Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,391,796 papers from all fields of science
Search
Sign In
Create Free Account
Greylisting
Known as:
Grey listing
, Greylist
, Gray list
Expand
Greylisting is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will "temporarily reject" any email…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Anti-Spam SMTP Proxy
Anti-spam techniques
Backscatter (email)
Blacklist (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Illegal communication control apparatus and method
重本 倫宏
,
鬼頭 哲郎
,
義明 磯部
,
博史 仲小路
2015
Corpus ID: 64984001
According to the present invention, communication by means of malware is cut off while permitting communication that affects a…
Expand
2013
2013
Research of Cloud Security Communication Firewall Based on Android Platform
Miao Cai
,
Qinsheng Hou
,
F. Jing
,
Qi Ding
2013
Corpus ID: 56458595
To solve communications security problems of smartphones, this paper analyzes today's firewall models' lopsided and mechanized…
Expand
2012
2012
Detection of Wormhole Attack using Hop-count and Time delay Analysis
P. Niranjan
,
P. Srivastava
,
R. Pratap
2012
Corpus ID: 16763238
MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. In this paper we…
Expand
2012
2012
Filtering Spam by Hybrid Approach
Mohamed Tabris
,
Y. Al-Nashif
,
S. Hariri
International Conference on Collaborative…
2012
Corpus ID: 57806270
Spam has become a main cause of financial loss in most of the organization. It was seen that 81.6% of the email Traffic in 2006…
Expand
2012
2012
Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network
P. Yi
,
Ting Zhu
,
Q. Zhang
,
Yue Wu
,
Jianhua Li
Global Communications Conference
2012
Corpus ID: 25547314
Wireless sensor networks (WSNs) are vulnerable to security attacks due to the broadcast nature of transmission and limited…
Expand
2009
2009
Greylisting — long term analysis of anti-SPAM effect
T. Sochor
Crisis
2009
Corpus ID: 28724025
Greylisting is a popular method for protection against SPAM messages since 2003. It often complements other methods (usually…
Expand
2009
2009
BLOBOT: BLOcking BOTs at the Doorstep
G. Dini
,
Isidoro S. La Porta
Fourth International Multi-Conference on…
2009
Corpus ID: 18503477
In this paper we present BLOBOT, a tool for detecting botnets. BLOBOT detects botnets by detecting their command and control…
Expand
2008
2008
Greylisting method analysis in real SMTP server environment - Case-study
T. Sochor
International Symposium on Symbolic Computation…
2008
Corpus ID: 45280448
Greylisting is a method for protection against unsolicited electronic mail messages (SPAM) based on the combination of white…
Expand
2007
2007
Cure for Spam Over Internet Telephony
J. Lindqvist
,
Miika Komu
4th IEEE Consumer Communications and Networking…
2007
Corpus ID: 18118812
Unsolicited bulk email or spam is a menace to the usability of Internet email. The possibility of cheap Voice over IP (VoIP…
Expand
1997
1997
Block Exemption for Technology Licensing Agreements under Commission Regulation (EC) No. 240/ 96
Jianming Shen
1997
Corpus ID: 166487140
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE