Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,632,898 papers from all fields of science
Search
Sign In
Create Free Account
Blacklist (computing)
Known as:
Black list (computing)
, Blacklist (disambiguation)
, Blocklist
In computing, a blacklist or block list is a basic access control mechanism that allows through all elements (email addresses, users, passwords, URLs…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
43 relations
Access control
Active Directory
Bogofilter
Cache invalidation
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Peek Inside the Closed World: Evaluating Autoencoder-Based Detection of DDoS to Cloud
Hang Guo
,
Xun Fan
,
Anh Cao
,
G. Outhred
,
J. Heidemann
arXiv.org
2019
Corpus ID: 209324209
Machine-learning-based anomaly detection (ML-based AD) has been successful at detecting DDoS events in the lab. However published…
Expand
2015
2015
Booters (black)list
J. Chromik
2015
Corpus ID: 54186355
Distributed Denial of Service (DDoS) attacks are a continuously growing threat of the present Internet. Without proper protection…
Expand
Review
2013
Review
2013
Survey of Filtering System For OSN ( Online Social Networks )
Miss.
2013
Corpus ID: 11712050
In recent years, Online Social Networks (OSNs) have become an important part of daily life. Users build explicit networks to…
Expand
2012
2012
Spam Detection Using Artificial Neural Networks (Perceptron Learning Rule)
Owen Kufandirimbwa
,
Richard Gotora
2012
Corpus ID: 136913
Spam is email sent in bulk where there is no direct agreement in place between the recipient and the sender to receive email…
Expand
2012
2012
Internet bad neighborhoods aggregation
G. Moura
,
R. Sadre
,
A. Sperotto
,
A. Pras
IEEE Network Operations and Management Symposium
2012
Corpus ID: 15684066
Internet Bad Neighborhoods have proven to be an innovative approach for fighting spam. They have also helped to understand how…
Expand
2011
2011
Collaborative cyberporn filtering with collective intelligence
Lung-Hao Lee
,
Hsin-Hsi Chen
Annual International ACM SIGIR Conference on…
2011
Corpus ID: 11876327
This paper presents a user intent method to generate blacklists for collaborative cyberporn filtering. A novel porn detection…
Expand
2010
2010
Functional enhancements of cooperative session control for “Minimum Core” architecture
T. Warabino
,
Youji Kishi
,
H. Yokota
Future Network & Mobile Summit
2010
Corpus ID: 17449175
This paper proposes functional enhancements of cooperative session control for “Minimum Core” architecture. In past work, the…
Expand
2009
2009
Attribute-Based Prevention of Phishing Attacks
M. Atighetchi
,
P. Pal
Eighth IEEE International Symposium on Network…
2009
Corpus ID: 13969125
This paper describes a set of innovative attribute based checks for defending against phishing attacks. We explain a number of…
Expand
Review
2009
Review
2009
Sentiment Analysis of Movie
Kuat Yessenov
,
Sasa Misailovic
2009
Corpus ID: 657390
This paper presents an empirical study of efficacy of machine learning techniques in classifying text messages by semantic…
Expand
2009
2009
Inferring Spammers in the Network Core
Dominik Schatzmann
,
M. Burkhart
,
T. Spyropoulos
Passive and Active Network Measurement Conference
2009
Corpus ID: 2780993
Despite a large amount of effort devoted in the past years trying to limit unsolicited mail, spam is still a major global concern…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE