Next Article in Journal
ForkJoinPcc Algorithm for Computing the Pcc Matrix in Gene Co-Expression Networks
Previous Article in Journal
The Application of Improved Harmony Search Algorithm to Multi-UAV Task Assignment
 
 
Article
Peer-Review Record

Evaluating the Effectiveness of Handling Abusive Domain Names by Internet Entities

Electronics 2022, 11(8), 1172; https://doi.org/10.3390/electronics11081172
by Yanan Cheng 1, Yali Liu 1, Lianmiao Wang 1, Zhaoxin Zhang 1,*, Tingting Chai 1,* and Yuejin Du 2
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Electronics 2022, 11(8), 1172; https://doi.org/10.3390/electronics11081172
Submission received: 26 February 2022 / Revised: 2 April 2022 / Accepted: 5 April 2022 / Published: 7 April 2022
(This article belongs to the Section Networks)

Round 1

Reviewer 1 Report

The authors have presented an interesting research article but improvements are required. The authors need to cite very recent sources and improve on the introduction by making explicit the gap they're to fill. The methodology should be rewritten. 

 

Grammar error are too many. 

 

Revise and resubmit for review again.

Author Response

      Thank you for your precious comments and advice. Those comments are all valuable and very helpful for revising and improving our paper, as well as the important guiding significance to our research.

   We have studied comments carefully and have made corrections which we hope meet with approval.

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

The authors present a mixture of survey and assessment of domain name abuse reporting via different methods and entities in China. While the thorough description of the different players and processes involved in the Chinese domain abuse reporting system is interesting to read, it is in many areas very specific to that country. Indeed, as the author's state, their main two types of domain abuse would not be considered abuse at all in many other countries. This automatically makes the work less relevant for an international audience. I would have expected a deeper comparison on the differences between China and other countries. Perhaps also a less "controversial" type of abusive website could have been used, e.g., malware spreaders - even though, I understand that this is hard to do. The respsonse times to reports of the different organisations are intersting from a Chinese perspective but also only a momentary snapshot without wider implications and applicability. Not all of the suggestions on how to improve the situation do seem to be based directly off of the results of the study. If this article was meant for a local audience in China only, I probably would have no objections but I am missing any major relevance for an international reader - apart from learning on how things are done in China and how well they do or do not work. Therefore, I would not recommend this for publication in its present form.

Author Response

     Thank you for your precious comments and advice. Those comments are all valuable and very helpful for revising and improving our paper, as well as the important guiding significance to our research.

     We have studied comments carefully and have made corrections which we hope meet with approval. 

Please see the attachment.

Author Response File: Author Response.pdf

Back to TopTop