“…List of references Standardized DNS encryption methodologies [3,32,36,44,47,50,54,61,63,66,71,117] Adoption and performance [11, 12, 23, 30, 31, 38, 42, 46, 48, 53, 55-57, 81, 91, 92, 101, 111, 116, 117, 119] Benefits of DNS encryption [20,33,69,89,101,119,123] Practical issues and security vulnerability [9, 18, 19, 29, 34, 39, 49, 58, 59, 62, 64, 65, 67, 70, 72, 76-78, 80, 87, 88, 95, 96, 98, 100, 104, 119] Malware misuse: command and control (C&C) communications [28,33,45,51,75,90,93,94,106,108,118,121] Malware misuse: data exfiltration (or tunneling) [2,5,18,37,52,60,86,97,109] Detecting and classifying encrypted DNS traffic [26,27,35,41,…”