Skip to search formSkip to main contentSkip to account menu

Blacklist (computing)

Known as: Black list (computing), Blacklist (disambiguation), Blocklist 
In computing, a blacklist or block list is a basic access control mechanism that allows through all elements (email addresses, users, passwords, URLs… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Distributed Denial of Service (DDoS) attacks are a continuously growing threat of the present Internet. Without proper protection… 
2013
2013
The distribution of malicious hosts over the IP address space is far from being uniform. In fact, malicious hosts tend to be… 
2013
2013
The manual forensics investigation of security incidents is an opaque process that involves the collection and correlation of… 
Review
2013
Review
2013
  • Miss.
  • 2013
  • Corpus ID: 11712050
In recent years, Online Social Networks (OSNs) have become an important part of daily life. Users build explicit networks to… 
2012
2012
Spam is email sent in bulk where there is no direct agreement in place between the recipient and the sender to receive email… 
2012
2012
Most on-demand Mobile Ad Hoc Network (MANET) routing schemes typically assume operation over symmetrical and bidirectional… 
2010
2010
This paper proposes functional enhancements of cooperative session control for “Minimum Core” architecture. In past work, the… 
2009
2009
This paper describes a set of innovative attribute based checks for defending against phishing attacks. We explain a number of… 
2006
2006
Publish/subscribe protocols are becoming popular on the Internet with the advent of RSS-feeds and Session Initiation Protocol… 
2005
2005
We studied the objective of spam based on a financial profit truth – the cost for sending spam against anti-spam techniques…