|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 22 occurrences of 20 keywords
|
|
|
Results
Found 56 publication records. Showing 56 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
121 | Tsong Song Hwang, Tsung-Ju Lee, Yuh-Jye Lee |
A three-tier IDS via data mining approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 3rd Annual ACM Workshop on Mining Network Data, MineNet 2007, San Diego, California, USA, June 12, 2007, pp. 1-6, 2007, ACM, 978-1-59593-792-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
KDD'99, RIPPER, activity profile, whitelist, intrusion detection system, blacklist, false alarm rate, multiclass SVMs |
45 | Diane Lambert, Daryl Pregibon |
More bang for their bucks: assessing new features for online advertisers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 9(2), pp. 100-107, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
biased sampling, statistical inference, causal modeling, propensity scores |
31 | Ronald Bhuleskar, Anoop Sherlekar, Anala Pandit |
Hybrid Spam E-mail Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICSyN ![In: First International Conference on Computational Intelligence, Communication Systems and Networks, CICSYN 2009, Indore, India, 23-25 July, 2009, pp. 302-307, 2009, IEEE Computer Society, 978-0-7695-3743-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
HSF, spam coefficient, legitimate coefficient, whitelist, forging, spam mean, Self Improvisation, self learning technique, Filter, Filtering, Spam, Email, Hybrid, content based filtering, Parallel model, blacklist |
31 | Asaad Moosa, Eanas Muhsen Alsaffar |
Proposing a hybrid-intelligent framework to secure e-government web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, ICEGOV 2008, Cairo, Egypt, December 1-4, 2008, pp. 52-59, 2008, ACM, 978-1-60558-386-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
negative logic based filtering, positive logic based filtering, session based filtering, web application firewalls, whitelist, neural networks, fuzzy logic, e-government, web application, blacklist |
27 | Ignacio Redondo, Gloria Aznar |
Whitelist or Leave Our Website! Advances in the Understanding of User Response to Anti-Ad-Blockers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatics ![In: Informatics 10(1), pp. 30, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake, Ayumu Kubota |
Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enterp. Inf. Syst. ![In: Enterp. Inf. Syst. 17(9), September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Jan Bayer, Sourena Maroofi, Olivier Hureau, Andrzej Duda, Maciej Korczynski |
Building a Resilient Domain Whitelist to Enhance Phishing Blacklist Accuracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: APWG Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023, pp. 1-14, 2023, IEEE, 979-8-3503-6027-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Se-Beom Cheon, Geun-Yeong Choi, DaeYoub Kim |
A Cheating Attack on a Whitelist-based Anti-Ransomware Solution and its Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE ![In: IEEE International Conference on Consumer Electronics, ICCE 2023, Las Vegas, NV, USA, January 6-8, 2023, pp. 1-4, 2023, IEEE, 978-1-6654-9130-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Wooyeon Jo, SungJin Kim, Hyunjin Kim, Yeonghun Shin, Taeshik Shon |
Automatic whitelist generation system for ethernet based in-vehicle network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Ind. ![In: Comput. Ind. 142, pp. 103735, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Yunlong Xing, Jiahao Cao, Kun Sun 0001, Fei Yan 0008, Shengye Wan |
The devil is in the detail: Generating system call whitelist for Linux seccomp. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 135, pp. 105-113, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Michal Maliszewski, Urszula Boryczka |
Random Forest in Whitelist-Based ATM Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIIDS (2) ![In: Intelligent Information and Database Systems - 14th Asian Conference, ACIIDS 2022, Ho Chi Minh City, Vietnam, November 28-30, 2022, Proceedings, Part II, pp. 292-301, 2022, Springer, 978-3-031-21966-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Kyu-Seok Shim, Il Kwon Sohn, Eunjoo Lee, Woojin Seok, Wonhyuk Lee |
Enhance the ICS Network Security Using the Whitelist-based Network Monitoring Through Protocol Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Web Eng. ![In: J. Web Eng. 20(1), pp. 1-32, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Nureni Ayofe Azeez, Sanjay Misra, Ihotu Agbo Margaret, Luis Fernández Sanz, Shafii Muhammad Abdulhamid |
Adopting automated whitelist approach for detecting phishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 108, pp. 102328, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Keita Hasegawa, Daishi Kondo, Hideki Tode |
FQDN-Based Whitelist Filter on a DNS Cache Server Against the DNS Water Torture Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IM ![In: 17th IFIP/IEEE International Symposium on Integrated Network Management, IM 2021, Bordeaux, France, May 17-21, 2021, pp. 628-632, 2021, IEEE, 978-3-903176-32-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
27 | Michael Cheng Yi Cho, Yuan-Hsiang Su, Hsiu-Chuan Huang, Yu-Lung Tsai |
Top of the Pops: A Novel Whitelist Generation Scheme for Data Exfiltration Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAI (2) ![In: Intelligent Computing - Proceedings of the 2021 Computing Conference, Volume 2, SAI 2021, Virtual Event, 15-16 July, 2021., pp. 65-79, 2021, Springer, 978-3-030-80125-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Sungjin Kim, Byung Joon Kim, Dong Hoon Lee |
Prof-gen: Practical Study on System Call Whitelist Generation for Container Attack Surface Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLOUD ![In: 14th IEEE International Conference on Cloud Computing, CLOUD 2021, Chicago, IL, USA, September 5-10, 2021, pp. 278-287, 2021, IEEE, 978-1-6654-0060-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Alessandro Vesely |
DNS Whitelist (DNSWL) Email Authentication Method Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8904, pp. 1-12, September 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | DaeYoub Kim, Jihoon Lee |
Blacklist vs. Whitelist-Based Ransomware Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Consumer Electron. Mag. ![In: IEEE Consumer Electron. Mag. 9(3), pp. 22-28, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Xuhao Wang, Qingni Shen, Wu Luo, Pengfei Wu |
RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLOUD ![In: 13th IEEE International Conference on Cloud Computing, CLOUD 2020, Virtual Event, 18-24 October 2020., pp. 600-608, 2020, IEEE, 978-1-7281-8780-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Xinling Shen, Nan Li, Chao Liu 0020, Mengnan Cai |
WMUD: A Whitelist Method of USB Devices Redirection for Virtual Desktop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC/SmartCity/DSS ![In: 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10-12, 2019, pp. 527-533, 2019, IEEE, 978-1-7281-2058-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Komei Nomura, Kenji Rikitake, Ryosuke Matsumoto |
Automatic Whitelist Generation for SQL Queries Using Web Application Tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2, pp. 465-470, 2019, IEEE, 978-1-7281-2607-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Shintaro Fujita, Kenji Sawada, Seiichi Shin, Shu Hosokawa |
Model Verification and Exhaustive Testing for Whitelist Function of Industrial Control System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IECON ![In: IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society, Lisbon, Portugal, October 14-17, 2019, pp. 5874-5879, 2019, IEEE, 978-1-7281-4878-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Shuai Zhao, Achir Kalra, Chong Wang, Cristian Borcea, Yi Chen 0001 |
Ad Blocking Whitelist Prediction for Online Publishers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE BigData ![In: 2019 IEEE International Conference on Big Data (IEEE BigData), Los Angeles, CA, USA, December 9-12, 2019, pp. 1711-1716, 2019, IEEE, 978-1-7281-0858-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Nobuyuki Kanaya, Yu Tsuda, Yuuki Takano, Daisuke Inoue |
Byakko: Automatic Whitelist Generation based on Occurrence Distribution of Features of Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE BigData ![In: 2019 IEEE International Conference on Big Data (IEEE BigData), Los Angeles, CA, USA, December 9-12, 2019, pp. 3190-3199, 2019, IEEE, 978-1-7281-0858-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Chun-Jung Wu, Ying Tie, Satoshi Hara 0002, Kazuki Tamiya, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto |
IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 26, pp. 662-672, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Shujuan Ji, Haiyan Ma, Yongquan Liang, Ho-fung Leung, Chun-jin Zhang |
Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 48(7), pp. 1891, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Michael Bisaccio |
Cabells' Journal Whitelist and Blacklist: Intelligent data for informed journal evaluations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Learn. Publ. ![In: Learn. Publ. 31(3), pp. 243-248, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Nobuhiro Kobayashi, Koichi Shimizu, Tsunato Nakai, Teruyoshi Yamaguchi, Masakatsu Nishigaki |
Intrusion Detection Method Using Enhanced Whitelist Based on Cooperation of System Development, System Deployment, and Device Development Domains in CPS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: Advances in Network-Based Information Systems, The 21st International Conference on Network-Based Information Systems, NBiS-2018, Bratislava, Slovakia, 5-7 September 2018., pp. 430-444, 2018, Springer, 978-3-319-98529-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Jeongwoo Choi, Yongmin Kim, Jinwoo Lee, Jiman Hong |
Dynamic code whitelist for efficient analysis of Android code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RACS ![In: Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, RACS 2018, Honolulu, HI, USA, October 09-12, 2018, pp. 165-166, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Keisuke Inoue, Toshiki Honda, Kohei Mukaiyama, Tetsushi Ohki, Masakatsu Nishigaki |
Automatic Examination-Based Whitelist Generation for XSS Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BWCCA ![In: Advances on Broadband and Wireless Computing, Communication and Applications, Proceedings of the 13th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2018, Taichung, Taiwan, October 27-29, 2018., pp. 326-338, 2018, Springer, 978-3-030-02612-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Shintaro Fujita, Kosuke Rata, Akinori Mochizuki, Kenji Sawada, Seiichi Shin, Shu Hosokawa |
On Experimental validation of Whitelist Auto-Generation Method for Secured Programmable Logic Controllers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IECON ![In: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, USA, October 21-23, 2018, pp. 2385-2390, 2018, IEEE, 978-1-5090-6684-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Seohee You, Dana Yang, Inshil Doh, Kijoon Chae |
Authorization based on mobile whitelist in devices for device-to-device communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: 2018 International Conference on Information Networking, ICOIN 2018, Chiang Mai, Thailand, January 10-12, 2018, pp. 706-711, 2018, IEEE, 978-1-5386-2290-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Shujuan Ji, Haiyan Ma, Yongquan Liang, Ho-fung Leung, Chun-jin Zhang |
A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 47(4), pp. 1115-1131, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Kyoungmin Kim 0005, Jeonghwan Lee, Seonguk Lee, Jiman Hong |
Whitelist for Analyzing Android Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RACS ![In: Proceedings of the International Conference on Research in Adaptive and Convergent Systems, RACS 2017, Krakow, Poland, September 20-23, 2017, pp. 222-227, 2017, ACM, 978-1-4503-5027-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Woo-Suk Jung, Jeong-Han Yun, Sin-Kyu Kim, Kyu-Seok Shim, Myung-Sup Kim |
Structured whitelist generation in SCADA network using PrefixSpan algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: 19th Asia-Pacific Network Operations and Management Symposium, APNOMS 2017, Seoul, Korea (South), September 27-29, 2017, pp. 326, 2017, IEEE, 978-1-5386-1101-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Nong Si, Ke-Bin Jia |
One Communication Key Udate with Whitelist Attribute in SCADA System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Hiding Multim. Signal Process. ![In: J. Inf. Hiding Multim. Signal Process. 7(3), pp. 629-636, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
27 | Woo-Suk Jung, Sung-Min Kim, Young-Hoon Goo, Myung-Sup Kim |
Whitelist representation for FTP service in SCADA system by using structured ACL model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: 18th Asia-Pacific Network Operations and Management Symposium, APNOMS 2016, Kanazawa, Japan, October 5-7, 2016, pp. 1-4, 2016, IEEE, 978-4-88552-304-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Niklas Kühl 0001, Marc Goutier |
Needmining: Evaluating a Whitelist-Based Assignment Method to Quantify Customer Needs from Micro Blog Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OR ![In: Operations Research Proceedings 2016, Selected Papers of the Annual International Conference of the German Operations Research Society (GOR), Helmut Schmidt University Hamburg, Germany, August 30 - September 2, 2016., pp. 165-170, 2016, Springer, 978-3-319-55701-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Linfeng Li, Eleni Berki, Marko Helenius, Saila Ovaska |
Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Behav. Inf. Technol. ![In: Behav. Inf. Technol. 33(11), pp. 1136-1147, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Seokmo Kim, Young B. Park 0001 |
An Object Pool Realization of Whitelist Strategies to Neutralize Injection Flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITCS ![In: 2014 International Conference on IT Convergence and Security, 10.1109/ICITCS.2014, Beijing, China, October 28-30, 2014, pp. 1-5, 2014, IEEE Computer Society, 978-1-4799-6541-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Uijin Jang, Changjin Suh, Hyungmin Lim |
