Whitelist

Known as: White list, Whitelisting, Whtelist 
A whitelist is a list or register of entities that are being provided a particular privilege, service, mobility, access or recognition. Entities on… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Nowadays, web applications are becoming one of the standard platforms for representing data and service releases over the World… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2015
2015
Malware protection is a necessity for any electric device in modern critical infrastructure. We must all protect our critical… (More)
  • figure 1
  • figure 2
Is this relevant?
2013
2013
Supervisory Control And Data Acquisition (SCADA) networks are commonly deployed to aid the operation of large industrial… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2012
2012
The number of phishing attacks against web services has seen a steady increase causing, for example, a negative effect on the… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
2011
2011
With the nature of SIP with a text-based message format and its openness to the public Internet, it is exposed to a number of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
As SIP-based VoIP services are expected to slowly replace the traditional PSTN services, SIP servers are becoming potential… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Although extensive studies have been conducted on online social networks (OSNs), it is not clear how to characterize information… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2008
2008
SYN flooding is one of classical denial of service (DoS) attacks abusing the TCP 3-way handshake process. This attack causes a… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2008
2008
With the DDoS (distributed denial of service) traffic which was implemented using depleted bandwidth is filtered by routers in… (More)
  • table I
  • figure 2
  • figure 1
  • figure 3
  • table II
Is this relevant?
2006
2006
The United States regulates deliberate species introduction by blacklists: any species not blacklisted may be imported. Half of… (More)
Is this relevant?