Giles Smith, Andrew Robson, David Charter and Philip Webster, Chris Ayres in Los Angeles, Peter Kllnger, Robert Cole, Andrew Pierce, DJM, Adam Sherwin Media Reporter, Sarah Potter, Greg Hurst Political Correspondent, Simon Barnes, Alexandra Blair, Steve Bird and Sean O'Neil, David Rose, Richard Hobson, Ivo Tennant, Michael Evans Defence Editor, Philip Howard, Shaun Murray, Dorking, Kenneth Wood, Christine Seib, James Lunn, Rachel Campbell-Johnston, James Ducker, Gabrieele Hinton, Nic Hopkins, Clive Davis, Alexandra Frean Social Affairs Correspondent, Sam Marlowe, Dominick Trant, Ben Webster Transport Correspondent, Bill Wedderburn, Anthony Browne, Dominic Walsh, Ruth Gledhill, James Doran Wall Street Correspondent, Nell Harman, William Poundstone, Debra Craine, Norman Harris, Jill Dupleix, Ac Matt Dickinson, Dalya Alberge Arts Correspondent, Mick Kelly, Peter Preston, Richard Ford Home Correspondent, Nicholas Blanford, Alan Hamilton, Anthony Browne Brussels Correspondent, Andy Stephens, Jenny MacArthur, Anatole Kaletsky, Roland Watson, Adrian Lovett, Caroline Merrell Banking Correspondent, Gary Duncan Economics Editor, Sarah Vine, Richard Johnstone, John Westerby, Brian O'Connell, Liverpool, Rick Broadbent, Tom Baldwin, Andrew Moore, Mark Henderson Science Correspondent, John Hopkins, Ann Treneman, Sean O'Nell, Simon de Bruxelles, Sean Macaulay, Rob Wright, Geoffrey Dean, David Powell Athletics Correspondent, Tony Evans, Raymond Keene, Ian Evans, Adam Sage, Matthew Pryor, Sean MacAulay, Bryan Owram, James Wilson, Richard Burnett-Hall, David Schwimmer, Steve Coomber, Matthew Horton, Alan M. Stanier, Jeremy Page, Bronwen Maddox, Patrick Hosking, Richard Owen, Christopher Martin-Jenkins Chief Cricket Correspondent, Mick Hume, Alan Bennett, Peter McHUGH, David Herring, Nick Hasell, David Hands Rugby Correspondent, Kevin Maher, Phil Gordon and Nick Szczepanik, Russell Crowe, Rimita Navai, Paul Simons, Julian Muscat, John Allison, Michelle Henery, Nlc Hopkins, Elizabeth Judge Telecomes Correspondent, John Goodbody, Mary Ann Sieghart, Mike Rosewell and John Goodbody, Charles Bremner and Philip Webster Political Editor, Sian Morgan, Mel Webb, Matt Dickinson Chief FootballCorrespondent, Ian Johns, Graham Searjeant Financial Editor, Mike Rosewell, Fred Bridgland, Esther Walker, Russell Jenkins, Andrew Pendleton, Siri Hustvedt, Tony Dawe, Brian Glanville, Carly Chynoweth, Robert Bielby, Peter Riddel, Martin Waller, David Dickinson, Lottie Moggach, Issandr Ei Amranl, Nicky Bull, Mark Baldwin, Sarah Butler, Benedict Nightingale, Dr Thomas Stuttaford, Nicola Woolcock, Alice Miles, Adam Sherwin, Peter Stebbings, Patricia Dobson, Owen Slot, Lewie Smith, Jonathan McEnery, Jenny Davey, Rick broadbent, Peter Klinger, Jane Macartney, Sam Lister Health Correspondent, Patience Wheatcroft, Richard Beeston and Ali Hussain,
... Extra Skills' Before He was Famous... David Dickinson Whois he? Data File Wes Watch What It's ...
2005 - Gale Group | TDA
Nektarios Leontiadis, Nicolas Christin,
WHOIS is a publicly-accessible online directory used to map domain names to the contact information of ... registrants). Regrettably, registrants have anecdotally complained about their WHOIS information being misused, e.g., for spam, while ... All of this has brought into question whether WHOIS is still needed. In this study, we empirically ... lead to a measurable degree of misuse of WHOIS data. We register 400 domains spread over the ... that appear to have statistically-significant impact on WHOIS misuse.
Tópico(s): Internet Traffic Analysis and Secure E-voting
2014 - Springer Science+Business Media | Lecture notes in computer science
Milton Mueller, Mawaki Chango,
The Internet’s Whois service allows anyone to type a domain name into a Web interface and then receive the name and contact ... other countries conflict with this ICANN policy, yet Whois has remained in place for a decade. This ... can be realized. We also note that the Whois story poses problems for Daniel Drezner’s theory ...
Tópico(s): Cybersecurity and Cyber Warfare Studies
2008 - RELX Group (Netherlands) | SSRN Electronic Journal
Milton Mueller, Mawaki Chango,
ABSTRACT The Internet's Whois service allows anyone to type a domain name into a Web interface and then receive the name and contact details ... other countries conflict with this ICANN policy, yet Whois has remained in place for a decade. This ... can be realized. We also note that the Whois story poses problems for Daniel Drezner's theory ...
Tópico(s): European Criminal Justice and Data Protection
2008 - Routledge | Journal of Information Technology & Politics
The Nicname/Whois protocol has served well, but it remains unchanged since it was first published in the early 1980s, despite ... well as among the users submitting queries via Whois. The protocol is now so fragmented in terms ... the Internet registry information service (IRIS), to replace Whois
Tópico(s): Web Data Mining and Analysis
2006 - IEEE Computer Society | IEEE Internet Computing
... type of hijacking method, authors can use the Whois database (http://whois.domaintools.com/; accessed 08 October 2015). If the ... reading sites, we suggest that authors use the Whois database and the Google page ranking algorithm (http:// ... net; accessed 08 October 2015). By using the Whois database, an author can search the domain and ...
Tópico(s): Cybercrime and Law Enforcement Studies
2015 - Wiley | Journal of Advanced Nursing
Priya Mahadevan, Dmitri Krioukov, Marina Fomenkov, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat,
... used by the research community: traceroutes, BGP, and WHOIS. We discover that traceroute and BGP topologies are ... to one another but differ substantially from the WHOIS topology. Among the widely considered metrics, we find ...
Tópico(s): Peer-to-Peer Network Technologies
2006 - Association for Computing Machinery | ACM SIGCOMM Computer Communication Review
The first meeting of the Internet Governance Forum (IGF) was held in Athens from Oct 30-Nov 2, 2006. This meeting capped off nearly a decade of preparations and planning, organized through the World Summit on the Information Society (WSIS). The ultimate result, the IGF, is a discussion body with no decision-making power and a mandate to do little more than publish its results. This article argues that despite this thin mandate - and perhaps because of it - the IGF and the process leading up to it mark ...
Tópico(s): Freedom of Expression and Defamation
2006 - RELX Group (Netherlands) | SSRN Electronic Journal
... sibling relationships with the information acquired from the WHOIS lookup service. More than half of our inferred sibling-to-sibling relationships are confirmed by the WHOIS lookup service. To the best of our knowledge, ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2001 - Institute of Electrical and Electronics Engineers | IEEE/ACM Transactions on Networking
Yongfang Peng, Shengwei Tian, Long Yu, Yalong Lv, Ruijin Wang,
... Attention-Based CNN-LSTM), is proposed.Firstly, the WHOIS check method is used to extract and filter ... URL string statistical information of attributes and the WHOIS information, and the features are subsequently encoded and ...
Tópico(s): User Authentication and Security Systems
2019 - Korea Society of Internet Information | KSII Transactions on Internet and Information Systems
Yanan Cheng, Tingting Chai, Zhaoxin Zhang, Keyu Lu, Yuejin Du,
... detecting malicious domain names by exploring the abnormal WHOIS records. The domain name registries and registrars can ...
Tópico(s): Cybercrime and Law Enforcement Studies
2021 - Oxford University Press | The Computer Journal
Wei Zhang, Wei Wang, Xinchang Zhang, Huiling Shi,
WHOIS service allows people to ask the current registrant some Internet resources. WHOIS service has become an indispensable information service in the DNS. Unfortunately, WHOIS information is often available by the malicious third ... we first analyzed the whole process of the WHOIS protocol. And then the process of the WHOIS privacy collection is analyzed through the clustering method. Several methods of protection of the WHOIS privacy are proposed in this paper. Through the ... protection method can better protect the privacy of WHOIS information in DNS.
Tópico(s): Privacy-Preserving Technologies in Data
2014 - Springer Science+Business Media | Lecture notes in electrical engineering
Augusto Arturi, Esteban Carisimo, Fabián E. Bustamante,
... approaches to infer this topology rely exclusively on WHOIS databases and are thus impacted by its limitations, ... perspective from the legally-bounded information available in WHOIS records. We present $$as2org+$$ , a new framework that ... PeeringDB to boost the state-of-the-art WHOIS-based methodologies. We discuss the challenges and opportunities ...
Tópico(s): Service-Oriented Architecture and Web Services
2023 - Springer Science+Business Media | Lecture notes in computer science
Florian Streibelt, Martina Lindorfer, Seda Gürses, Carlos Gañán, Tobias Fiebig,
... data this is comparably easy, using services like whois or other databases. Similarly, for historic data, several ... For current data, Team Cymru provides a bulk whois service which allows bulk address attribution. However, at ... introduce and evaluate our ‘Back-to-the-Future whois’ service, allowing historic bulk attribution of IP addresses ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2023 - Springer Science+Business Media | Lecture notes in computer science
... nephrotic syndrome. With the exception of one child whois now 8 months of age and still suffering ...
Tópico(s): Biomedical Research and Pathophysiology
1959 - Elsevier BV | The Journal of Pediatrics
... is sometimesnecessitated by there being no faculty member whois (or feels he is) qualified to teach such ...
Tópico(s): Academic and Historical Perspectives in Psychology
1973 - American Psychological Association | American Psychologist
Kyungmin Ko, Heejin Lee, Seungkwon Jang,
... August 17, 2007, http://www.iana.org/root-whois/kp.htm. 24. Reporters Without Borders reported North ...
Tópico(s): Asian Culture and Media Studies
2009 - Taylor & Francis | Korean Journal of Defense Analysis
... sMinervaorPope's ClarissainTheRapeoftheLock—womencaneasilybebothtrivialand vain.Asthepatronessoffemalecharmsandwiles,Gay'sVenus,whois similarincharactertoArielintheRape,istheproperdeityforsuch women.Hergrottoworkshop,staffedbycupids,producessuchtriflesas "ThePatch,thePowder- ...
Tópico(s): Media, Gender, and Advertising
1992 - Johns Hopkins University Press | Studies in eighteenth century culture/Studies in eighteenth-century culture
Cyberspace challenges our traditional cultural understandings of notions as basic as time, space, and—more importantly—identity. With the advent and growth of electronic communication, it is becoming increasingly necessary to ask ourselves who we actually are and who we are interacting with when we are on-line. This article focuses on a case-study from the IRC chat room #rudos (Undernet), and poses the question of whether cyberspace is quite simply a powerful means of reaffirming pre-established Physical- ...
Tópico(s): Cultural Industries and Urban Development
2003 - PsychNology Journal | Psychnology
José M. Fernández, José Valeriano Álvarez Cabal, Joaquín Villanueva Balsera, Gemma Martínez Huerta,
... traditional focus of teaching centers upon the teacher, whois the expert transmitting information to students UNESCO2002 . In ...
Tópico(s): Engineering Education and Curriculum Development
2010 - American Society of Civil Engineers | Journal of Professional Issues in Engineering Education and Practice
... information from IPv6 registries and databases such as WHOIS and DNS is demonstrated. Basic concepts and methods ...
Tópico(s): Digital and Cyber Forensics
2007 - Elsevier BV | Digital Investigation
... out in Google, followed by searches in the WHOIS and Amadeus databases. Five online test purchases of ...
Tópico(s): Smoking Behavior and Cessation
2012 - BMJ | Tobacco Control
Chia-Mei Chen, Jhe-Jhun Huang, Ya-Hui Ou,
... the efficiency benefited from sandbox-based detection. As WHOIS database is not reliable for not every domain ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2014 - Elsevier BV | Journal of Information Security and Applications
... to as a volunteer in the Botswana context) whois a government-recruited community volunteer and moves from ...
Tópico(s): Healthcare innovation and challenges
2014 - Stellenbosch University | Social Work/Maatskaplike Werk
... Middleton's A ChasteMaid inCheapside(1613)?1The modernreader,whois liabletoencounter ChasteMaids wittol, Allwit, after severalShakespeareanpreliminaries - themurderous jealousyofOthelloand ...
Tópico(s): Themes in Literature Analysis
2001 - University of Pennsylvania Press | Journal for Early Modern Cultural Studies
... find any link to website. By using a Whois databases, we detect that fake website is created ...
Tópico(s): User Authentication and Security Systems
2015 - Institute of Advanced Engineering and Science (IAES) | Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
Yeonhee Lee, Hea-Sook Park, Youngseok Lee,
... location for a large IP block from the Whois registry DB, parsing city names in a naive ...
Tópico(s): Network Traffic and Congestion Control
2016 - Association for Computing Machinery | ACM SIGCOMM Computer Communication Review