Domain hijacking

Known as: Domain hijack, Domain name hijacking, Domain theft 
Domain hijacking or domain theft is the act of changing the registration of a domain name without the permission of its original registrant. This can… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1995-2017
012319952017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The naming service provided by Domain Name System (DNS) is essential for locating resources on the Internet, for distributing… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2013
2013
Online Social Networks (OSNs) have attracted millions of active users and have become an integral part of today’s Web ecosystem… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2011
2011
This paper presents a method to incorporate measurement of local magnetic field anomalies into the SLAM (Simultaneous… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2007
Highly Cited
2007
There have been many incidents of prefix hijacking in the Internet. The hijacking AS can blackhole the hijacked traffic… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 5
  • figure 3
Is this relevant?
2006
2006
ISPs operate “abuse” teams to deal with reports of inappropriate email being sent by their customers. Currently, the majority of… (More)
Is this relevant?
2005
2005
We consider the current arrangements whereby many users send their email via ISP “smarthosts” and model this system as an… (More)
Is this relevant?
2004
2004
This study examined subtle forms of discrimination directed towards Arabs. Participants were sent a ‘‘lost’’ e-mail intended for… (More)
  • table 1
  • figure 1
Is this relevant?
2000
2000
This paper investigates the relationship between economic reforms and constitutional transition, which has been neglected by many… (More)
  • table 1
  • figure 1
Is this relevant?
1995
1995
Existing one-time password (OTP) schemes suffer several drawbacks. Token-based systems are expensive, while software-based… (More)
Is this relevant?