Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
82 | Tsong Song Hwang, Tsung-Ju Lee, Yuh-Jye Lee |
A three-tier IDS via data mining approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 3rd Annual ACM Workshop on Mining Network Data, MineNet 2007, San Diego, California, USA, June 12, 2007, pp. 1-6, 2007, ACM, 978-1-59593-792-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
KDD'99, RIPPER, activity profile, whitelist, intrusion detection system, blacklist, false alarm rate, multiclass SVMs |
73 | Dat Tran 0001, Wanli Ma, Dharmendra Sharma 0001, Thien Nguyen |
Possibility Theory-Based Approach to Spam Email Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GrC ![In: 2007 IEEE International Conference on Granular Computing, GrC 2007, San Jose, California, USA, 2-4 November 2007, pp. 571-575, 2007, IEEE Computer Society, 0-7695-3032-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Mohsen Sharifi, Seyed Hossein Siadati |
A phishing sites blacklist generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2008, Doha, Qatar, March 31 - April 4, 2008, pp. 840-843, 2008, IEEE Computer Society, 978-1-4244-1967-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(11), pp. 18-20, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Yinglian Xie, Fang Yu 0002, Martín Abadi |
De-anonymizing the internet using unreliable IDs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2009 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Barcelona, Spain, August 16-21, 2009, pp. 75-86, 2009, ACM, 978-1-60558-594-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
attack forensics, accountability, botnet, blacklist |
46 | Sheng-Ya Lin, Cheng-Chung Tan, Jyh-Charn Liu, Michael Oehler |
High-speed detection of unsolicited bulk emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2007 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, ANCS 2007, Orlando, Florida, USA, December 3-4, 2007, pp. 175-184, 2007, ACM, 978-1-59593-945-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
effectively consecutive hit, scoreboard, significance level, unsolicited bulk email blacklist, confidence interval |
36 | Tong-Lee Lim, Anantharaman Lakshminarayanan, Vira Saksen |
A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 392-410, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Peter C. Johnson 0001, Apu Kapadia, Patrick P. Tsang, Sean W. Smith |
Nymble: Anonymous IP-Address Blocking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, pp. 113-133, 2007, Springer, 978-3-540-75550-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, Alex X. Liu |
On capturing and containing E-mail worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh |
Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings, pp. 1-10, 2011, IEEE Computer Society, 978-1-4577-0531-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
web-based malware, blacklist, drive-by-download |
27 | Ronald Bhuleskar, Anoop Sherlekar, Anala Pandit |
Hybrid Spam E-mail Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICSyN ![In: First International Conference on Computational Intelligence, Communication Systems and Networks, CICSYN 2009, Indore, India, 23-25 July, 2009, pp. 302-307, 2009, IEEE Computer Society, 978-0-7695-3743-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
HSF, spam coefficient, legitimate coefficient, whitelist, forging, spam mean, Self Improvisation, self learning technique, Filter, Filtering, Spam, Email, Hybrid, content based filtering, Parallel model, blacklist |
27 | Asaad Moosa, Eanas Muhsen Alsaffar |
Proposing a hybrid-intelligent framework to secure e-government web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, ICEGOV 2008, Cairo, Egypt, December 1-4, 2008, pp. 52-59, 2008, ACM, 978-1-60558-386-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
negative logic based filtering, positive logic based filtering, session based filtering, web application firewalls, whitelist, neural networks, fuzzy logic, e-government, web application, blacklist |
25 | Jan Bayer, Sourena Maroofi, Olivier Hureau, Andrzej Duda, Maciej Korczynski |
Building a Resilient Domain Whitelist to Enhance Phishing Blacklist Accuracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: APWG Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023, pp. 1-14, 2023, IEEE, 979-8-3503-6027-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Ivan Skula, Michal Kvet |
Domain Blacklist Efficacy for Phishing Web-page Detection Over an Extended Time Period. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FRUCT ![In: 33rd Conference of Open Innovations Association, FRUCT 2023, Zilina, Slovakia, May 24-26, 2023, pp. 257-263, 2023, IEEE, 978-952-69244-9-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Junlu Wang, Qiang Liu, Baoyan Song |
Blockchain-based multi-malicious double-spending attack blacklist management model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 78(12), pp. 14726-14755, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Shehan Edirimannage, Mohamed Nabeel, Charith Elvitigala, Chamath Keppitiyagama |
PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.07882, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
25 | Pablo M. Oliveira, Mateus B. Vieira, Isaac C. Ferreira, João P. R. R. Leite, Edvard Martins de Oliveira, Bruno Tardiole Kuehne, Edmilson Marmo Moreira, Otávio Augusto Salgado Carpinteiro |
ABL: An original active blacklist based on a modification of the SMTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.10602, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Rattanachai Wongwatkit, Montree Raktham, Thanadet Phawananthaphuti |
Intelligent Blacklist Security System for Protecting Spammer in Corporate Email Solution: A Case of Corporate Email Service Provider in Thailand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACT ![In: 24th International Conference on Advanced Communication Technology, ICACT 2022, Pyeongchang, Korea, February 13-16, 2022, pp. 387-391, 2022, IEEE, 979-11-88428-08-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Shehan Vidyakeerthi, Mohamed Nabeel, Charith Elvitigala, Chamath Keppitiyagama |
Demo: PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Companion Volume) ![In: Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25 - 29, 2022, pp. 286-289, 2022, ACM, 978-1-4503-9130-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Samuel Sulan, Martin Husák |
Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022, pp. 22:1-22:6, 2022, ACM, 978-1-4503-9670-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | JunMyeung Kim, Sang-Hwa Chung |
Channel BlaQLisT: Channel Blacklist using Q-Learning for TSCH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUFN ![In: Thirteenth International Conference on Ubiquitous and Future Networks, ICUFN 2022, Barcelona, Spain, July 5-8, 2022, pp. 134-139, 2022, IEEE, 978-1-6654-8550-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Yufu Wang, Xingwei Wang 0001, Rongfei Zeng, Min Huang 0001 |
A CIDS Mode DDoS Blacklist Mechanism Based on Smart Contract in SAVI-Enable IPv6 Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCT ![In: 22nd IEEE International Conference on Communication Technology, ICCT 2022, Nanjing, China, November 11-14, 2022, pp. 1363-1369, 2022, IEEE, 978-1-6654-7067-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Jia Shi 0005, Xuewen Zeng, Yang Li |
A Register Access Control Scheme for SNR System to Counter CPA Attack Based on Malicious User Blacklist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 13(10), pp. 262, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Rattanachai Wongwatkit, Montree Raktham, Thanadet Phawananthaphuti |
Intelligent Blacklist Security System for Protecting Spammer in Corporate Email Solution: A Case of Corporate Email Service Provider in Thailand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACT ![In: 23rd International Conference on Advanced Communication Technology, ICACT 2021, Pyeongchang, South Korea, February 7-10, 2021, pp. 387-391, 2021, IEEE, 979-11-88428-06-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Qiang Liu, Song Yan, Jie Wan, Ruiqiang Ma, Jianhang Xu |
Multi-malicious nodes double-spending attack blacklist management model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSIT ![In: DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23 - 25, 2021, pp. 462-467, 2021, ACM, 978-1-4503-9024-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Christophe Dony, Maurane Raskinet, François Renaville, Stéphanie Simon, Paul Thirion |
How reliable and useful is Cabell's Blacklist ? A data-driven analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2009.05392, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
25 | DaeYoub Kim, Jihoon Lee |
Blacklist vs. Whitelist-Based Ransomware Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Consumer Electron. Mag. ![In: IEEE Consumer Electron. Mag. 9(3), pp. 22-28, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Charles E. Wimberley, Steffen Heber |
PeakPass: Automating ChIP-Seq Blacklist Creation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Biol. ![In: J. Comput. Biol. 27(2), pp. 259-268, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Karel Hynek, Tomás Cejka, Martin Zádník, Hana Kubátová |
Evaluating Bad Hosts Using Adaptive Blacklist Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MECO ![In: 9th Mediterranean Conference on Embedded Computing, MECO 2020, Budva, Montenegro, June 8-11, 2020, pp. 1-5, 2020, IEEE, 978-1-7281-6949-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Takashi Ishihara, Masaya Sato, Toshihiro Yamauchi |
Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANDAR (Workshops) ![In: Eighth International Symposium on Computing and Networking Workshops, CANDAR 2020 Workshops, Naha, Japan, November 24-27, 2020, pp. 328-333, 2020, IEEE, 978-1-7281-9919-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Akihiro Satoh, Yutaka Nakamura, Daiki Nobayashi, Kazuto Sasai, Gen Kitagata, Takeshi Ikenaga |
Clustering Malicious DNS Queries for Blacklist-Based Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 102-D(7), pp. 1404-1407, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Panagiotis Tsigaris, Jaime A. Teixeira da Silva |
Did the Research Faculty at a Small Canadian Business School Publish in "Predatory" Venues? This Depends on the Publishing Blacklist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Publ. ![In: Publ. 7(2), pp. 35, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Muhammad Amirrudin Razali, Shafiza Mohd Shariff |
CMBlock: In-Browser Detection and Prevention Cryptojacking Tool Using Blacklist and Behavior-Based Detection Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVIC ![In: Advances in Visual Informatics - 6th International Visual Informatics Conference, IVIC 2019, Bangi, Malaysia, November 19-21, 2019, Proceedings, pp. 404-414, 2019, Springer, 978-3-030-34031-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Charles E. Wimberley, Steffen Heber |
PeakPass: Automating ChIP-Seq Blacklist Creation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISBRA ![In: Bioinformatics Research and Applications - 15th International Symposium, ISBRA 2019, Barcelona, Spain, June 3-6, 2019, Proceedings, pp. 232-243, 2019, Springer, 978-3-030-20241-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Trang Ha, Quyen Hoang, Kyumin Lee |
Building a task blacklist for online social platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASONAM ![In: ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, Vancouver, British Columbia, Canada, 27-30 August, 2019, pp. 713-716, 2019, ACM, 978-1-4503-6868-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Yasuyuki Tanaka, Shingo Kashima |
SeedsMiner: Accurate URL Blacklist-Generation Based on Efficient OSINT Seed Collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WI (Companion) ![In: 2019 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2019, Thessaloniki, Greece, October 14-17, 2019 - Companion Volume, pp. 250-255, 2019, ACM, 978-1-4503-6988-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Pedro Henrique Gomes, Thomas Watteyne, Bhaskar Krishnamachari |
MABO-TSCH: Multihop and blacklist-based optimized time synchronized channel hopping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 29(7), 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Shujuan Ji, Haiyan Ma, Yongquan Liang, Ho-fung Leung, Chun-jin Zhang |
Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 48(7), pp. 1891, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Michael Bisaccio |
Cabells' Journal Whitelist and Blacklist: Intelligent data for informed journal evaluations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Learn. Publ. ![In: Learn. Publ. 31(3), pp. 243-248, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Myo Myo Swe, Nyein Nyein Myo |
Blacklist Creation for Detecting Fake Accounts on Twitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Networked Distributed Comput. ![In: Int. J. Networked Distributed Comput. 7(1), pp. 43-50, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Myo Myo Swe, Nyein Nyein Myo |
Fake Accounts Detection on Twitter Using Blacklist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: 17th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2018, Singapore, Singapore, June 6-8, 2018, pp. 562-566, 2018, IEEE Computer Society, 978-1-5386-5892-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Awais Adnan, Sajid Anwar, Tehseen Zia, Muhammad Saad Razzaq, Fahad Maqbool, Zia Ur Rehman |
Beyond Beall's Blacklist: Automatic Detection of Open Access Predatory Research Journals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC/SmartCity/DSS ![In: 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018, Exeter, United Kingdom, June 28-30, 2018, pp. 1692-1697, 2018, IEEE, 978-1-5386-6614-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Sheng Zhang, Adrian Tang, Zhewei Jiang, Simha Sethumadhavan, Mingoo Seok |
Blacklist Core: Machine-Learning Based Dynamic Operating-Performance-Point Blacklisting for Mitigating Power-Management Security Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the International Symposium on Low Power Electronics and Design, ISLPED 2018, Seattle, WA, USA, July 23-25, 2018, pp. 5:1-5:6, 2018, ACM, 978-1-4503-5704-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Wang Zhang, Xu Bai, Chanjuan Chen, Zhaolin Chen |
Booter Blacklist Generation Based on Content Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing - 14th EAI International Conference, CollaborateCom 2018, Shanghai, China, December 1-3, 2018, Proceedings, pp. 529-542, 2018, Springer, 978-3-030-12980-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Yutong Shao, Rico Sennrich, Bonnie L. Webber, Federico Fancellu |
Evaluating Machine Translation Performance on Chinese Idioms with a Blacklist Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LREC ![In: Proceedings of the Eleventh International Conference on Language Resources and Evaluation, LREC 2018, Miyazaki, Japan, May 7-12, 2018., 2018, European Language Resources Association (ELRA). The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
25 | Eloi Gabaldon, Josep Lluís Lérida, Fernando Guirado, Jordi Planes |
Blacklist muti-objective genetic algorithm for energy saving in heterogeneous environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 73(1), pp. 354-369, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Yutong Shao, Rico Sennrich, Bonnie L. Webber, Federico Fancellu |
Evaluating Machine Translation Performance on Chinese Idioms with a Blacklist Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1711.07646, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
25 | Shujuan Ji, Haiyan Ma, Yongquan Liang, Ho-fung Leung, Chun-jin Zhang |
A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 47(4), pp. 1115-1131, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Routhu Srinivasa Rao, Alwyn Roshan Pais |
An Enhanced Blacklist Method to Detect Phishing Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 323-333, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Yeming Shi, Ori Stitelman, Claudia Perlich |
Blacklisting the Blacklist in Online Advertising: Improving Delivery by Bidding for What You Can Win. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADKDD@KDD ![In: Proceedings of the ADKDD'17, Halifax, NS, Canada, August 13 - 17, 2017, pp. 1:1-1:6, 2017, ACM, 978-1-4503-5194-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Zhongyuan Yao, Yi Mu 0001, Guomin Yang |
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings, pp. 186-203, 2017, Springer, 978-3-319-72358-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori |
Automating URL Blacklist Generation with Similarity Search Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 99-D(4), pp. 873-882, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Hongwei Li 0001, Kun Jia, Haomiao Yang, Dongxiao Liu, Liang Zhou 0003 |
Practical blacklist-based anonymous authentication scheme for mobile crowd sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Netw. Appl. ![In: Peer-to-Peer Netw. Appl. 9(4), pp. 762-773, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Hirofumi Nakakoji, Yasuhiro Fujii, Yoshiaki Isobe, Tomohiro Shigemoto, Tetsuro Kito, Naoki Hayashi, Nobutaka Kawaguchi, Naoki Shimotsuma, Hiroaki Kikuchi |
Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: 19th International Conference on Network-Based Information Systems, NBiS 2016, Ostrava, Czech Republic, September 7-9, 2016, pp. 135-139, 2016, IEEE Computer Society, 978-1-5090-0979-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | José Jair Santanna, Ricardo de Oliveira Schmidt, Daphné Tuncer, Joey de Vries, Lisandro Zambenedetti Granville, Aiko Pras |
Booter blacklist: Unveiling DDoS-for-hire websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSM ![In: 12th International Conference on Network and Service Management, CNSM 2016, Montreal, QC, Canada, October 31 - Nov. 4, 2016, pp. 144-152, 2016, IEEE, 978-3-901882-85-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Leigh Metcalf, Jonathan M. Spring |
Blacklist Ecosystem Analysis: Spanning Jan 2012 to Jun 2014. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISCS@CCS ![In: Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2015, Denver, Colorado, USA, October 12, 2015, pp. 13-22, 2015, ACM, 978-1-4503-3822-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori |
AutoBLG: Automatic URL blacklist generator using search space expansion and filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: 2015 IEEE Symposium on Computers and Communication, ISCC 2015, Larnaca, Cyprus, July 6-9, 2015, pp. 625-631, 2015, IEEE Computer Society, 978-1-4673-7194-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Takeshi Yagi, Junichi Murayama, Takeo Hariu, Sho Tsugawa, Hiroyuki Ohsaki, Masayuki Murata 0001 |
Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Commun. ![In: IEICE Trans. Commun. 97-B(1), pp. 76-86, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Linfeng Li, Eleni Berki, Marko Helenius, Saila Ovaska |
Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Behav. Inf. Technol. ![In: Behav. Inf. Technol. 33(11), pp. 1136-1147, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Yuxin Meng 0001, Lam-for Kwok |
Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 39, pp. 83-92, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Lung-Hao Lee, Kuei-Ching Lee, Hsin-Hsi Chen, Yuen-Hsien Tseng |
POSTER: Proactive Blacklist Update for Anti-Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pp. 1448-1450, 2014, ACM, 978-1-4503-2957-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Tzu-Hsin Ho, Chih-Wei Yi, Chien-Chao Tseng |
Group access control with blacklist for data dissemination in mobile opportunistic networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: 2013 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, Shanghai, China, April 7-10, 2013, pp. 4410-4415, 2013, IEEE, 978-1-4673-5938-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Benjamin Edwards, Tyler Moore 0001, George Stelle, Steven A. Hofmeyr, Stephanie Forrest |
Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1202.3987, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
25 | Linfeng Li, Marko Helenius, Eleni Berki |
A usability test of whitelist and blacklist-based anti-phishing application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MindTrek ![In: International Conference on Media of the Future, Academic MindTrek '12, Tampere, Finland, October 3-5, 2012, pp. 195-202, 2012, ACM, 978-1-4503-1637-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Benjamin Edwards, Tyler Moore 0001, George Stelle, Steven A. Hofmeyr, Stephanie Forrest |
Beyond the blacklist: modeling malware spread and the effect of interventions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: The New Security Paradigms Workshop, NSPW '12, Bertinoro, Italy - September 18 - 21, 2012, pp. 53-66, 2012, ACM, 978-1-4503-1794-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Akira Yamada 0001, Hara Masanori, Yutaka Miyake |
Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 19, pp. 62-73, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Lung-Hao Lee, Hsin-Hsi Chen |
Collaborative blacklist generation via searches-and-clicks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 20th ACM Conference on Information and Knowledge Management, CIKM 2011, Glasgow, United Kingdom, October 24-28, 2011, pp. 2153-2156, 2011, ACM, 978-1-4503-0717-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Yuxin Meng 0001, Lam-for Kwok |
Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: 7th International Conference on Information Assurance and Security, IAS 2011, Melacca, Malaysia, December 5-8, 2011, pp. 74-79, 2011, IEEE, 978-1-4577-2154-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Hideharu Kojima, Tomoyuki Ohta, Yoshiaki Kakuda |
A Transition Reduction Method for FSM of MANET Routing Protocol with Blacklist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISADS ![In: 10th International Symposium on Autonomous Decentralized Systems, ISADS 2011, Tokyo & Hiroshima, Japan, March 23-17, 2011, pp. 611-616, 2011, IEEE Computer Society, 978-1-61284-213-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Andrew G. West, Adam J. Aviv, Jian Chang, Insup Lee 0001 |
Spam mitigation using spatio-temporal reputations from blacklist history. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 161-170, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Lung-Hao Lee, Cheng-Jye Luh |
Generation of pornographic blacklist and its incremental update using an inverse chi-square based method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Manag. ![In: Inf. Process. Manag. 44(5), pp. 1698-1706, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Srihari Nelakuditi, Sanghwan Lee, Yinzhe Yu, Junling Wang, Zifei Zhong, Guor-Huar Lu, Zhi-Li Zhang |
Blacklist-aided forwarding in static multihop wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECON ![In: Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, SECON 2005, September 26-29, 2005, Santa Clara, CA, USA, pp. 252-262, 2005, IEEE, 0-7803-9011-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Tyler Moore 0001, Richard Clayton 0001 |
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 256-272, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Genta Iha, Hiroshi Doi |
An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 966-971, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Heng Chen 0002, Depei Qian, Weiguo Wu, Weiwei Fang |
Link-Aware Geographic Routing in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 937-942, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto |
An Efficient Anonymous Credential System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 272-286, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Reed S. Abbott, Timothy W. van der Horst, Kent E. Seamons |
CPG: closed pseudonymous groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 55-64, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anonymous feedback, privacy, usability, anonymity |
18 | Cheng Wang, Ying Liu 0039, Liheng Jian, Peng Zhang |
A Utility-Based Web Content Sensitivity Mining Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence/IAT Workshops ![In: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 9-12 December 2008, Sydney, NSW, Australia, pp. 428-431, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Ye Cao, Weili Han, Yueran Le |
Anti-phishing based on automated individual white-list. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 51-60, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anti-pharming, individual white-list, login user interface, na?ve bayesian classifier, anti-phishing |
18 | Ben H. Smith, Yonghee Shin, Laurie A. Williams |
Proposing SQL statement coverage metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS ![In: Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, SESS 2008, Leipzig, Germany, May 17-18, 2008, pp. 49-56, 2008, ACM, 978-1-60558-042-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, test, SQL, attack, SQL injection, coverage criteria, threat |
18 | Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Authenticated Directed Diffusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 366-377, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Authentication, Directed Diffusion |
18 | Anirudh Ramachandran, Nick Feamster, Santosh S. Vempala |
Filtering spam with behavioral blacklisting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 342-351, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, clustering, spam, botnets, blacklists |
18 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
Blacklistable anonymous credentials: blocking misbehaving users without ttps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 72-81, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anonymous blacklisting, user misbehavior, privacy, revocation, anonymous authentication |
18 | Ashok Khanal, Bahman S. Motlagh, Taskin Koçak |
Improving the Efficiency of Spam Filtering through Cache Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASCOTS ![In: 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2007), October 24-26, 2007, Istanbul, Turkey, pp. 303-309, 2007, IEEE Computer Society, 978-1-4244-1854-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel |
On the Effectiveness of Techniques to Detect Phishing Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings, pp. 20-39, 2007, Springer, 978-3-540-73613-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Baoyi Wang, Shaomin Zhang |
An Organization and Task Based Access Control Model for Workflow System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb/WAIM Workshops ![In: Advances in Web and Network Technologies, and Information Management, APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007, Proceedings, pp. 485-490, 2007, Springer, 978-3-540-72908-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, constraint, authorization, workflow system, organization modeling |
18 | Bo Lang, Ian T. Foster, Frank Siebenlist, Rachana Ananthakrishnan, Timothy Freeman 0001 |
A Multipolicy Authorization Framework for Grid Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006, 24-26 July 2006, Cambridge, Massachusetts, USA, pp. 269-272, 2006, IEEE Computer Society, 0-7695-2640-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Jalel Rejeb, Thuy T. Le, Narinder Anand |
High Speed and Reliable Anti-Spam Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEA ![In: Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28 - November 2, 2006, Papeete, Tahiti, French Polynesia, pp. 66, 2006, IEEE Computer Society, 0-7695-2703-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Anirudh Ramachandran, Nick Feamster |
Understanding the network-level behavior of spammers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, September 11-15, 2006, pp. 291-302, 2006, ACM, 1-59593-308-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, network management, spam, BGP, botnet |
18 | Jian Liang, Naoum Naoumov, Keith W. Ross |
Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINTEC ![In: Technologies for Advanced Heterogeneous Networks, First Asian Internet Engineering Conference, AINTEC 2005, Bangkok, Thailand, December 13-15, 2005, Proceedings, pp. 1-21, 2005, Springer, 3-540-30884-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Guoyin Zhang, Jian Li, Guo-Chang Gu |
Research on defending DDoS attack - an expert system approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (4) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 3554-3558, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | V. Bacarella, Fosca Giannotti, Mirco Nanni, Dino Pedreschi |
Discovery of ads web hosts through traffic data analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DMKD ![In: Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, DMKD 2004, Paris, France, June 13, 2004, pp. 76-81, 2004, ACM, 1-58113-908-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | David Chaum, Amos Fiat, Moni Naor |
Untraceable Electronic Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 319-327, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|