Shulman et al., 2014
ViewHTML| Publication | Publication Date | Title |
|---|---|---|
| Kührer et al. | Going wild: Large-scale classification of open DNS resolvers | |
| Brandt et al. | Domain validation++ for mitm-resilient pki | |
| Kim et al. | A survey of domain name system vulnerabilities and attacks | |
| Schmid | Thirty years of DNS insecurity: Current issues and perspectives | |
| Bushart et al. | DNS unchained: Amplified application-layer DoS attacks against DNS authoritatives | |
| Alowaisheq et al. | Zombie awakening: Stealthy hijacking of active domains through DNS hosting referral | |
| Shulman et al. | Towards security of internet naming infrastructure | |
| Noborio et al. | A feasible motion-planning algorithm for a mobile robot based on a quadtree representation | |
| Korczyński et al. | Zone poisoning: The how and where of non-secure DNS dynamic updates | |
| Dai et al. | The hijackers guide to the galaxy:{Off-Path} taking over internet resources | |
| Shulman et al. | Towards forensic analysis of attacks with DNSSEC | |
| Hudaib et al. | DNS advanced attacks and analysis | |
| Li et al. | The maginot line: Attacking the boundary of {DNS} caching protection | |
| Herzberg et al. | Towards adoption of dnssec: Availability and security challenges | |
| Al‐Hammouri et al. | ReCAP: a distributed CAPTCHA service at the edge of the network to handle server overload | |
| Portier et al. | Security in plain txt: Observing the use of dns txt records in the wild | |
| Heftrig et al. | Downgrading {DNSSEC}: How to Exploit Crypto Agility for Hijacking Signed Zones | |
| Wang et al. | Breakspf: How shared infrastructures magnify SPF vulnerabilities across the internet | |
| Bisiaux | DNS threats and mitigation strategies | |
| Shulman et al. | DNSSEC for cyber forensics | |
| Chau et al. | Adaptive deterrence of dns cache poisoning | |
| Fung et al. | SSLock: sustaining the trust on entities brought by SSL | |
| Hudák | Analysis of DNS in cybersecurity | |
| ABDULLAH et al. | THE IMPLEMENTATION STRATEGY OF DNSSEC IN STRENGTHENING DIGITAL GOVERNMENT SECURITY IN MALAYSIA. | |
| Wang | The availability and security implications of glue in the domain name system |