSKM10
fatcat:a4mlo2lyfjex7hyq53pvsfrt4e
Prediction of the domain name system (DNS) quality attributes
2017
Proceedings of the Symposium on Applied Computing - SAC '17
The Domain Name System (DNS) has a direct impact on the performance and dependability of nearly all aspects of interactions on the Internet. ...
We utilize a set of Structural Metrics defined over this model as indicators of external quality attributes of the domain name system. ...
In [16] Deccio et al. present a model of DNS name resolution from which the availability of a domain name can be quantified in the context of its deployment. Shulman et al. ...
doi:10.1145/3019612.3019728
dblp:conf/sac/RadwanH17
fatcat:mpzc7sdg6zcm3eerllvmyormoi
POSTER
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14
As our study indicates, common configuration choices, that domain operators make, result in a fragile DNS infrastructure, susceptible to malicious attacks and benign failures. ...
We study the operational characteristics of the DNS infrastructure: transitive-trust, coresidence and servers placement. ...
MEASURING DOMAIN NAME SYSTEM We study resilience of the domains to failures and attacks by measuring: (1) inter-domain dependencies via transitive trust, (2) zones coresidence due to name servers sharing ...
doi:10.1145/2660267.2662376
dblp:conf/ccs/ShulmanE14
fatcat:s5cl7dsvfrhlnns4et4v6ga2ii
Fast-Flux Botnet Detection Based on Traffic Response and Search Engines Credit Worthiness
2018
Tehnički Vjesnik
Botnet features are classified according to the possibility of usage and implementation in an embedded system. Traffic response is analysed as a strong candidate for online detection. ...
The aim of this paper is to improve Botnet detection using an Intrusion Detection System (IDS) or router. ...
Acknowledgements The authors would like to thank the Central Informatics Support staff of Zagreb, University of Applied Sciences for gathering data. ...
doi:10.17559/tv-20161012115204
fatcat:w2zpxhchvbdrtcwflzwwv4exai
Detecting and Refactoring Operational Smells within the Domain Name System
2015
Electronic Proceedings in Theoretical Computer Science
The Domain Name System (DNS) is one of the most important components of the Internet infrastructure. ...
They need to be soundly made to create a balance between the availability, security and resilience of the system. ...
Introduction The Domain Name System (DNS) [22] is critical to the integrity of Internet services and applications. ...
doi:10.4204/eptcs.181.8
fatcat:vxcyatvoqjdibnwiwdmayi5xju
Measuring Name System Health
[chapter]
2012
IFIP Advances in Information and Communication Technology
Modern critical infrastructure assets are exposed to security threats arising from their use of IP networks and the Domain Name System (DNS). This paper focuses on the health of DNS. ...
This paper describes the Measuring Naming System (MeNSa), a framework designed to provide a formal methodology, metrics and tools for evaluating DNS health. ...
Our future research will continue our efforts at validating the MeNSa framework using larger data sets and also expand the framework to consider other points of view. ...
doi:10.1007/978-3-642-35764-0_12
fatcat:xzn5y37rozfdrkrhr3j7hu4up4
A Novel Technique for Name Identification from Homeopathy Diagnosis Discussion Forum
2012
Procedia Technology - Elsevier
We have developed a conditional random field based system to identify the named entities from homeopathic diagnosis discussion forum text. We have manually annotated a training corpus for the task. ...
Our system achieves the highest f-value of 84.35. ...
In this paper we present a NER system in the homeopathic discussion forum domain, where we have considered two name categories, drug/medicine names and disease names. ...
doi:10.1016/j.protcy.2012.10.045
fatcat:jtndhfabynhbxj3tiro3cnd4ku
GNormPlus: An Integrative Approach for Tagging Genes, Gene Families, and Protein Domains
2015
BioMed Research International
for gene name disambiguation, such as gene families and protein domains. ...
The automatic recognition of gene names and their associated database identifiers from biomedical text has been widely studied in recent years, as these tasks play an important role in many downstream ...
Acknowledgments The authors would like to thank Robert Leaman for his proofreading of the paper. This research was supported by the NIH Intramural Research Program, National Library of Medicine. ...
doi:10.1155/2015/918710
pmid:26380306
pmcid:PMC4561873
fatcat:sr5cm6bmyrbotiqahiwheqhu7q
A Survey on Various Approach used in Named Entity Recognition for Indian Languages
2017
International Journal of Computer Applications
One major challenge they have found that one NER system built for one domain did not work well with other domains. 90% F-Measure value achieved in Indian languages using various NER approach. ...
And they used Standford's NER tool for name entity recognition. Out of total name entities of 9234, 9180 entities were generated from the system. ...
doi:10.5120/ijca2017913878
fatcat:rda4faeyyrhrnngxiyvvpn44o4
Detecting identifiable areas in mobile environments
2006
Proceedings of the 2006 ACM symposium on Applied computing - SAC '06
This paper presents a solution of this problem that runs in the distributed, self-organizing Nimbus infrastructure. The effectiveness is demonstrated with the help of performance analyses. ...
To support developers of location-based services, the Nimbus framework hides specific details of positioning systems and provides uniform output containing physical as well as symbolic location information ...
← {d 0 .name} for all d ~ d 0 do if p ∈ (d) names ← names ∪ {d.name} return names } If an arbitrary domain d 0 is available that fulfils the first condition, the algorithm can efficiently loop through ...
doi:10.1145/1141277.1141513
dblp:conf/sac/Roth06
fatcat:fwf3jcr45vajtd7cnbadekhhby
What's in a name?
2013
Proceedings of the 5th ACM workshop on HotPlanet - HotPlanet '13
In this paper we describe a methodology for discovering and characterizing the structure of diverse interface DNS names. ...
We extract, organize and assess the details of the encoding used in different networks. ...
Any opinions, findings, conclusions or other recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF, ARO or DHS. ...
doi:10.1145/2491159.2491163
dblp:conf/sigcomm/ChabarekB13
fatcat:cwhs5qvuprhg3f75c5okdxgd6m
SLA management in federated environments
2001
Computer Networks
%mailResponseTime($mailServer, …) < $maxMailResponseTime; } In the contract, %name is used as a notation to identify system attributes and $name is used to identify customer-dependent parameters to be ...
Conformance dynamically loads measurement plug-ins as needed. To minimize measurement traffic, the state of the system is cached in the system variable cache. ...
doi:10.1016/s1389-1286(00)00149-3
fatcat:brenmwsb4zdnjcdisbvh6xc7vy
On Different Categories of Cybercrime in China
[chapter]
2011
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
In this article, some typical cybercrimes are introduced in detail in order to set forth the characteristics of those cybercrimes. ...
Cybercrimes have become an eye-catching social problem in not only China but also other countries of the world. ...
Domain Name System, 7 and the 2004 Measures for the Administration of Internet Domain Names of China. 8
Bingzhi Zhao, Current Situation of Cybercrime in China, available at: http://www.lawtime.cn/info ...
doi:10.1007/978-3-642-23602-0_26
fatcat:62tej7j4fjeshfusr7u5oegcnq
Evaluating and Combining Name Entity Recognition Systems
2016
Proceedings of the Sixth Named Entity Workshop
Name entity recognition (NER) is an important subtask in natural language processing. Various NER systems have been developed in the last decade. ...
Motivated by the need of NER tools in our research work, we select several publicly available and well-established NER tools to validate their outputs against both Wikipedia gold standard corpus and a ...
Acknowledgements We would like to thank Singapore National Library Board for providing all the original documents for our testing and validation. ...
doi:10.18653/v1/w16-2703
dblp:conf/aclnews/JiangBL16
fatcat:de5xwaphwvdnri4bqa2xcpluli
A measurement study of DNSSEC misconfigurations
2015
Security Informatics
In this article, we measure and analyze the misconfigurations for domains in six zones (.bg, .br, .co, .com, .nl and .se). ...
This illustrates that although the authorities of a domain may think their DNS is secured, it is in fact not. ...
Acknowledgements The authors thank Christian Doerr for his valuable feedback and participation in insightful discussions. ...
doi:10.1186/s13388-015-0023-y
fatcat:ez7sf5mcpbaurjzkmjwk6r7rpq
« Previous
Showing results 1 — 15 out of 1,094,907 results