Zeitschriftenartikel zum Thema „Client application for Domain Name System“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Client application for Domain Name System" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Akbar, Lalu A. Syamsul Irfan, Rayasa Puringgar Prasadha Putra, and Suthami Ariessaputra. "WEBSITE INTERFACE MONITORING CLIENT ACTIVITIES USING MIKROTIK ON UBUNTU SERVER 18.04 LTS." DIELEKTRIKA 10, no. 1 (2023): 41–51. http://dx.doi.org/10.29303/dielektrika.v10i1.332.
Der volle Inhalt der QuelleYunianta, Arda, Norazah Yusof, Arif Bramantoro, Haviluddin Haviluddin, Mohd Shahizan Othman, and Nataniel Dengen. "Data mapping process to handle semantic data problem on student grading system." International Journal of Advances in Intelligent Informatics 2, no. 3 (2016): 157. http://dx.doi.org/10.26555/ijain.v2i3.84.
Der volle Inhalt der QuelleMa, Liang, and Xiaole Zhao. "Research on the multi-terminal adapting Web system construction." MATEC Web of Conferences 232 (2018): 01028. http://dx.doi.org/10.1051/matecconf/201823201028.
Der volle Inhalt der QuelleZhang, Denghui, Lijing Ren, and Zhaoquan Gu. "Enhancing the Privacy of Network Services through Trusted Computing." Applied Sciences 12, no. 18 (2022): 9191. http://dx.doi.org/10.3390/app12189191.
Der volle Inhalt der QuelleSitorus, Sahat Parulian, Elysa Rohayani Hasibuan, and Rohani Rohani. "Analysis performance of content delivery network by used Rateless Code method." Sinkron 7, no. 4 (2022): 2348–59. http://dx.doi.org/10.33395/sinkron.v7i4.11651.
Der volle Inhalt der QuelleKhudoyberdiev, Jin, and Kim. "A Novel Approach towards Resource Auto-Registration and Discovery of Embedded Systems Based on DNS." Electronics 8, no. 4 (2019): 442. http://dx.doi.org/10.3390/electronics8040442.
Der volle Inhalt der QuelleNdichu, Samuel, Sangwook Kim, Seiichi Ozawa, Tao Ban, Takeshi Takahashi, and Daisuke Inoue. "Detecting Web-Based Attacks with SHAP and Tree Ensemble Machine Learning Methods." Applied Sciences 12, no. 1 (2021): 60. http://dx.doi.org/10.3390/app12010060.
Der volle Inhalt der QuelleSudip, Chakraborty, and S. Aithal P. "Demonstration of Modbus Protocol for Robot Communication Using C#." International Journal of Applied Engineering and Management Letters (IJAEML) 5, no. 2 (2021): 119–31. https://doi.org/10.5281/zenodo.5709235.
Der volle Inhalt der QuelleNguyen, Tuan Anh, and Minho Park. "DoH Tunneling Detection System for Enterprise Network Using Deep Learning Technique." Applied Sciences 12, no. 5 (2022): 2416. http://dx.doi.org/10.3390/app12052416.
Der volle Inhalt der QuelleRizal, Saepul, Popy Novita Pasaribu, and Nandang Sutisna. "Understanding Zalora's Neuromarketing-Based Online Marketplace Customer Choices." inovator 12, no. 2 (2023): 264–87. https://doi.org/10.32832/inovator.v12i2.17633.
Der volle Inhalt der QuelleVictors, Jesse, Ming Li, and Xinwen Fu. "The Onion Name System." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 21–41. http://dx.doi.org/10.1515/popets-2017-0003.
Der volle Inhalt der QuelleKorobeinikova, Tetiana, and Taras Fedchuk. "OVERVIEW OF SECURE ACCESS TO DOMAIN NAME SYSTEM RESOURCES." Information technology and computer engineering 59, no. 1 (2024): 40–53. http://dx.doi.org/10.31649/1999-9941-2024-59-1-40-53.
Der volle Inhalt der QuelleXiao, Yu Zhi. "On the Research of Internet Equipment Naming Methods." Advanced Materials Research 664 (February 2013): 1021–27. http://dx.doi.org/10.4028/www.scientific.net/amr.664.1021.
Der volle Inhalt der QuelleBein, Adrian Sean, and Alexander Williams. "Networking IP Restriction filtering and network address." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 2 (2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.
Der volle Inhalt der QuelleJi, Hong. "Research on Design and Security Strategy of DNS." Applied Mechanics and Materials 378 (August 2013): 510–13. http://dx.doi.org/10.4028/www.scientific.net/amm.378.510.
Der volle Inhalt der QuelleDíaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †." Sensors 19, no. 15 (2019): 3292. http://dx.doi.org/10.3390/s19153292.
Der volle Inhalt der QuelleIrwin, Barry V. W., and Christoffer Thorske Johnsen. "An Exploration of the Adoption of DNSSEC by Businesses within the Norwegian ccTLD." International Conference on Intelligent and Innovative Computing Applications 2022 (December 31, 2022): 22–29. http://dx.doi.org/10.59200/iconic.2022.003.
Der volle Inhalt der QuelleJia, Bin. "The Research and Application of Short Message Name and Address Technology." Applied Mechanics and Materials 432 (September 2013): 571–74. http://dx.doi.org/10.4028/www.scientific.net/amm.432.571.
Der volle Inhalt der QuelleZhang, Chen Guang, Yu Lan Zhao, Feng Xian Jiang, and Chao Ji. "The Research and Application of Short Message Name and Address System." Advanced Materials Research 225-226 (April 2011): 1008–11. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.1008.
Der volle Inhalt der QuelleTian, Hong Cheng, Hong Wang, and Jin Kui Ma. "Domain Name System during the Transition from IPv4 to IPv6." Applied Mechanics and Materials 687-691 (November 2014): 1912–15. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1912.
Der volle Inhalt der QuelleSchmitt, Paul, Anne Edmundson, Allison Mankin, and Nick Feamster. "Oblivious DNS: Practical Privacy for DNS Queries." Proceedings on Privacy Enhancing Technologies 2019, no. 2 (2019): 228–44. http://dx.doi.org/10.2478/popets-2019-0028.
Der volle Inhalt der QuelleMahdi, Hussain. "KERBEROS SECURITY EVALUATION." Diyala Journal of Engineering Sciences 1, no. 1 (2008): 152–63. http://dx.doi.org/10.24237/djes.2008.01111.
Der volle Inhalt der QuelleZhang, Zhi Chun, Song Yan Lu, Kun Xu, Zhuang Xiong, and Yun He. "A Transparent Communication System in Distributed Systems." Advanced Materials Research 909 (March 2014): 311–16. http://dx.doi.org/10.4028/www.scientific.net/amr.909.311.
Der volle Inhalt der QuelleSinganamalla, Sudheesh, Suphanat Chunhapanya, Jonathan Hoyland, et al. "Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 575–92. http://dx.doi.org/10.2478/popets-2021-0085.
Der volle Inhalt der QuelleHussain, Mohammed Abdulridha, Hai Jin, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Salah H. Abbdal, and Ayad Ibrahim. "Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/9479476.
Der volle Inhalt der QuelleJeong, Taikyeong Ted. "Highly scalable intelligent sensory application and time domain matrix for safety-critical system design." International Journal of Distributed Sensor Networks 14, no. 4 (2018): 155014771774110. http://dx.doi.org/10.1177/1550147717741102.
Der volle Inhalt der QuelleBlaise, Ohwo Onome, Ajayi Wumi, and Udosen Alfred. "Enhancing DNS Performance with Efficient Cryptographic Algorithms: A Comparative Study of DoT Frameworks." Asian Journal of Computer Science and Technology 13, no. 2 (2024): 48–55. https://doi.org/10.70112/ajcst-2024.13.2.4288.
Der volle Inhalt der QuelleChen, Whai-En, Yi-Bing Lin, Tai-Hsiang Yen, Syuan-Ru Peng, and Yun-Wei Lin. "DeviceTalk: A No-Code Low-Code IoT Device Code Generation." Sensors 22, no. 13 (2022): 4942. http://dx.doi.org/10.3390/s22134942.
Der volle Inhalt der QuelleSetiawan, Widyadi, I. Nyoman Budiastra, and Sri Andriati Asri. "Android Application of Traffic Density Visualization Based on Vehicle Speed." Journal of Electrical, Electronics and Informatics 1, no. 1 (2017): 7. http://dx.doi.org/10.24843/jeei.2017.v01.i01.p02.
Der volle Inhalt der QuelleSetiawan, Widyadi, I. Nyoman Budiastra, and Sri Andriati Asri. "Android Application of Traffic Density Visualization Based on Vehicle Speed." Journal of Electrical, Electronics and Informatics 1, no. 1 (2017): 7. http://dx.doi.org/10.24843/jeei.v01i01p02.
Der volle Inhalt der QuelleSetiawan, Widyadi, I. Nyoman Budiastra, and Sri Andriati Asri. "Android Application of Traffic Density Visualization Based on Vehicle Speed." Journal of Electrical, Electronics and Informatics 1, no. 1 (2017): 7. http://dx.doi.org/10.24843/jteei.v01i01p02.
Der volle Inhalt der QuelleGoularas, Dionysis, Khalifa Djemal, and Yannis Mannoussakis. "3D Image Modelling and Specific Treatments in Orthodontics Domain." Applied Bionics and Biomechanics 4, no. 3 (2007): 111–24. http://dx.doi.org/10.1155/2007/248715.
Der volle Inhalt der QuelleArdiyanto, Yudhi, and Muhamad Yusvin Mustar. "Color Blindness Testing Using A Client-Server Based on The Ishihara Method." Journal of Electrical Technology UMY 4, no. 2 (2020): 46–52. http://dx.doi.org/10.18196/jet.v4i2.10993.
Der volle Inhalt der QuelleArjumand, Ali. "An Approach for Effectively Handling Small Size Image Files in Hadoop." International Journal of Trend in Scientific Research and Development 2, no. 3 (2019): 1751–56. https://doi.org/10.31142/ijtsrd11516.
Der volle Inhalt der QuelleB.Jayaram, R.Rahul, R. Rishvaanth A, et al. "India and different nations are battling with fake items." International Journal of Innovative Science and Research Technology 7, no. 12 (2022): 36–40. https://doi.org/10.5281/zenodo.7450370.
Der volle Inhalt der QuelleLuo, Xi, Yixin Li, Hongyuan Cheng, and Lihua Yin. "AGCN-Domain: Detecting Malicious Domains with Graph Convolutional Network and Attention Mechanism." Mathematics 12, no. 5 (2024): 640. http://dx.doi.org/10.3390/math12050640.
Der volle Inhalt der QuelleAdler, Jeffrey L., and Eknauth Persaud. "Knowledge Acquisition for Large-Scale Expert Systems in Transportation." Transportation Research Record: Journal of the Transportation Research Board 1651, no. 1 (1998): 59–65. http://dx.doi.org/10.3141/1651-09.
Der volle Inhalt der QuelleSekhar, Sirish. "Serverless Deployment of a Next.js Application Using AWS." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 2617–20. https://doi.org/10.22214/ijraset.2025.72702.
Der volle Inhalt der QuelleRaj, Adarsh. "Neonatal Screening Application." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (2022): 89–99. http://dx.doi.org/10.22214/ijraset.2022.39619.
Der volle Inhalt der QuelleG. Albino, Michael, Cyrel B. Alvarez, Shermaine B. Murillo, Aubrey Jaye S. Tuzon, and Kris Danica P. Paña. "Automated Hotel Booking and Cancellation Web-Based Application: A Prototype." Oriental journal of computer science and technology 15, no. 010203 (2022): 53–63. http://dx.doi.org/10.13005/ojcst15.010203.05.
Der volle Inhalt der QuelleJ, Ravikumar, and Ramakanth Kumar P. "A framework for named entity recognition of clinical data." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 2 (2020): 946. http://dx.doi.org/10.11591/ijeecs.v18.i2.pp946-952.
Der volle Inhalt der QuelleRavikumar, J., and Kumar P.. Ramakanth. "A framework for named entity recognition of clinical data." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 18, no. 2 (2020): 946–52. https://doi.org/10.11591/ijeecs.v18.i2.pp946-952.
Der volle Inhalt der QuelleSihite, Muhammad Hafiz Taruligani, Ardiansyah Ardiansyah, Rizky Prabowo, and Febi Eka Febriansyah. "Aplikasi Mobile Periklanan Digiprom Berbasis Android." Jurnal Pepadun 3, no. 3 (2022): 353–60. http://dx.doi.org/10.23960/pepadun.v3i3.133.
Der volle Inhalt der QuelleIovescu, Daniel, and Cătălin Tudose. "Real-Time Document Collaboration—System Architecture and Design." Applied Sciences 14, no. 18 (2024): 8356. http://dx.doi.org/10.3390/app14188356.
Der volle Inhalt der QuelleK R, Dhruva. "Development of Client-Specific Web Service for Manipulating Real-Time Contextual Data." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 1860–62. http://dx.doi.org/10.22214/ijraset.2022.45577.
Der volle Inhalt der QuelleRhodus*, Tim, and Bud Witney. "Developing New Approaches and Tools for Improved Management and Delivery of Online Digital Photos." HortScience 39, no. 4 (2004): 875C—875. http://dx.doi.org/10.21273/hortsci.39.4.875c.
Der volle Inhalt der QuellePallavi, P., and Shaik Salam. "Online Command Area Water Resource Management System." APTIKOM Journal on Computer Science and Information Technologies 5, no. 2 (2020): 70–74. http://dx.doi.org/10.34306/csit.v5i2.141.
Der volle Inhalt der QuelleBarida, Baah, Lizzy Nwagbo Chioma, and Mmeah Shedrack. "Raspberry Pi Utilization in a Federated Machine Learning Domain." Journal of Scientific and Engineering Research 8, no. 3 (2021): 186–92. https://doi.org/10.5281/zenodo.10577630.
Der volle Inhalt der QuelleKart, Özge, Alp Kut, and Vladimir Radevski. "Decision Support System For A Customer Relationship Management Case Study." International Journal of Informatics and Communication Technology (IJ-ICT) 3, no. 2 (2014): 88. http://dx.doi.org/10.11591/ijict.v3i2.pp88-96.
Der volle Inhalt der QuelleGrepon, Benzar Glen, Paul John Labastida, Zichri Vicariato, and Caroline Laarni Sereñas. "School-IntegrIS: An Integrated System Approach to a School Management System of a State College in Northern Mindanao, Philippines." International Journal of Computing Sciences Research 9 (January 1, 2025): 3441–57. https://doi.org/10.25147/ijcsr.2017.001.1.228.
Der volle Inhalt der Quelle