Name server

Results: 1255



#Item
51Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1  Institute for In

Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1 Institute for In

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-21 09:55:27
52DNSSEC software at NLnet Labs Jelte Jansen   http://www.nlnetlabs.nl/

DNSSEC software at NLnet Labs Jelte Jansen http://www.nlnetlabs.nl/

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:02
53Internet Engineering Task Force (IETF) Request for Comments: 7871 Category: Informational ISSN: C. Contavalli

Internet Engineering Task Force (IETF) Request for Comments: 7871 Category: Informational ISSN: C. Contavalli

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2016-05-20 16:24:42
54DNS query trends seen at Root and JP Kazunori Fujiwara, JPRS, NANOG 67 DNS Track

DNS query trends seen at Root and JP Kazunori Fujiwara, JPRS, NANOG 67 DNS Track

Add to Reading List

Source URL: dnsops.jp

Language: English - Date: 2016-06-23 05:22:39
55System & Network Engineering  Resilient OpenDNSSEC research project 2  Student

System & Network Engineering Resilient OpenDNSSEC research project 2 Student

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2012-09-18 05:04:11
56On Botnets that use DNS for Command and Control Christian J. Dietrich‡∗ , Christian Rossow†∗ , Felix C. Freiling‡ , Norbert Pohlmann∗ †Computer Systems Group, Vrije Universiteit Amsterdam ‡Department of C

On Botnets that use DNS for Command and Control Christian J. Dietrich‡∗ , Christian Rossow†∗ , Felix C. Freiling‡ , Norbert Pohlmann∗ †Computer Systems Group, Vrije Universiteit Amsterdam ‡Department of C

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:20:24
57Saudi Network Information Center SaudiNIC Dr. Abdulaziz H. AlAl-Zoman Director of SaudiNIC

Saudi Network Information Center SaudiNIC Dr. Abdulaziz H. AlAl-Zoman Director of SaudiNIC

Add to Reading List

Source URL: nic.sa

Language: English - Date: 2015-09-03 01:24:19
58MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era Qi Alfred Chen, Eric Osterweil† , Matthew Thomas†, Z. Morley Mao University of Michigan, † Verisign Labs alfchen@umich.

MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era Qi Alfred Chen, Eric Osterweil† , Matthew Thomas†, Z. Morley Mao University of Michigan, † Verisign Labs alfchen@umich.

Add to Reading List

Source URL: www.verisign.com

Language: English - Date: 2016-05-23 09:25:07
59Chain of Trust The parent-child and keyholder-keysigner relations and their communication in DNSSEC R. Gieben Stichting NLnet Labs

Chain of Trust The parent-child and keyholder-keysigner relations and their communication in DNSSEC R. Gieben Stichting NLnet Labs

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2013-01-17 10:59:05
601 2 Pro Per OsiruSoft Research & Engineering 517 N. Emerald

1 2 Pro Per OsiruSoft Research & Engineering 517 N. Emerald

Add to Reading List

Source URL: www.oretek.com

Language: English - Date: 2011-03-12 17:45:04