Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,998,344 papers from all fields of science
Search
Sign In
Create Free Account
Blacklist (computing)
Known as:
Black list (computing)
, Blacklist (disambiguation)
, Blocklist
In computing, a blacklist or block list is a basic access control mechanism that allows through all elements (email addresses, users, passwords, URLs…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
43 relations
Access control
Active Directory
Bogofilter
Cache invalidation
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Booters (black)list
J. Chromik
2015
Corpus ID: 54186355
Distributed Denial of Service (DDoS) attacks are a continuously growing threat of the present Internet. Without proper protection…
Expand
2013
2013
Evaluating third-party Bad Neighborhood blacklists for Spam detection
G. Moura
,
A. Sperotto
,
R. Sadre
,
A. Pras
IFIP/IEEE Symposium on Integrated Network…
2013
Corpus ID: 12304739
The distribution of malicious hosts over the IP address space is far from being uniform. In fact, malicious hosts tend to be…
Expand
2013
2013
Understanding Network Forensics Analysis in an Operational Environment
Elias Raftopoulos
,
X. Dimitropoulos
IEEE Security and Privacy Workshops
2013
Corpus ID: 15837237
The manual forensics investigation of security incidents is an opaque process that involves the collection and correlation of…
Expand
Review
2013
Review
2013
Survey of Filtering System For OSN ( Online Social Networks )
Miss.
2013
Corpus ID: 11712050
In recent years, Online Social Networks (OSNs) have become an important part of daily life. Users build explicit networks to…
Expand
2012
2012
Spam Detection Using Artificial Neural Networks (Perceptron Learning Rule)
Owen Kufandirimbwa
,
Richard Gotora
2012
Corpus ID: 136913
Spam is email sent in bulk where there is no direct agreement in place between the recipient and the sender to receive email…
Expand
2012
2012
On-demand routing with unidirectional link using path loss estimation technique
M. Zuhairi
,
H. Zafar
,
D. Harle
Wireless Telecommunications Symposium
2012
Corpus ID: 28134106
Most on-demand Mobile Ad Hoc Network (MANET) routing schemes typically assume operation over symmetrical and bidirectional…
Expand
2010
2010
Functional enhancements of cooperative session control for “Minimum Core” architecture
T. Warabino
,
Youji Kishi
,
H. Yokota
Future Network & Mobile Summit
2010
Corpus ID: 17449175
This paper proposes functional enhancements of cooperative session control for “Minimum Core” architecture. In past work, the…
Expand
2009
2009
Attribute-Based Prevention of Phishing Attacks
M. Atighetchi
,
P. Pal
Eighth IEEE International Symposium on Network…
2009
Corpus ID: 13969125
This paper describes a set of innovative attribute based checks for defending against phishing attacks. We explain a number of…
Expand
2006
2006
Preventing Spam in Publish/Subscribe
Sasu Tarkoma
International Conference on Distributed Computing…
2006
Corpus ID: 630847
Publish/subscribe protocols are becoming popular on the Internet with the advent of RSS-feeds and Session Initiation Protocol…
Expand
2005
2005
To Build a Blocklist Based on the Cost of Spam
H. Chim
Workshop on Internet and Network Economics
2005
Corpus ID: 1019241
We studied the objective of spam based on a financial profit truth – the cost for sending spam against anti-spam techniques…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE