Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,130,456 papers from all fields of science
Search
Sign In
Create Free Account
DNSBL
Known as:
Real-time Blackhole List
, RBL (Internet)
, DNS Blacklist
Expand
A DNS-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is an effort to stop email spamming. It is a "blacklist" of locations on the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
Anti-Spam Research Group
Anti-Spam SMTP Proxy
Anti-spam techniques
Backscatter (email)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Effects of light quality on growth and development of cucumber seedlings in controlled environment
Jin-Heon Song
,
Q. Meng
,
Weifen Du
,
D. He
2017
Corpus ID: 53455666
Abstract: Conventional light sources have been successfully used to cultivate a wide variety of horticultural crops. However…
Expand
Highly Cited
2014
Highly Cited
2014
Towards a Comprehensive Picture of the Great Firewall's DNS Censorship
IEEE Symposium on Foundations of Computational…
2014
Corpus ID: 8688873
China’s Great Firewall passively inspects network traffic and disrupts unwanted communication by injecting forged DNS replies or…
Expand
2013
2013
Baselining Network-Wide Traffic by Time-Frequency Constrained Stable Principal Component Pursuit
Kai-Qi Hu
,
Zhe Wang
arXiv.org
2013
Corpus ID: 9344157
Highly Cited
2010
Highly Cited
2010
DNS Blacklists and Whitelists
J. Levine
Request for Comments
2010
Corpus ID: 45280417
The rise of spam and other anti-social behavior on the Internet has led to the creation of shared blacklists and whitelists of IP…
Expand
Highly Cited
2010
Highly Cited
2010
Conficker and beyond: a large-scale empirical study
Seungwon Shin
,
G. Gu
Asia-Pacific Computer Systems Architecture…
2010
Corpus ID: 9961043
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7…
Expand
2008
2008
Fast Flux Service Networks: Dynamics and Roles in Hosting Online Scams
N. Feamster
,
Maria Konte
,
Jaeyeon Jung
2008
Corpus ID: 18169701
This paper studies the dynamics of fast flux service networks and their role in online scam hosting infrastructures. By…
Expand
Highly Cited
2007
Highly Cited
2007
Resource-Based Learning
M. Hannafin
,
Janette R. Hill
2007
Corpus ID: 6336835
The nature of information has changed dramatically during the past 25 years. The digital age has redefined the nature of a…
Expand
Highly Cited
2006
Highly Cited
2006
Revealing Botnet Membership Using DNSBL Counter-Intelligence
Anirudh Ramachandran
,
N. Feamster
,
D. Dagon
Workshop on Steps to Reducing Unwanted Traffic on…
2006
Corpus ID: 3054340
Botnets--networks of (typically compromised) machines--are often used for nefarious activities (e.g., spam, click fraud, denial…
Expand
Review
2001
Review
2001
The Properties of the Radio-Selected 1 Jy Sample of BL Lacertae Objects
T. Rector
,
J. Stocke
2001
Corpus ID: 14653293
We present new optical and near-IR spectroscopy, as well as new high dynamic range, arcsecond-resolution VLA radio maps, of BL…
Expand
Highly Cited
1998
Highly Cited
1998
Batse Observations of Bl Lac Objects
V. Connaughton
,
C. Robinson
,
M. McCollough
,
S. Laurent-Muehleisen
1998
Corpus ID: 121561764
The Burst and Transient Source Experiment (BATSE) on the Compton Gamma-Ray Observatory has been shown to be sensitive to non…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE