Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,540 papers from all fields of science
Search
Sign In
Create Free Account
IP address blocking
Known as:
IP blocked
, IP banning
, IP blocking
Expand
IP address blocking prevents connection between a server or website and certain IP addresses or ranges of addresses. IP address blocking effectively…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Computer Fraud and Abuse Act
DenyHosts
Fail2Ban
Internet
Expand
Broader (1)
Internet security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
The Global IP Upward Ratchet, Anti-Counterfeiting and Piracy Enforcement Efforts: The State of Play
Susan K. Sell
2010
Corpus ID: 166691641
Proponents of an IP maximalist agenda increasingly have been rebuffed in recent years. Developing country governments, NGOs, and…
Expand
Highly Cited
2008
Highly Cited
2008
Comparing trophic position of stream fishes using stable isotope and gut contents analyses
S. Rybczynski
,
D. Walters
,
K. Fritz
,
B. Johnson
2008
Corpus ID: 53005026
– Stable isotope analysis (SIA) and gut contents analysis (GCA) are commonly used in food web studies, but few studies analyse…
Expand
Highly Cited
2008
Highly Cited
2008
Equilibrium prices supported by dual price functions in markets with non-convexities
M. Bjørndal
,
K. Jörnsten
European Journal of Operational Research
2008
Corpus ID: 29112167
Highly Cited
2007
Highly Cited
2007
Nymble: Anonymous IP-Address Blocking
Peter C. Johnson
,
Apu Kapadia
,
Patrick P. Tsang
,
Sean W. Smith
International Symposium on Privacy Enhancing…
2007
Corpus ID: 2662010
Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client's…
Expand
Highly Cited
2007
Highly Cited
2007
The copy theory of movement: A view from PF
Ž. Bošković
,
Jairo Nunes
2007
Corpus ID: 19424838
ly, we have the same pattern in both Greek and English. Both languages disallow a particular verbal form to co-occur with…
Expand
2005
2005
An Approach for the Verification of SystemC Designs Using AsmL
A. Habibi
,
S. Tahar
Automated Technology for Verification and…
2005
Corpus ID: 19481429
The spectacular advancement in microelectronics resulted in the creation of new system level design languages, such as SystemC…
Expand
Highly Cited
2002
Highly Cited
2002
Convertibility verification and converter synthesis: two faces of the same coin [IP block interfaces]
R. Passerone
,
L. D. Alfaro
,
T. Henzinger
,
A. Sangiovanni-Vincentelli
IEEE/ACM International Conference on Computer…
2002
Corpus ID: 1337608
An essential problem in component-based design is how to compose components designed in isolation. Several approaches have been…
Expand
Highly Cited
2001
Highly Cited
2001
Intellectual property strategy in Japanese and UK companies: patent licensing decisions and learning opportunities
Robert H. Pitkethly
2001
Corpus ID: 18968772
Highly Cited
1999
Highly Cited
1999
Does the stock market predict real activity? Time series evidence from the G-7 countries
J. Choi
,
Shmuel Hauser
,
Kenneth J. Kopecky
1999
Corpus ID: 53571662
Highly Cited
1995
Highly Cited
1995
Congestion control in IP/TCP internetworks
Jack Nagle
CCRV
1995
Corpus ID: 29808938
Congestion control is a recognized problem in complex networks. We have discovered that the Department of Defense's Internet…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE