نتایج جستجو برای: domain name

تعداد نتایج: 554743  

Journal: :Future Internet 2022

Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names which some registered by cybercriminals. Accurate detection malicious domains can effectively defend against cyber attacks. The the use traditional machine learning has been explored many researchers, but still is not perfect. To further improve on this, we propose ...

2012
Jian Jiang Jinjin Liang Kang Li Jun Li Hai-Xin Duan Jianping Wu

Attackers often use domain names for various malicious purposes such as phishing, botnet command and control, and malware propagation. An obvious strategy for preventing these activities is deleting the malicious domain from the upper level DNS servers. In this paper, we show that this is insufficient. We demonstrate a vulnerability affecting the large majority of popular DNS implementations wh...

Journal: :Journal of physics 2022

Name entity recognition (NER) is the foundation of a wide range natural language processing (NLP) task in domain test identification. In this paper, we continue to train pre-trained BERT model by unlabeled texts related identification, so as inject knowledge into and realize adaptation. The experiment results show that proposed domain-adaptive pre-training method increases F1 value 1% compared ...

Journal: :International Journal of Advanced Computer Science and Applications 2023

In legal domain Name Entity Recognition serves as the basis for subsequent stages of artificial intelligence. this paper, authors have developed a dataset training (NER) in Indian domain. As first step research methodology study is done to identify and establish more entities than commonly used named such person, organization, location, so on. The annotators can make use these annotate differen...

Journal: :Logic Journal of the IGPL 1999
Michael Kaminski

In this paper we compare two approaches to the meaning of a free variable x in an open default α(x) : β1(x), . . . , βm(x) γ(x) . The first treats x as a metavariable for the ground terms of the underlying theory, whereas the second treats it as a “name” of arbitrary elements of the theory universe. We show that, for normal default theories, under the domain closure assumption, the two approach...

Journal: :RFC 2005
Roy Arends Rob Austein Matt Larson Dan Massey Scott Rose

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract The Domain Name System Security ...

2011
Delip Rao David Yarowsky

This paper presents an original approach to semi-supervised learning of personal name ethnicity from typed graphs of morphophonemic features and first/last-name co-occurrence statistics. We frame this as a general solution to an inference problem over typed graphs where the edges represent labeled relations between features that are parameterized by the edge types. We propose a framework for pa...

2005
R. Austein

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract The Domain Name System Security ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید