Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Blacklist (computing)

Known as: Black list (computing), Blacklist (disambiguation), Blocklist 
In computing, a blacklist or block list is a basic access control mechanism that allows through all elements (email addresses, users, passwords, URLs… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Blacklists are commonly used to protect computer systems against the tremendous number of malware threats. These lists include… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2014
2014
Phishing is an attempt by an individual or a group of person to steal personal information such as password, banking account and… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2014
2014
Malicious activities on the Internet are one of the most dangerous threats to Internet users and organizations. Malicious… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2012
2012
Wireless sensor networks (WSNs) are vulnerable to security attacks due to the broadcast nature of transmission and limited… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection and increase resilience. These… Expand
  • table I
  • table II
  • figure 1
  • table III
  • figure 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
A widely used defense practice against malicious traffic on the Internet is through blacklists: lists of prolific attack sources… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
Modern SMTP servers apply a variety of mechanisms to stem the volume of spam delivered to users. These techniques can be broadly… Expand
  • figure 1
  • table III
  • table I
  • table IV
  • table II
Is this relevant?
2009
2009
This paper describes a set of innovative attribute based checks for defending against phishing attacks. We explain a number of… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this paper we propose a novel, passive approach for detecting and tracking malicious flux service networks. Our detection… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
Is this relevant?