Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Domain hijacking

Known as: Domain hijack, Domain name hijacking, Domain theft 
Domain hijacking or domain theft is the act of changing the registration of a domain name without the permission of its original registrant. This can… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
User convenience and strong security are often at odds, and most security applications need to find some sort of balance between… Expand
  • figure 1
  • figure 2
  • table 1
2017
2017
ABSTRACT Current theoretical conceptualizations of compassion say little about communicating compassion to people whose suffering… Expand
2016
2016
Maritime piracy and robbery can not only cause logistics chain disruption leading to economic consequences but also result in… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • table 4
2016
2016
the period of revolutionary change in information technology, the two developments that are most far-reaching have been cloud… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
2016
2016
The major function of sensor networks is to gather the data from various sensor nodes which are used to transmit the data at… Expand
  • table I
  • figure 4
  • figure 3
  • figure 9
  • figure 7
2014
2014
The naming service provided by Domain Name System (DNS) is essential for locating resources on the Internet, for distributing… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2011
2011
1. An American Kind of Book 2. The Bestseller Machine and its Diverse Products 3. The Godfather 4. The Novels of Arthur Hailey 5… Expand
Highly Cited
2009
Highly Cited
2009
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
2009
2009
Due to the explosion of Internet technology in the last decade, there is an increasing demand for secure and effective streaming… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2006
2006
All too often, terms are misappropriated , if not outright hijacked, and their meaning becomes either obfuscated or totally… Expand