|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 22 occurrences of 20 keywords
|
|
|
Results
Found 56 publication records. Showing 56 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
121 | Tsong Song Hwang, Tsung-Ju Lee, Yuh-Jye Lee |
A three-tier IDS via data mining approach. |
MineNet |
2007 |
DBLP DOI BibTeX RDF |
KDD'99, RIPPER, activity profile, whitelist, intrusion detection system, blacklist, false alarm rate, multiclass SVMs |
45 | Diane Lambert, Daryl Pregibon |
More bang for their bucks: assessing new features for online advertisers. |
SIGKDD Explor. |
2007 |
DBLP DOI BibTeX RDF |
biased sampling, statistical inference, causal modeling, propensity scores |
31 | Ronald Bhuleskar, Anoop Sherlekar, Anala Pandit |
Hybrid Spam E-mail Filtering. |
CICSyN |
2009 |
DBLP DOI BibTeX RDF |
HSF, spam coefficient, legitimate coefficient, whitelist, forging, spam mean, Self Improvisation, self learning technique, Filter, Filtering, Spam, Email, Hybrid, content based filtering, Parallel model, blacklist |
31 | Asaad Moosa, Eanas Muhsen Alsaffar |
Proposing a hybrid-intelligent framework to secure e-government web applications. |
ICEGOV |
2008 |
DBLP DOI BibTeX RDF |
negative logic based filtering, positive logic based filtering, session based filtering, web application firewalls, whitelist, neural networks, fuzzy logic, e-government, web application, blacklist |
27 | Ignacio Redondo, Gloria Aznar |
Whitelist or Leave Our Website! Advances in the Understanding of User Response to Anti-Ad-Blockers. |
Informatics |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake, Ayumu Kubota |
Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data. |
Enterp. Inf. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Jan Bayer, Sourena Maroofi, Olivier Hureau, Andrzej Duda, Maciej Korczynski |
Building a Resilient Domain Whitelist to Enhance Phishing Blacklist Accuracy. |
eCrime |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Se-Beom Cheon, Geun-Yeong Choi, DaeYoub Kim |
A Cheating Attack on a Whitelist-based Anti-Ransomware Solution and its Countermeasure. |
ICCE |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Wooyeon Jo, SungJin Kim, Hyunjin Kim, Yeonghun Shin, Taeshik Shon |
Automatic whitelist generation system for ethernet based in-vehicle network. |
Comput. Ind. |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Yunlong Xing, Jiahao Cao, Kun Sun 0001, Fei Yan 0008, Shengye Wan |
The devil is in the detail: Generating system call whitelist for Linux seccomp. |
Future Gener. Comput. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Michal Maliszewski, Urszula Boryczka |
Random Forest in Whitelist-Based ATM Security. |
ACIIDS (2) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Kyu-Seok Shim, Il Kwon Sohn, Eunjoo Lee, Woojin Seok, Wonhyuk Lee |
Enhance the ICS Network Security Using the Whitelist-based Network Monitoring Through Protocol Analysis. |
J. Web Eng. |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Nureni Ayofe Azeez, Sanjay Misra, Ihotu Agbo Margaret, Luis Fernández Sanz, Shafii Muhammad Abdulhamid |
Adopting automated whitelist approach for detecting phishing attacks. |
Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Keita Hasegawa, Daishi Kondo, Hideki Tode |
FQDN-Based Whitelist Filter on a DNS Cache Server Against the DNS Water Torture Attack. |
IM |
2021 |
DBLP BibTeX RDF |
|
27 | Michael Cheng Yi Cho, Yuan-Hsiang Su, Hsiu-Chuan Huang, Yu-Lung Tsai |
Top of the Pops: A Novel Whitelist Generation Scheme for Data Exfiltration Detection. |
SAI (2) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Sungjin Kim, Byung Joon Kim, Dong Hoon Lee |
Prof-gen: Practical Study on System Call Whitelist Generation for Container Attack Surface Reduction. |
CLOUD |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Alessandro Vesely |
DNS Whitelist (DNSWL) Email Authentication Method Extension. |
RFC |
2020 |
DBLP DOI BibTeX RDF |
|
27 | DaeYoub Kim, Jihoon Lee |
Blacklist vs. Whitelist-Based Ransomware Solutions. |
IEEE Consumer Electron. Mag. |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Xuhao Wang, Qingni Shen, Wu Luo, Pengfei Wu |
RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis. |
CLOUD |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Xinling Shen, Nan Li, Chao Liu 0020, Mengnan Cai |
WMUD: A Whitelist Method of USB Devices Redirection for Virtual Desktop. |
HPCC/SmartCity/DSS |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Komei Nomura, Kenji Rikitake, Ryosuke Matsumoto |
Automatic Whitelist Generation for SQL Queries Using Web Application Tests. |
COMPSAC (2) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Shintaro Fujita, Kenji Sawada, Seiichi Shin, Shu Hosokawa |
Model Verification and Exhaustive Testing for Whitelist Function of Industrial Control System. |
IECON |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Shuai Zhao, Achir Kalra, Chong Wang, Cristian Borcea, Yi Chen 0001 |
Ad Blocking Whitelist Prediction for Online Publishers. |
IEEE BigData |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Nobuyuki Kanaya, Yu Tsuda, Yuuki Takano, Daisuke Inoue |
Byakko: Automatic Whitelist Generation based on Occurrence Distribution of Features of Network Traffic. |
IEEE BigData |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Chun-Jung Wu, Ying Tie, Satoshi Hara 0002, Kazuki Tamiya, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto |
IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices. |
J. Inf. Process. |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Shujuan Ji, Haiyan Ma, Yongquan Liang, Ho-fung Leung, Chun-jin Zhang |
Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks. |
Appl. Intell. |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Michael Bisaccio |
Cabells' Journal Whitelist and Blacklist: Intelligent data for informed journal evaluations. |
Learn. Publ. |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Nobuhiro Kobayashi, Koichi Shimizu, Tsunato Nakai, Teruyoshi Yamaguchi, Masakatsu Nishigaki |
Intrusion Detection Method Using Enhanced Whitelist Based on Cooperation of System Development, System Deployment, and Device Development Domains in CPS. |
NBiS |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Jeongwoo Choi, Yongmin Kim, Jinwoo Lee, Jiman Hong |
Dynamic code whitelist for efficient analysis of Android code. |
RACS |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Keisuke Inoue, Toshiki Honda, Kohei Mukaiyama, Tetsushi Ohki, Masakatsu Nishigaki |
Automatic Examination-Based Whitelist Generation for XSS Attack Detection. |
BWCCA |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Shintaro Fujita, Kosuke Rata, Akinori Mochizuki, Kenji Sawada, Seiichi Shin, Shu Hosokawa |
On Experimental validation of Whitelist Auto-Generation Method for Secured Programmable Logic Controllers. |
IECON |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Seohee You, Dana Yang, Inshil Doh, Kijoon Chae |
Authorization based on mobile whitelist in devices for device-to-device communications. |
ICOIN |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Shujuan Ji, Haiyan Ma, Yongquan Liang, Ho-fung Leung, Chun-jin Zhang |
A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks. |
Appl. Intell. |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Kyoungmin Kim 0005, Jeonghwan Lee, Seonguk Lee, Jiman Hong |
Whitelist for Analyzing Android Malware. |
RACS |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Woo-Suk Jung, Jeong-Han Yun, Sin-Kyu Kim, Kyu-Seok Shim, Myung-Sup Kim |
Structured whitelist generation in SCADA network using PrefixSpan algorithm. |
APNOMS |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Nong Si, Ke-Bin Jia |
One Communication Key Udate with Whitelist Attribute in SCADA System. |
J. Inf. Hiding Multim. Signal Process. |
2016 |
DBLP BibTeX RDF |
|
27 | Woo-Suk Jung, Sung-Min Kim, Young-Hoon Goo, Myung-Sup Kim |
Whitelist representation for FTP service in SCADA system by using structured ACL model. |
APNOMS |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Niklas Kühl 0001, Marc Goutier |
Needmining: Evaluating a Whitelist-Based Assignment Method to Quantify Customer Needs from Micro Blog Data. |
OR |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Linfeng Li, Eleni Berki, Marko Helenius, Saila Ovaska |
Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate? |
Behav. Inf. Technol. |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Seokmo Kim, Young B. Park 0001 |
An Object Pool Realization of Whitelist Strategies to Neutralize Injection Flaws. |
ICITCS |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Uijin Jang, Changjin Suh, Hyungmin Lim |
A Study on the Efficient Management of Android Apps Using a Whitelist. |
FCC |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Dong-Ho Kang, Byoung-Koo Kim, Jung-Chan Na, Kyoung-Son Jhang |
Whitelist Generation Technique for Industrial Firewall in SCADA Networks. |
FCC |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Byeong-Hee Roh, Ju Wan Kim, Ki-Yeol Ryu, Jea-Tek Ryu |
A whitelist-based countermeasure scheme using a Bloom filter against SIP flooding attacks. |
Comput. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Gada, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura |
E-Mail Priority Delivery System with Dynamic Whitelist in the Layer 3 Switch. |
COMPSAC Workshops |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Young-Gab Kim, Min-Soo Lee, Sanghyun Cho, Sung Deok Cha |
A quantitative approach to estimate a website security risk using whitelist. |
Secur. Commun. Networks |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Linfeng Li, Marko Helenius, Eleni Berki |
A usability test of whitelist and blacklist-based anti-phishing application. |
MindTrek |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Amine Belabed, Esma Aïmeur, Mohammed Amine Chikh |
A Personalized Whitelist Approach for Phishing Webpage Detection. |
ARES |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Tae-Hyung Kim, Young-Sik Choi, Jong Kim 0001, Sung Je Hong |
Annulling SYN Flooding Attacks with Whitelist. |
AINA Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Ahren Studer, Adrian Perrig |
Mobile user location-specific encryption (MULE): using your office as your password. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
key derivation, laptop theft, location based access, security |
23 | Genta Iha, Hiroshi Doi |
An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki |
Exploiting Temporal Persistence to Detect Covert Botnet Channels. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Justin Samuel, Beichuan Zhang 0001 |
RequestPolicy: Increasing Web Browsing Privacy through Control of Cross-Site Requests. |
Privacy Enhancing Technologies |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Khaled Shaalan, Hafsa Raza |
Arabic Named Entity Recognition from Diverse Text Types. |
GoTAL |
2008 |
DBLP DOI BibTeX RDF |
Arabic natural language processing, Information extraction, Named entity recognition |
23 | Ashok Khanal, Bahman S. Motlagh, Taskin Koçak |
Improving the Efficiency of Spam Filtering through Cache Architecture. |
MASCOTS |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Zhuowei Li 0001, Amitabha Das, Jianying Zhou 0001 |
Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. |
TrustBus |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Clifton Phua, Ross W. Gayler, Kate Smith-Miles, Vincent C. S. Lee |
Communal Detection of Implicit Personal Identity Streams. |
ICDM Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #56 of 56 (100 per page; Change: )
|
|