The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for blacklist with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1988-2007 (18) 2008-2009 (16) 2010-2015 (16) 2016-2018 (19) 2019-2022 (22) 2023 (2)
Publication types (Num. hits)
article(25) inproceedings(68)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 54 occurrences of 42 keywords

Results
Found 93 publication records. Showing 93 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
82Tsong Song Hwang, Tsung-Ju Lee, Yuh-Jye Lee A three-tier IDS via data mining approach. Search on Bibsonomy MineNet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF KDD'99, RIPPER, activity profile, whitelist, intrusion detection system, blacklist, false alarm rate, multiclass SVMs
73Dat Tran 0001, Wanli Ma, Dharmendra Sharma 0001, Thien Nguyen Possibility Theory-Based Approach to Spam Email Detection. Search on Bibsonomy GrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Mohsen Sharifi, Seyed Hossein Siadati A phishing sites blacklist generator. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Yinglian Xie, Fang Yu 0002, Martín Abadi De-anonymizing the internet using unreliable IDs. Search on Bibsonomy SIGCOMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack forensics, accountability, botnet, blacklist
46Sheng-Ya Lin, Cheng-Chung Tan, Jyh-Charn Liu, Michael Oehler High-speed detection of unsolicited bulk emails. Search on Bibsonomy ANCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF effectively consecutive hit, scoreboard, significance level, unsolicited bulk email blacklist, confidence interval
36Tong-Lee Lim, Anantharaman Lakshminarayanan, Vira Saksen A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Peter C. Johnson 0001, Apu Kapadia, Patrick P. Tsang, Sean W. Smith Nymble: Anonymous IP-Address Blocking. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, Alex X. Liu On capturing and containing E-mail worms. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF web-based malware, blacklist, drive-by-download
27Ronald Bhuleskar, Anoop Sherlekar, Anala Pandit Hybrid Spam E-mail Filtering. Search on Bibsonomy CICSyN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HSF, spam coefficient, legitimate coefficient, whitelist, forging, spam mean, Self Improvisation, self learning technique, Filter, Filtering, Spam, Email, Hybrid, content based filtering, Parallel model, blacklist
27Asaad Moosa, Eanas Muhsen Alsaffar Proposing a hybrid-intelligent framework to secure e-government web applications. Search on Bibsonomy ICEGOV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF negative logic based filtering, positive logic based filtering, session based filtering, web application firewalls, whitelist, neural networks, fuzzy logic, e-government, web application, blacklist
25Jan Bayer, Sourena Maroofi, Olivier Hureau, Andrzej Duda, Maciej Korczynski Building a Resilient Domain Whitelist to Enhance Phishing Blacklist Accuracy. Search on Bibsonomy eCrime The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Ivan Skula, Michal Kvet Domain Blacklist Efficacy for Phishing Web-page Detection Over an Extended Time Period. Search on Bibsonomy FRUCT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Junlu Wang, Qiang Liu, Baoyan Song Blockchain-based multi-malicious double-spending attack blacklist management model. Search on Bibsonomy J. Supercomput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Shehan Edirimannage, Mohamed Nabeel, Charith Elvitigala, Chamath Keppitiyagama PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
25Pablo M. Oliveira, Mateus B. Vieira, Isaac C. Ferreira, João P. R. R. Leite, Edvard Martins de Oliveira, Bruno Tardiole Kuehne, Edmilson Marmo Moreira, Otávio Augusto Salgado Carpinteiro ABL: An original active blacklist based on a modification of the SMTP. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Rattanachai Wongwatkit, Montree Raktham, Thanadet Phawananthaphuti Intelligent Blacklist Security System for Protecting Spammer in Corporate Email Solution: A Case of Corporate Email Service Provider in Thailand. Search on Bibsonomy ICACT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Shehan Vidyakeerthi, Mohamed Nabeel, Charith Elvitigala, Chamath Keppitiyagama Demo: PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs. Search on Bibsonomy WWW (Companion Volume) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Samuel Sulan, Martin Husák Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy. Search on Bibsonomy ARES The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25JunMyeung Kim, Sang-Hwa Chung Channel BlaQLisT: Channel Blacklist using Q-Learning for TSCH. Search on Bibsonomy ICUFN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Yufu Wang, Xingwei Wang 0001, Rongfei Zeng, Min Huang 0001 A CIDS Mode DDoS Blacklist Mechanism Based on Smart Contract in SAVI-Enable IPv6 Network. Search on Bibsonomy ICCT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Jia Shi 0005, Xuewen Zeng, Yang Li A Register Access Control Scheme for SNR System to Counter CPA Attack Based on Malicious User Blacklist. Search on Bibsonomy Future Internet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Rattanachai Wongwatkit, Montree Raktham, Thanadet Phawananthaphuti Intelligent Blacklist Security System for Protecting Spammer in Corporate Email Solution: A Case of Corporate Email Service Provider in Thailand. Search on Bibsonomy ICACT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Qiang Liu, Song Yan, Jie Wan, Ruiqiang Ma, Jianhang Xu Multi-malicious nodes double-spending attack blacklist management model. Search on Bibsonomy DSIT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Christophe Dony, Maurane Raskinet, François Renaville, Stéphanie Simon, Paul Thirion How reliable and useful is Cabell's Blacklist ? A data-driven analysis. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
25DaeYoub Kim, Jihoon Lee Blacklist vs. Whitelist-Based Ransomware Solutions. Search on Bibsonomy IEEE Consumer Electron. Mag. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Charles E. Wimberley, Steffen Heber PeakPass: Automating ChIP-Seq Blacklist Creation. Search on Bibsonomy J. Comput. Biol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Karel Hynek, Tomás Cejka, Martin Zádník, Hana Kubátová Evaluating Bad Hosts Using Adaptive Blacklist Filter. Search on Bibsonomy MECO The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Takashi Ishihara, Masaya Sato, Toshihiro Yamauchi Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites. Search on Bibsonomy CANDAR (Workshops) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Akihiro Satoh, Yutaka Nakamura, Daiki Nobayashi, Kazuto Sasai, Gen Kitagata, Takeshi Ikenaga Clustering Malicious DNS Queries for Blacklist-Based Detection. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Panagiotis Tsigaris, Jaime A. Teixeira da Silva Did the Research Faculty at a Small Canadian Business School Publish in "Predatory" Venues? This Depends on the Publishing Blacklist. Search on Bibsonomy Publ. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Muhammad Amirrudin Razali, Shafiza Mohd Shariff CMBlock: In-Browser Detection and Prevention Cryptojacking Tool Using Blacklist and Behavior-Based Detection Method. Search on Bibsonomy IVIC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Charles E. Wimberley, Steffen Heber PeakPass: Automating ChIP-Seq Blacklist Creation. Search on Bibsonomy ISBRA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Trang Ha, Quyen Hoang, Kyumin Lee Building a task blacklist for online social platforms. Search on Bibsonomy ASONAM The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Yasuyuki Tanaka, Shingo Kashima SeedsMiner: Accurate URL Blacklist-Generation Based on Efficient OSINT Seed Collection. Search on Bibsonomy WI (Companion) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Pedro Henrique Gomes, Thomas Watteyne, Bhaskar Krishnamachari MABO-TSCH: Multihop and blacklist-based optimized time synchronized channel hopping. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Shujuan Ji, Haiyan Ma, Yongquan Liang, Ho-fung Leung, Chun-jin Zhang Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks. Search on Bibsonomy Appl. Intell. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Michael Bisaccio Cabells' Journal Whitelist and Blacklist: Intelligent data for informed journal evaluations. Search on Bibsonomy Learn. Publ. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Myo Myo Swe, Nyein Nyein Myo Blacklist Creation for Detecting Fake Accounts on Twitter. Search on Bibsonomy Int. J. Networked Distributed Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Myo Myo Swe, Nyein Nyein Myo Fake Accounts Detection on Twitter Using Blacklist. Search on Bibsonomy ICIS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Awais Adnan, Sajid Anwar, Tehseen Zia, Muhammad Saad Razzaq, Fahad Maqbool, Zia Ur Rehman Beyond Beall's Blacklist: Automatic Detection of Open Access Predatory Research Journals. Search on Bibsonomy HPCC/SmartCity/DSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Sheng Zhang, Adrian Tang, Zhewei Jiang, Simha Sethumadhavan, Mingoo Seok Blacklist Core: Machine-Learning Based Dynamic Operating-Performance-Point Blacklisting for Mitigating Power-Management Security Attacks. Search on Bibsonomy ISLPED The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Wang Zhang, Xu Bai, Chanjuan Chen, Zhaolin Chen Booter Blacklist Generation Based on Content Characteristics. Search on Bibsonomy CollaborateCom The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Yutong Shao, Rico Sennrich, Bonnie L. Webber, Federico Fancellu Evaluating Machine Translation Performance on Chinese Idioms with a Blacklist Method. Search on Bibsonomy LREC The full citation details ... 2018 DBLP  BibTeX  RDF
25Eloi Gabaldon, Josep Lluís Lérida, Fernando Guirado, Jordi Planes Blacklist muti-objective genetic algorithm for energy saving in heterogeneous environments. Search on Bibsonomy J. Supercomput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Yutong Shao, Rico Sennrich, Bonnie L. Webber, Federico Fancellu Evaluating Machine Translation Performance on Chinese Idioms with a Blacklist Method. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
25Shujuan Ji, Haiyan Ma, Yongquan Liang, Ho-fung Leung, Chun-jin Zhang A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks. Search on Bibsonomy Appl. Intell. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Routhu Srinivasa Rao, Alwyn Roshan Pais An Enhanced Blacklist Method to Detect Phishing Websites. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Yeming Shi, Ori Stitelman, Claudia Perlich Blacklisting the Blacklist in Online Advertising: Improving Delivery by Bidding for What You Can Win. Search on Bibsonomy ADKDD@KDD The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Zhongyuan Yao, Yi Mu 0001, Guomin Yang Group-Based Source-Destination Verifiable Encryption with Blacklist Checking. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori Automating URL Blacklist Generation with Similarity Search Approach. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Hongwei Li 0001, Kun Jia, Haomiao Yang, Dongxiao Liu, Liang Zhou 0003 Practical blacklist-based anonymous authentication scheme for mobile crowd sensing. Search on Bibsonomy Peer-to-Peer Netw. Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Hirofumi Nakakoji, Yasuhiro Fujii, Yoshiaki Isobe, Tomohiro Shigemoto, Tetsuro Kito, Naoki Hayashi, Nobutaka Kawaguchi, Naoki Shimotsuma, Hiroaki Kikuchi Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results. Search on Bibsonomy NBiS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25José Jair Santanna, Ricardo de Oliveira Schmidt, Daphné Tuncer, Joey de Vries, Lisandro Zambenedetti Granville, Aiko Pras Booter blacklist: Unveiling DDoS-for-hire websites. Search on Bibsonomy CNSM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Leigh Metcalf, Jonathan M. Spring Blacklist Ecosystem Analysis: Spanning Jan 2012 to Jun 2014. Search on Bibsonomy WISCS@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori AutoBLG: Automatic URL blacklist generator using search space expansion and filters. Search on Bibsonomy ISCC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Takeshi Yagi, Junichi Murayama, Takeo Hariu, Sho Tsugawa, Hiroyuki Ohsaki, Masayuki Murata 0001 Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Linfeng Li, Eleni Berki, Marko Helenius, Saila Ovaska Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate? Search on Bibsonomy Behav. Inf. Technol. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Yuxin Meng 0001, Lam-for Kwok Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Lung-Hao Lee, Kuei-Ching Lee, Hsin-Hsi Chen, Yuen-Hsien Tseng POSTER: Proactive Blacklist Update for Anti-Phishing. Search on Bibsonomy CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Tzu-Hsin Ho, Chih-Wei Yi, Chien-Chao Tseng Group access control with blacklist for data dissemination in mobile opportunistic networks. Search on Bibsonomy WCNC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Benjamin Edwards, Tyler Moore 0001, George Stelle, Steven A. Hofmeyr, Stephanie Forrest Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
25Linfeng Li, Marko Helenius, Eleni Berki A usability test of whitelist and blacklist-based anti-phishing application. Search on Bibsonomy MindTrek The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Benjamin Edwards, Tyler Moore 0001, George Stelle, Steven A. Hofmeyr, Stephanie Forrest Beyond the blacklist: modeling malware spread and the effect of interventions. Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Akira Yamada 0001, Hara Masanori, Yutaka Miyake Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation. Search on Bibsonomy J. Inf. Process. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Lung-Hao Lee, Hsin-Hsi Chen Collaborative blacklist generation via searches-and-clicks. Search on Bibsonomy CIKM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Yuxin Meng 0001, Lam-for Kwok Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection. Search on Bibsonomy IAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Hideharu Kojima, Tomoyuki Ohta, Yoshiaki Kakuda A Transition Reduction Method for FSM of MANET Routing Protocol with Blacklist. Search on Bibsonomy ISADS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Andrew G. West, Adam J. Aviv, Jian Chang, Insup Lee 0001 Spam mitigation using spatio-temporal reputations from blacklist history. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Lung-Hao Lee, Cheng-Jye Luh Generation of pornographic blacklist and its incremental update using an inverse chi-square based method. Search on Bibsonomy Inf. Process. Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Srihari Nelakuditi, Sanghwan Lee, Yinzhe Yu, Junling Wang, Zifei Zhong, Guor-Huar Lu, Zhi-Li Zhang Blacklist-aided forwarding in static multihop wireless networks. Search on Bibsonomy SECON The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Tyler Moore 0001, Richard Clayton 0001 Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Genta Iha, Hiroshi Doi An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Heng Chen 0002, Depei Qian, Weiguo Wu, Weiwei Fang Link-Aware Geographic Routing in Wireless Sensor Networks. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto An Efficient Anonymous Credential System. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Reed S. Abbott, Timothy W. van der Horst, Kent E. Seamons CPG: closed pseudonymous groups. Search on Bibsonomy WPES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anonymous feedback, privacy, usability, anonymity
18Cheng Wang, Ying Liu 0039, Liheng Jian, Peng Zhang A Utility-Based Web Content Sensitivity Mining Approach. Search on Bibsonomy Web Intelligence/IAT Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Ye Cao, Weili Han, Yueran Le Anti-phishing based on automated individual white-list. Search on Bibsonomy Digital Identity Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anti-pharming, individual white-list, login user interface, na?ve bayesian classifier, anti-phishing
18Ben H. Smith, Yonghee Shin, Laurie A. Williams Proposing SQL statement coverage metrics. Search on Bibsonomy SESS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, test, SQL, attack, SQL injection, coverage criteria, threat
18Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu Authenticated Directed Diffusion. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Authentication, Directed Diffusion
18Anirudh Ramachandran, Nick Feamster, Santosh S. Vempala Filtering spam with behavioral blacklisting. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, clustering, spam, botnets, blacklists
18Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith Blacklistable anonymous credentials: blocking misbehaving users without ttps. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anonymous blacklisting, user misbehavior, privacy, revocation, anonymous authentication
18Ashok Khanal, Bahman S. Motlagh, Taskin Koçak Improving the Efficiency of Spam Filtering through Cache Architecture. Search on Bibsonomy MASCOTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel On the Effectiveness of Techniques to Detect Phishing Sites. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Baoyi Wang, Shaomin Zhang An Organization and Task Based Access Control Model for Workflow System. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, constraint, authorization, workflow system, organization modeling
18Bo Lang, Ian T. Foster, Frank Siebenlist, Rachana Ananthakrishnan, Timothy Freeman 0001 A Multipolicy Authorization Framework for Grid Security. Search on Bibsonomy NCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Jalel Rejeb, Thuy T. Le, Narinder Anand High Speed and Reliable Anti-Spam Filter. Search on Bibsonomy ICSEA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Anirudh Ramachandran, Nick Feamster Understanding the network-level behavior of spammers. Search on Bibsonomy SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, network management, spam, BGP, botnet
18Jian Liang, Naoum Naoumov, Keith W. Ross Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems. Search on Bibsonomy AINTEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Guoyin Zhang, Jian Li, Guo-Chang Gu Research on defending DDoS attack - an expert system approach. Search on Bibsonomy SMC (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18V. Bacarella, Fosca Giannotti, Mirco Nanni, Dino Pedreschi Discovery of ads web hosts through traffic data analysis. Search on Bibsonomy DMKD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18David Chaum, Amos Fiat, Moni Naor Untraceable Electronic Cash. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #93 of 93 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license