DNSBL

Known as: DNS Blacklist, Real-time blackhole list, RBL 
A DNS-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is an effort to stop email spamming. It is a "blacklist" of locations on the… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1984-2017
05101519842017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The structural vibration-based damage identification can be formulated as an optimization problem. The objective functional is… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2015
2015
This study offers a first step toward understanding the extent to which we may be able to predict cyber security incidents (which… (More)
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2013
2013
Threats to the security and availability of the network have contributed to the use of Real-time Blackhole Lists (RBLs) as an… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2013
2013
Mobile applications such as tablets pack increasingly more processing capability comparable to workstations or laptops but can do… (More)
Is this relevant?
2012
2012
Circuit techniques for enhancing the retention time and random cycle of logic-compatible embedded DRAMs (eDRAMs) are presented… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
Circuit techniques for enabling a sub-0.9V logic-compatible embedded DRAM (eDRAM) are presented. A boosted 3T gain cell increases… (More)
  • figure 1
  • figure 8
  • figure 7
Is this relevant?
Highly Cited
2007
Highly Cited
2007
A 10T SRAM cell with data-independent bitline leakage and a virtual-ground replica scheme allows 1k cells per bitline in… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Botnets—networks of (typically compromised) machines—are often used for nefarious activities (e.g., spam, click fraud, denial-of… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
Is this relevant?
2004
2004
This paper presents the clustering algorithm PoBOC (Pole-Based Overlapping Clustering). It has two main characteristics: the… (More)
  • table 1
  • figure 2
  • figure 1
  • table 2
  • table 4
Is this relevant?
1984
1984
We have used in situ electromigration and post-field relaxation (Poo, M.-m., 1981, Annu. Rev. Biophys. Bioeng., 10:245-276) to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?