Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Suspicious DoH traffic"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Mitsuhashi, Rikima, Satoh, Akihiro, Jin, Yong, Iida, Katsuyoshi, Shinagawa, Takahiro, Takai, Yoshiaki
24th International Conference on Information Security, ISC 2021, Virtual Event, November 10–12, 2021
Although the DNS over HTTPS (DoH) protocol has desirable properties for Internet users such as privacy and security, it also causes a problem
Although the DNS over HTTPS (DoH) protocol has desirable properties for Internet users such as privacy and security, it also causes a problem
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=jairo_______::48439e29c3aa051c30c99f85d05b4d89
http://hdl.handle.net/2115/87410
http://hdl.handle.net/2115/87410
Publikováno v:
IEEE Transactions on Network and Service Management. :1-1
Published in: IEEE Transactions on Network and Service Management (Volume:20, Issue:2, June 2023)
DNS over HTTPS (DoH) protocol can mitigate the risk of privacy breaches but makes it difficult to control network security services due to the DNS
DNS over HTTPS (DoH) protocol can mitigate the risk of privacy breaches but makes it difficult to control network security services due to the DNS
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Dawood, Muhammad, Tu, Shanshan, Xiao, Chuangbai, Haris, Muhammad, Alasmary, Hisham, Waqas, Muhammad, Rehman, Sadaqat Ur
Publikováno v:
Computers, Materials & Continua; 2024, Vol. 80 Issue 3, p4513-4542, 30p
Publikováno v:
Applied Sciences (2076-3417); Dec2022, Vol. 12 Issue 24, p12644, 27p
Autor:
Katsuyoshi Iida, Akihiro Satoh, Yoshiaki Takai, Takahiro Shinagawa, Yong Jin, Rikima Mitsuhashi
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030913557
Although the DNS over HTTPS (DoH) protocol has desirable properties for Internet users such as privacy and security, it also causes a problem in that network administrators are prevented from detecting suspicious network traffic generated by malware
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e77740b48783f2b49ab3e139a87afd8a
https://doi.org/10.1007/978-3-030-91356-4_13
https://doi.org/10.1007/978-3-030-91356-4_13
The book presents high-quality research papers presented at International Conference on Computational Intelligence (ICCI 2023) held at Sardar Vallabhbhai National Institute of Technology, Surat, India, during 4–5 November 2023. The topics covered
This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The