Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,058,995 papers from all fields of science
Search
Sign In
Create Free Account
Whitelist
Known as:
White list
, Whitelisting
, Whtelist
A whitelist is a list or register of entities that are being provided a particular privilege, service, mobility, access or recognition. Entities on…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
Amazon Kindle
Anti-spam techniques
Blacklist (computing)
Bogofilter
Expand
Broader (3)
Antivirus software
Computer security
Malware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Gradually Improving the Forensic Process
S. Neuner
,
M. Mulazzani
,
S. Schrittwieser
,
E. Weippl
ARES
2015
Corpus ID: 15793580
At the time of writing, one of the most pressing problems for forensic investigators is the huge amount of data to analyze per…
Expand
2015
2015
A Model for Automatically Detecting and Blocking Pornographic Websites
Thuy Dinh
,
T.‐B. Ngo
,
Duc-Lung Vu
International Conference on Knowledge and Systems…
2015
Corpus ID: 27474197
Preventing juveniles from accessing pornographic web pages remains a problem in Vietnam. The existing tools have failed to block…
Expand
2014
2014
Cyber threats and defence approaches in SCADA systems
Dong-ho Kang
,
Byoung-Koo Kim
,
Jungchan Na
International Conference on Advanced…
2014
Corpus ID: 41755913
The use of SCADA systems has been increased since the 1960s as a need arose to more efficiently monitor and control the status of…
Expand
2013
2013
Wirebrush4SPAM: a novel framework for improving efficiency on spam filtering services
Noemí Pérez-Díaz
,
David Ruano-Ordás
,
F. F. Riverola
,
J. R. Méndez
Software, Practice & Experience
2013
Corpus ID: 8707903
This paper introduces Wirebrush4SPAM, a plug‐in‐based C framework specifically designed for the development of fast spam filters…
Expand
2013
2013
Improving the methods of email classification based on words ontology
Foruzan Kiamarzpour
,
R. Dianat
,
M. Bahrani
,
M. Sadeghzadeh
arXiv.org
2013
Corpus ID: 5723035
The Internet has dramatically changed the relationship among people and their relationships with others people and made the…
Expand
2012
2012
Detection of SMS spam messages on mobile phones
A. Uysal
,
Serkan Günal
,
S. Ergin
,
E. S. Gunal
Signal Processing and Communications Applications…
2012
Corpus ID: 15507521
In this study, a novel “SMS spam message filter” utilizing effective feature selection and pattern classification techniques is…
Expand
2012
2012
Deconstructing Flame: the limitations of traditional defences
K. Munro
2012
Corpus ID: 62537168
2010
2010
A whitelist approach to protect SIP servers from flooding attacks
E. Chen
,
M. Itoh
IEEE International Workshop Technical Committee…
2010
Corpus ID: 9102402
As SIP-based VoIP services are expected to slowly replace the traditional PSTN services, SIP servers are becoming potential…
Expand
2008
2008
Filtering Short Message Spam of Group Sending Using CAPTCHA
Peizhou He
,
Yong Sun
,
Wei Zheng
,
X. Wen
Workshop on Knowledge Discovery and Data Mining
2008
Corpus ID: 11314607
Short message spam brings so much trouble to the users, and the volume of short message spam becomes more and more large…
Expand
2002
2002
Technical Solutions for Controlling Spam
Shane Hird
2002
Corpus ID: 17882414
As the commercialisation of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE