The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for whitelist with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2006-2012 (16) 2013-2018 (20) 2019-2022 (16) 2023 (4)
Publication types (Num. hits)
article(17) inproceedings(39)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 22 occurrences of 20 keywords

Results
Found 56 publication records. Showing 56 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
121Tsong Song Hwang, Tsung-Ju Lee, Yuh-Jye Lee A three-tier IDS via data mining approach. Search on Bibsonomy MineNet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF KDD'99, RIPPER, activity profile, whitelist, intrusion detection system, blacklist, false alarm rate, multiclass SVMs
45Diane Lambert, Daryl Pregibon More bang for their bucks: assessing new features for online advertisers. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF biased sampling, statistical inference, causal modeling, propensity scores
31Ronald Bhuleskar, Anoop Sherlekar, Anala Pandit Hybrid Spam E-mail Filtering. Search on Bibsonomy CICSyN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HSF, spam coefficient, legitimate coefficient, whitelist, forging, spam mean, Self Improvisation, self learning technique, Filter, Filtering, Spam, Email, Hybrid, content based filtering, Parallel model, blacklist
31Asaad Moosa, Eanas Muhsen Alsaffar Proposing a hybrid-intelligent framework to secure e-government web applications. Search on Bibsonomy ICEGOV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF negative logic based filtering, positive logic based filtering, session based filtering, web application firewalls, whitelist, neural networks, fuzzy logic, e-government, web application, blacklist
27Ignacio Redondo, Gloria Aznar Whitelist or Leave Our Website! Advances in the Understanding of User Response to Anti-Ad-Blockers. Search on Bibsonomy Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake, Ayumu Kubota Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data. Search on Bibsonomy Enterp. Inf. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Jan Bayer, Sourena Maroofi, Olivier Hureau, Andrzej Duda, Maciej Korczynski Building a Resilient Domain Whitelist to Enhance Phishing Blacklist Accuracy. Search on Bibsonomy eCrime The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Se-Beom Cheon, Geun-Yeong Choi, DaeYoub Kim A Cheating Attack on a Whitelist-based Anti-Ransomware Solution and its Countermeasure. Search on Bibsonomy ICCE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Wooyeon Jo, SungJin Kim, Hyunjin Kim, Yeonghun Shin, Taeshik Shon Automatic whitelist generation system for ethernet based in-vehicle network. Search on Bibsonomy Comput. Ind. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Yunlong Xing, Jiahao Cao, Kun Sun 0001, Fei Yan 0008, Shengye Wan The devil is in the detail: Generating system call whitelist for Linux seccomp. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Michal Maliszewski, Urszula Boryczka Random Forest in Whitelist-Based ATM Security. Search on Bibsonomy ACIIDS (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Kyu-Seok Shim, Il Kwon Sohn, Eunjoo Lee, Woojin Seok, Wonhyuk Lee Enhance the ICS Network Security Using the Whitelist-based Network Monitoring Through Protocol Analysis. Search on Bibsonomy J. Web Eng. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Nureni Ayofe Azeez, Sanjay Misra, Ihotu Agbo Margaret, Luis Fernández Sanz, Shafii Muhammad Abdulhamid Adopting automated whitelist approach for detecting phishing attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Keita Hasegawa, Daishi Kondo, Hideki Tode FQDN-Based Whitelist Filter on a DNS Cache Server Against the DNS Water Torture Attack. Search on Bibsonomy IM The full citation details ... 2021 DBLP  BibTeX  RDF
27Michael Cheng Yi Cho, Yuan-Hsiang Su, Hsiu-Chuan Huang, Yu-Lung Tsai Top of the Pops: A Novel Whitelist Generation Scheme for Data Exfiltration Detection. Search on Bibsonomy SAI (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Sungjin Kim, Byung Joon Kim, Dong Hoon Lee Prof-gen: Practical Study on System Call Whitelist Generation for Container Attack Surface Reduction. Search on Bibsonomy CLOUD The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Alessandro Vesely DNS Whitelist (DNSWL) Email Authentication Method Extension. Search on Bibsonomy RFC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27DaeYoub Kim, Jihoon Lee Blacklist vs. Whitelist-Based Ransomware Solutions. Search on Bibsonomy IEEE Consumer Electron. Mag. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Xuhao Wang, Qingni Shen, Wu Luo, Pengfei Wu RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis. Search on Bibsonomy CLOUD The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Xinling Shen, Nan Li, Chao Liu 0020, Mengnan Cai WMUD: A Whitelist Method of USB Devices Redirection for Virtual Desktop. Search on Bibsonomy HPCC/SmartCity/DSS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Komei Nomura, Kenji Rikitake, Ryosuke Matsumoto Automatic Whitelist Generation for SQL Queries Using Web Application Tests. Search on Bibsonomy COMPSAC (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Shintaro Fujita, Kenji Sawada, Seiichi Shin, Shu Hosokawa Model Verification and Exhaustive Testing for Whitelist Function of Industrial Control System. Search on Bibsonomy IECON The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Shuai Zhao, Achir Kalra, Chong Wang, Cristian Borcea, Yi Chen 0001 Ad Blocking Whitelist Prediction for Online Publishers. Search on Bibsonomy IEEE BigData The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Nobuyuki Kanaya, Yu Tsuda, Yuuki Takano, Daisuke Inoue Byakko: Automatic Whitelist Generation based on Occurrence Distribution of Features of Network Traffic. Search on Bibsonomy IEEE BigData The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Chun-Jung Wu, Ying Tie, Satoshi Hara 0002, Kazuki Tamiya, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices. Search on Bibsonomy J. Inf. Process. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Shujuan Ji, Haiyan Ma, Yongquan Liang, Ho-fung Leung, Chun-jin Zhang Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks. Search on Bibsonomy Appl. Intell. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Michael Bisaccio Cabells' Journal Whitelist and Blacklist: Intelligent data for informed journal evaluations. Search on Bibsonomy Learn. Publ. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Nobuhiro Kobayashi, Koichi Shimizu, Tsunato Nakai, Teruyoshi Yamaguchi, Masakatsu Nishigaki Intrusion Detection Method Using Enhanced Whitelist Based on Cooperation of System Development, System Deployment, and Device Development Domains in CPS. Search on Bibsonomy NBiS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Jeongwoo Choi, Yongmin Kim, Jinwoo Lee, Jiman Hong Dynamic code whitelist for efficient analysis of Android code. Search on Bibsonomy RACS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Keisuke Inoue, Toshiki Honda, Kohei Mukaiyama, Tetsushi Ohki, Masakatsu Nishigaki Automatic Examination-Based Whitelist Generation for XSS Attack Detection. Search on Bibsonomy BWCCA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Shintaro Fujita, Kosuke Rata, Akinori Mochizuki, Kenji Sawada, Seiichi Shin, Shu Hosokawa On Experimental validation of Whitelist Auto-Generation Method for Secured Programmable Logic Controllers. Search on Bibsonomy IECON The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Seohee You, Dana Yang, Inshil Doh, Kijoon Chae Authorization based on mobile whitelist in devices for device-to-device communications. Search on Bibsonomy ICOIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Shujuan Ji, Haiyan Ma, Yongquan Liang, Ho-fung Leung, Chun-jin Zhang A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks. Search on Bibsonomy Appl. Intell. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Kyoungmin Kim 0005, Jeonghwan Lee, Seonguk Lee, Jiman Hong Whitelist for Analyzing Android Malware. Search on Bibsonomy RACS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Woo-Suk Jung, Jeong-Han Yun, Sin-Kyu Kim, Kyu-Seok Shim, Myung-Sup Kim Structured whitelist generation in SCADA network using PrefixSpan algorithm. Search on Bibsonomy APNOMS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Nong Si, Ke-Bin Jia One Communication Key Udate with Whitelist Attribute in SCADA System. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2016 DBLP  BibTeX  RDF
27Woo-Suk Jung, Sung-Min Kim, Young-Hoon Goo, Myung-Sup Kim Whitelist representation for FTP service in SCADA system by using structured ACL model. Search on Bibsonomy APNOMS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Niklas Kühl 0001, Marc Goutier Needmining: Evaluating a Whitelist-Based Assignment Method to Quantify Customer Needs from Micro Blog Data. Search on Bibsonomy OR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Linfeng Li, Eleni Berki, Marko Helenius, Saila Ovaska Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate? Search on Bibsonomy Behav. Inf. Technol. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Seokmo Kim, Young B. Park 0001 An Object Pool Realization of Whitelist Strategies to Neutralize Injection Flaws. Search on Bibsonomy ICITCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Uijin Jang, Changjin Suh, Hyungmin Lim A Study on the Efficient Management of Android Apps Using a Whitelist. Search on Bibsonomy FCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Dong-Ho Kang, Byoung-Koo Kim, Jung-Chan Na, Kyoung-Son Jhang Whitelist Generation Technique for Industrial Firewall in SCADA Networks. Search on Bibsonomy FCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Byeong-Hee Roh, Ju Wan Kim, Ki-Yeol Ryu, Jea-Tek Ryu A whitelist-based countermeasure scheme using a Bloom filter against SIP flooding attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Gada, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura E-Mail Priority Delivery System with Dynamic Whitelist in the Layer 3 Switch. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Young-Gab Kim, Min-Soo Lee, Sanghyun Cho, Sung Deok Cha A quantitative approach to estimate a website security risk using whitelist. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Linfeng Li, Marko Helenius, Eleni Berki A usability test of whitelist and blacklist-based anti-phishing application. Search on Bibsonomy MindTrek The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Amine Belabed, Esma Aïmeur, Mohammed Amine Chikh A Personalized Whitelist Approach for Phishing Webpage Detection. Search on Bibsonomy ARES The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Tae-Hyung Kim, Young-Sik Choi, Jong Kim 0001, Sung Je Hong Annulling SYN Flooding Attacks with Whitelist. Search on Bibsonomy AINA Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Ahren Studer, Adrian Perrig Mobile user location-specific encryption (MULE): using your office as your password. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF key derivation, laptop theft, location based access, security
23Genta Iha, Hiroshi Doi An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki Exploiting Temporal Persistence to Detect Covert Botnet Channels. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Justin Samuel, Beichuan Zhang 0001 RequestPolicy: Increasing Web Browsing Privacy through Control of Cross-Site Requests. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Khaled Shaalan, Hafsa Raza Arabic Named Entity Recognition from Diverse Text Types. Search on Bibsonomy GoTAL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Arabic natural language processing, Information extraction, Named entity recognition
23Ashok Khanal, Bahman S. Motlagh, Taskin Koçak Improving the Efficiency of Spam Filtering through Cache Architecture. Search on Bibsonomy MASCOTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Zhuowei Li 0001, Amitabha Das, Jianying Zhou 0001 Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Clifton Phua, Ross W. Gayler, Kate Smith-Miles, Vincent C. S. Lee Communal Detection of Implicit Personal Identity Streams. Search on Bibsonomy ICDM Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #56 of 56 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license