Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,553,166 papers from all fields of science
Search
Sign In
Create Free Account
Greylisting
Known as:
Grey listing
, Greylist
, Gray list
Expand
Greylisting is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will "temporarily reject" any email…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Anti-Spam SMTP Proxy
Anti-spam techniques
Backscatter (email)
Blacklist (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Research of Cloud Security Communication Firewall Based on Android Platform
Miao Cai
,
Qinsheng Hou
,
F. Jing
,
Qi Ding
2013
Corpus ID: 56458595
To solve communications security problems of smartphones, this paper analyzes today's firewall models' lopsided and mechanized…
Expand
2012
2012
Detection of Wormhole Attack using Hop-count and Time delay Analysis
P. Niranjan
,
P. Srivastava
,
R. Pratap
2012
Corpus ID: 16763238
MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. In this paper we…
Expand
2012
2012
Filtering Spam by Hybrid Approach
Mohamed Tabris
,
Y. Al-Nashif
,
S. Hariri
International Conference on Collaborative…
2012
Corpus ID: 57806270
Spam has become a main cause of financial loss in most of the organization. It was seen that 81.6% of the email Traffic in 2006…
Expand
2009
2009
Greylisting — long term analysis of anti-SPAM effect
T. Sochor
Crisis
2009
Corpus ID: 28724025
Greylisting is a popular method for protection against SPAM messages since 2003. It often complements other methods (usually…
Expand
2009
2009
BLOBOT: BLOcking BOTs at the Doorstep
G. Dini
,
Isidoro S. La Porta
Fourth International Multi-Conference on…
2009
Corpus ID: 18503477
In this paper we present BLOBOT, a tool for detecting botnets. BLOBOT detects botnets by detecting their command and control…
Expand
2009
2009
MVGL Analyser for Multi-classifier Based Spam Filtering System
M. Islam
,
Wanlei Zhou
,
M. Chowdhury
Eighth IEEE/ACIS International Conference on…
2009
Corpus ID: 17356055
In the last decade, the rapid growth of the Internet and email, there has been a dramatic growth in spam. Spam is commonly…
Expand
2008
2008
Greylisting method analysis in real SMTP server environment - Case-study
T. Sochor
International Symposium on Symbolic Computation…
2008
Corpus ID: 45280448
Greylisting is a method for protection against unsolicited electronic mail messages (SPAM) based on the combination of white…
Expand
2008
2008
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
C. Krauß
,
Markus Schneider
,
C. Eckert
IEEE International Conference on Wireless and…
2008
Corpus ID: 9809306
Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many…
Expand
2007
2007
Cure for Spam Over Internet Telephony
J. Lindqvist
,
Miika Komu
4th IEEE Consumer Communications and Networking…
2007
Corpus ID: 18118812
Unsolicited bulk email or spam is a menace to the usability of Internet email. The possibility of cheap Voice over IP (VoIP…
Expand
1997
1997
Block Exemption for Technology Licensing Agreements under Commission Regulation (EC) No. 240/ 96
Jianming Shen
1997
Corpus ID: 166487140
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE