DNS spoofing (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "DNS spoofing" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
1st place
1st place
11th place
8th place
652nd place
515th place
low place
low place
low place
low place
222nd place
297th place
5th place
5th place
332nd place
246th place
206th place
124th place
low place
low place
69th place
59th place
low place
low place

arxiv.org

  • Wei, Lan; Heidemann, John (2020). "Whac-A-Mole: Six Years of DNS Spoofing". arXiv:2011.12978 [cs.CR].

cornell.edu

cs.cornell.edu

doi.org

  • Wu, Hao; Dang, Xianglei; Wang, Lidong; He, Longtao (2016). "Information fusion-based method for distributed domain name system cache poisoning attack detection and identification". IET Information Security. 10 (1): 37–44. doi:10.1049/iet-ifs.2014.0386. ISSN 1751-8717. S2CID 45091791.
  • Storms, Andrew (2006). "Don't Trust Your Vendor's Software Distribution Methodology". Information Systems Security. 14 (6): 38–43. doi:10.1201/1086.1065898X/45782.14.6.20060101/91858.8. S2CID 15167573 – via ProQuest Central.
  • m. Dissanayake, I. M. (2018). "DNS Cache Poisoning: A Review on its Technique and Countermeasures". 2018 National Information Technology Conference (NITC). pp. 1–6. doi:10.1109/NITC.2018.8550085. ISBN 978-1-5386-9136-6. Retrieved 31 January 2024.
  • Maksutov, Artem A.; Cherepanov, Ilya A.; Alekseev, Maksim S. (12 April 2017). "Detection and prevention of DNS spoofing attacks". 2017 Siberian Symposium on Data Science and Engineering (SSDSE). pp. 84–87. doi:10.1109/SSDSE.2017.8071970. ISBN 978-1-5386-1593-5.

ieee.org

ieeexplore.ieee.org

ionos.com

isc.org

ogobin.de

proquest.com

root-dnssec.org

  • "Root DNSSEC". ICANN/Verisign. p. 1. Archived from the original on 10 September 2017. Retrieved 5 January 2012.

semanticscholar.org

api.semanticscholar.org

  • Wu, Hao; Dang, Xianglei; Wang, Lidong; He, Longtao (2016). "Information fusion-based method for distributed domain name system cache poisoning attack detection and identification". IET Information Security. 10 (1): 37–44. doi:10.1049/iet-ifs.2014.0386. ISSN 1751-8717. S2CID 45091791.
  • Storms, Andrew (2006). "Don't Trust Your Vendor's Software Distribution Methodology". Information Systems Security. 14 (6): 38–43. doi:10.1201/1086.1065898X/45782.14.6.20060101/91858.8. S2CID 15167573 – via ProQuest Central.

web.archive.org

wiley.com

onlinelibrary.wiley.com

  • Wu, Hao; Dang, Xianglei; Wang, Lidong; He, Longtao (2016). "Information fusion-based method for distributed domain name system cache poisoning attack detection and identification". IET Information Security. 10 (1): 37–44. doi:10.1049/iet-ifs.2014.0386. ISSN 1751-8717. S2CID 45091791.

worldcat.org

search.worldcat.org

  • Wu, Hao; Dang, Xianglei; Wang, Lidong; He, Longtao (2016). "Information fusion-based method for distributed domain name system cache poisoning attack detection and identification". IET Information Security. 10 (1): 37–44. doi:10.1049/iet-ifs.2014.0386. ISSN 1751-8717. S2CID 45091791.