Author:
Gebrehans Ghebrebrhan Weldit,Damiani Ernesto,Yeun Chan Yeob
Reference56 articles.
1. Data exfiltration: A review of external attack vectors and countermeasures;F Ullah;Journal of Network and Computer Applications,2018
2. Dns security challenges and best practices to deploy secure dns with digital signatures;M H Jalalzai;12th International Bhurban Conference on Applied Sciences and Technology,2015
3. Dns tunneling: a review on features;M Sammour;International Journal of Engineering & Technology,2018
4. Dns tunneling detection using feedforward neural network;Y Bubnov;European Journal of Engineering Research and Science,2018