A Study on the Efficient Management of Android Apps Using a Whitelist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCC ![In: Frontier and Innovation in Future Computing and Communications, Proceedings of the 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, Auckland, New Zealand, January 13-16, 2014, pp. 473-482, 2014, Springer, 978-94-017-8797-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Dong-Ho Kang, Byoung-Koo Kim, Jung-Chan Na, Kyoung-Son Jhang |
Whitelist Generation Technique for Industrial Firewall in SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCC ![In: Frontier and Innovation in Future Computing and Communications, Proceedings of the 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, Auckland, New Zealand, January 13-16, 2014, pp. 525-534, 2014, Springer, 978-94-017-8797-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Byeong-Hee Roh, Ju Wan Kim, Ki-Yeol Ryu, Jea-Tek Ryu |
A whitelist-based countermeasure scheme using a Bloom filter against SIP flooding attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 37, pp. 46-61, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Gada, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura |
E-Mail Priority Delivery System with Dynamic Whitelist in the Layer 3 Switch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC Workshops ![In: IEEE 37th Annual Computer Software and Applications Conference, COMPSAC Workshops 2013, Kyoto, Japan, July 22-26, 2013, pp. 581-586, 2013, IEEE Computer Society, 978-1-4799-2159-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Young-Gab Kim, Min-Soo Lee, Sanghyun Cho, Sung Deok Cha |
A quantitative approach to estimate a website security risk using whitelist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 5(10), pp. 1181-1192, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Linfeng Li, Marko Helenius, Eleni Berki |
A usability test of whitelist and blacklist-based anti-phishing application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MindTrek ![In: International Conference on Media of the Future, Academic MindTrek '12, Tampere, Finland, October 3-5, 2012, pp. 195-202, 2012, ACM, 978-1-4503-1637-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Amine Belabed, Esma Aïmeur, Mohammed Amine Chikh |
A Personalized Whitelist Approach for Phishing Webpage Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, Czech Republic, August 20-24, 2012, pp. 249-254, 2012, IEEE Computer Society, 978-1-4673-2244-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Tae-Hyung Kim, Young-Sik Choi, Jong Kim 0001, Sung Je Hong |
Annulling SYN Flooding Attacks with Whitelist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, Workshops Proceedings, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 371-376, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Ahren Studer, Adrian Perrig |
Mobile user location-specific encryption (MULE): using your office as your password. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 151-162, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
key derivation, laptop theft, location based access, security |
23 | Genta Iha, Hiroshi Doi |
An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 966-971, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki |
Exploiting Temporal Persistence to Detect Covert Botnet Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 326-345, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Justin Samuel, Beichuan Zhang 0001 |
RequestPolicy: Increasing Web Browsing Privacy through Control of Cross-Site Requests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 128-142, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Khaled Shaalan, Hafsa Raza |
Arabic Named Entity Recognition from Diverse Text Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GoTAL ![In: Advances in Natural Language Processing, 6th International Conference, GoTAL 2008, Gothenburg, Sweden, August 25-27, 2008, Proceedings, pp. 440-451, 2008, Springer, 978-3-540-85286-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Arabic natural language processing, Information extraction, Named entity recognition |
23 | Ashok Khanal, Bahman S. Motlagh, Taskin Koçak |
Improving the Efficiency of Spam Filtering through Cache Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASCOTS ![In: 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2007), October 24-26, 2007, Istanbul, Turkey, pp. 303-309, 2007, IEEE Computer Society, 978-1-4244-1854-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Zhuowei Li 0001, Amitabha Das, Jianying Zhou 0001 |
Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 54-64, 2007, Springer, 978-3-540-74408-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Clifton Phua, Ross W. Gayler, Kate Smith-Miles, Vincent C. S. Lee |
Communal Detection of Implicit Personal Identity Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM Workshops ![In: Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China, pp. 620-625, 2006, IEEE Computer Society, 0-7695-2702-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #56 of 56 (100 per page; Change: )
|
|