Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Domain Name

An internet address in alphabetic form. Domain names must have at least 2 parts: the part on the left which names the organization, and the part on… Expand
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains… Expand
  • table I
  • table II
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2017
2017
Advanced Persistent Threat (APT) is a serious threat against sensitive information. Current detection approaches are time… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2015
Highly Cited
2015
  • P. Newton
  • Front. Psychol.
  • 2015
  • Corpus ID: 16743874
The existence of ‘Learning Styles’ is a common ‘neuromyth’, and their use in all forms of education has been thoroughly and… Expand
  • figure 1
  • table 1
Is this relevant?
2013
2013
The pre-Socratic Greek philosopher Protagoras (490 BC – 420 BC) made an argument about 2,500 years ago: Man is the measure of all… Expand
Is this relevant?
2009
2009
In the field of eTourism, it is important to present prominent objects of tourists destinations. Nowadays demand for eTourism… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The wonder of the Internet is incredibly capable computers connected with each other under the control of individuals. For all of… Expand
Is this relevant?
2002
2002
  • P. Brown
  • BMJ : British Medical Journal
  • 2002
  • Corpus ID: 27378489
The California based body that oversees the creation of “top level” internet domains such as .com and .org is coming under… Expand
Is this relevant?
2000
2000
  • S. Cheung, K. Levitt
  • Proceeding International Conference on Dependable…
  • 2000
  • Corpus ID: 14602428
Many network applications depend on the security of the domain name system (DNS). Attacks on the DNS can cause denial of service… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
Is this relevant?
1999
1999
In order to reduce average delay and bandwidth usage in the Web, geographically dispersed servers often store copies of popular… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
1997
1997
 
  • table 1
  • figure 1
Is this relevant?