Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,468 papers from all fields of science
Search
Sign In
Create Free Account
Domain hijacking
Known as:
Domain hijack
, Domain name hijacking
, Domain theft
Domain hijacking or domain theft is the act of changing the registration of a domain name without the permission of its original registrant. This can…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Barack Obama on social media
Computer Fraud and Abuse Act
DNS hijacking
Libtiff
Expand
Broader (1)
Cybercrime
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Age to End Dreadful Diseases (HIV, Malaria, TB, Cancer and More): A Theory of Intact or Protected Complement (IPC) Immunity
T. Jin
2017
Corpus ID: 212510315
After enormous efforts to fight for a successful HIV vaccine, the movement ended with frustration. While people are celebrating…
Expand
2015
2015
Method and apparatus for preventing domain name hijacking
蒋嘉琦
,
叶爱平
,
陈鑫
,
韩龙
2015
Corpus ID: 132412979
A method for preventing domain name hijacking is disclosed in the present invention, comprising: capturing a network data packet…
Expand
2014
2014
Detection and Forensics of Domains Hijacking
Andreas Borgwart
,
Spyros Boukoros
,
Haya Schulmann
,
Carel van Rooyen
,
M. Waidner
Global Communications Conference
2014
Corpus ID: 37921661
The naming service provided by Domain Name System (DNS) is essential for locating resources on the Internet, for distributing…
Expand
2011
2011
The guide to safe domain name registration
T. Vollrath
2011
Corpus ID: 58837336
Review
2010
Review
2010
It's the Economy, Stupid: The Hijacking of the Debate Over Immigration Reform by Monsters, Ghosts, and Goblins (or the War on Drugs, War on Terror, Narcoterrorists, Etc.)
Kevin R. Johnson
2010
Corpus ID: 140887865
This is a contribution to a symposium at Chapman University Law School in January 2010 that will be published in a symposium…
Expand
2009
2009
Supporting flexible streaming media protection through privacy-aware secure processors
Youtao Zhang
,
Jun Yang
,
Lan Gao
Computers & electrical engineering
2009
Corpus ID: 617684
2009
2009
the maoists , elections , Boycotts and Violence
Sumanta Banerjee
2009
Corpus ID: 39406581
Sumanta Banerjee (suman5ban@yahoo.com) is best known for his book In the Wake of Naxalbari: A History of the Naxalite Movement in…
Expand
2008
2008
Domain Name Hijacking and Its Legal Regulations
DU Xiao-wei
2008
Corpus ID: 159894414
Along with the swift and overwhelming development of internet and electronic commerce, what is called domain name hijacking is…
Expand
2006
2006
Prototyper archetypes
Tom Chi
,
Kevin Cheng
INTR
2006
Corpus ID: 38005964
All too often, terms are misappropriated , if not outright hijacked, and their meaning becomes either obfuscated or totally…
Expand
2004
2004
Slotting Allowances: An Empirical Investigation
K. Sudhir
,
V. Rao
2004
Corpus ID: 53328904
Slotting allowances are lump-sum payments by manufacturers for stocking new products. The economic rationale for slotting…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE