Academic literature on the topic 'Whitelist'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Whitelist.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Whitelist"
Kim, DaeYoub, and Jihoon Lee. "Blacklist vs. Whitelist-Based Ransomware Solutions." IEEE Consumer Electronics Magazine 9, no. 3 (May 1, 2020): 22–28. http://dx.doi.org/10.1109/mce.2019.2956192.
Full textชัยกังวาฬ, กรวิชญ์, ณัฐพัชร์ วัฒนชาญสิทธิ์, สุรศักดิ์ สงวนพงษ์, พีรวัฒน์ วัฒนพงศ์, and พิรุณ ศรีสว่าง. "การตรวจสอบอุปกรณ์ที่ติดบอตเน็ตโดยวิเคราะห์ข้อมูลจราจรดีเอ็นเอส." วารสารงานวิจัยและพัฒนาเชิงประยุกต์ โดยสมาคม ECTI 1, no. 2 (August 29, 2021): 36–43. http://dx.doi.org/10.37936/ectiard.2021-1-2.244240.
Full textTakaki, Osamu, Ichiro Suzuta, Kota Torikai, Yuichiro Saito, Tsuyoshi Kato, Tetsuya Sato, Hiroki Endo, and Yoshifumi Atarashi. "Evaluation of a Network Switch with Whitelist-Based Packet Monitoring and Control in Hospital Networks." Advanced Engineering Forum 38 (November 2020): 222–32. http://dx.doi.org/10.4028/www.scientific.net/aef.38.222.
Full textAzeez, Nureni Ayofe, Sanjay Misra, Ihotu Agbo Margaret, Luis Fernandez-Sanz, and Shafi'i Muhammad Abdulhamid. "Adopting automated whitelist approach for detecting phishing attacks." Computers & Security 108 (September 2021): 102328. http://dx.doi.org/10.1016/j.cose.2021.102328.
Full textYoo, Hyunguk, Jeong-Han Yun, and Taeshik Shon. "Whitelist-Based Anomaly Detection for Industrial Control System Security." Journal of Korean Institute of Communications and Information Sciences 38B, no. 8 (August 30, 2013): 641–53. http://dx.doi.org/10.7840/kics.2013.38b.8.641.
Full textPratama, Januar Ariq. "Implementation of Network Security with the Whitelist Method on the Server of the Department of Electrical Engineering at State Polytechnic of Malang." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 8, no. 1 (March 1, 2019): 56–61. http://dx.doi.org/10.33795/jartel.v8i1.166.
Full textKim, Chang-Hong, Jeong-Hyun Yi, and Jong-Bae Kim. "The Endpoint Application Execution Control Scheme based on the Whitelist." International Journal of Control and Automation 8, no. 4 (April 30, 2015): 83–88. http://dx.doi.org/10.14257/ijca.2015.8.4.10.
Full textFUJITA, Shintaro, Kenji SAWADA, Seiichi SHIN, and Shu HOSOKAWA. "On Auto-generation Method of Whitelist for PLC Operation Sequence." Transactions of the Society of Instrument and Control Engineers 57, no. 8 (2021): 367–77. http://dx.doi.org/10.9746/sicetr.57.367.
Full textTang, Yi, Zhao Kai Luo, and Ji Zhang. "UOFilter: A Whitelist-Based Filter for Unintended Objects in Web Pages." Applied Mechanics and Materials 519-520 (February 2014): 373–76. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.373.
Full textBisaccio, Michael. "Cabells’ Journal Whitelist and Blacklist: Intelligent data for informed journal evaluations." Learned Publishing 31, no. 3 (April 19, 2018): 243–48. http://dx.doi.org/10.1002/leap.1164.
Full textDissertations / Theses on the topic "Whitelist"
Соколов, Руслан Миколайович. "Поліпшення захисту веб-застосунків впровадженням моделі білого списоку при розробці." Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2019. https://ela.kpi.ua/handle/123456789/31341.
Full textThe work contains 46 pages, 9 figures, 9 tables, 13 references, 1 attachment. The aim of this qualification work is to design method concept for secure web application development based on whitelist model. The subject of the study is improving security and controlling web-application security implementation. Scientific novelty is the fact that for the first time whitelist model was used as methodic for secure web-application development. The results of the work are presented by secure development methodic which was successfully used and demonstrate security features of whitelist model implementation during development stage. The results of the work can be used as additional module during designing completed secure web apps development methodology for improving and controlling web-application security implementation.
Chuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.
Full textSamuel, Justin Clayton. "IMPROVING CROSS-SITE REQUEST PRIVACY AND SECURITY: CLIENT-SIDE CROSS-SITE REQUEST WHITELISTS." Thesis, The University of Arizona, 2009. http://hdl.handle.net/10150/192976.
Full textGeib, David C. "Multiplexing of Extrinsic Fabry-Perot Optical Fiber Sensors for Strain Measurements." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/34354.
Full textMaster of Science
Schmidt, Christian. "Fake Science und was Bibliotheken dagegen tun können." Berufsverband Information Bibliothek, 2019. https://monarch.qucosa.de/id/qucosa%3A38365.
Full text»Fake science« is one of many names for bogus or manipulated science. Like other terms that use the attribute »fake«, it has recently been subject to misinterpretation. For example, the broad media coverage of the year 2018 on dubious journal publishers generously adopted the »fake science« term for the phenomenon known as »predatory publishing«, which is, however, a very different problem. This rhetorical appropriation contributes to terminological imprecision, distracts from the core of the problem and makes the term vulnerable to political usurpation. Academic libraries have the competence not only to do something about the phenomena addressed in the academic publication system itself, but also to remove such terminological smoke candles.
von, Wenckstern Michael. "Web applications using the Google Web Toolkit." Master's thesis, Technische Universitaet Bergakademie Freiberg Universitaetsbibliothek "Georgius Agricola", 2013. http://nbn-resolving.de/urn:nbn:de:bsz:105-qucosa-115009.
Full textDiese Diplomarbeit beschreibt die Erzeugung desktopähnlicher Anwendungen mit dem Google Web Toolkit und die Umwandlung klassischer Java-Programme in diese. Das Google Web Toolkit ist eine Open-Source-Entwicklungsumgebung, die Java-Code in browserunabhängiges als auch in geräteübergreifendes HTML und JavaScript übersetzt. Vorgestellt wird der Großteil des GWT Frameworks inklusive des Java zu JavaScript-Compilers sowie wichtige Sicherheitsaspekte von Internetseiten. Um zu zeigen, dass auch komplizierte graphische Oberflächen mit dem Google Web Toolkit erzeugt werden können, wird das bekannte Brettspiel Agricola mittels Model-View-Presenter Designmuster implementiert. Zur Ermittlung der richtigen Technologie für das nächste Webprojekt findet ein Vergleich zwischen dem Google Web Toolkit und JavaServer Faces statt
徐宇松. "A Client-side Oriented Whitelist Policy Against Cross-site Scripting Attack and Phishing Attack." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/53757864958987393859.
Full textLi, Kuan-Cheng, and 李冠錚. "Access Control and Automatic Decryption for Encrypted E-Mail Attachments based on Whitelist Policy." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/4xexwk.
Full text國立中央大學
軟體工程研究所
106
Currently, sending emails via the internet is the most popular method all over the world. To protect internal documents, most enterprises would deploy relevant Document Management and Protection systems. However, this in turn, creates a problem and an inconvenience for other external users as they are unable to open the emails with the protected files directly. In this thesis, our system architecture will enable the existing mail system to perform access control and automatic decryption on attachments based on multi-level whitelist rules in a way that becomes one of the MTA mail relay nodes of SMTP. For an email that has multiple recipients at the same time, it is possible to individually detect the recipient and ensure the corresponding access control and automatic decryption of the attachments are consistent with the recipient list.
Chang, Ping-Hui, and 張平煇. "Studies on Transdermal Permeation of Whitelight Ingredients in Cosmetics." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/95964933301044103507.
Full text嘉南藥理科技大學
生物科技系暨研究所
93
Abstract Background and Purpose : The transdermal permeation subject has been studied in pharmaceutical field for years to assess transport of drug molecule. Nevertheless , there is no systematic research on the permeation of whitelight ingredients through skin in the field of cosmetic science. The purpose of this study is to evaluate transdermal permeation of whitelight ingredients which are often used in cosmetics and to investigate the factors which affect the permeation of whitelight ingredients. This basic study can be helpful to reveal the transdermal properties of whitelight ingredients ; the obtained information can also be utilized to design cosmetic formulations. Methods : Permeation studies of whitelight ingredients across nude mice skin was conducted using side-by-side diffusion cell at 37℃. High performance liquid chromatographic methods were developed for determination of ?Arbutin as well as Sodium ascorbyl phosphate. A reverse phase column was used as the stationary phase , whereas mixture of 0.05MKH2PO4 buffer solution (pH 3.5) and methanol (90:10,v/v) was used as mobile phase of ?Arbutin. The mobile phase of Sodium ascorbyl phosphate was 0.005MKH2PO4 buffer solution (pH 3). The UV detector was set at 280 nm for ?Arbutin and at 240 nm for Sodium ascorbyl phosphate. Results & Conclusions : The results showed that the ?Arbutin and Sodium ascorbyl phosphate did not permeate through model skin effectively. After removal of stratum corneum (SC) , significant improvement of the permeability of ?Arbutin and Sodium ascorbyl phosphate were observed. The results indicated that SC is the major barrier for the permeation process. The studies of ?Arbutin and Sodium ascorbyl phosphate permeated through skin from various formulations provide further evidence for the proposed mechanism. The information can be utilized for designing optimum formulations for the whitelight ingredients. Keywords: transdermal ;whitelight ingredient ;stratum corneum (SC) ; ?Arbutin ; Sodium ascorbyl phosphate
Lin, Huan-Ting, and 林煥庭. "Study on the angular CCT uniformity in whitelight-emitting diodes with packaging technology." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/66350391073997133098.
Full text國立中興大學
精密工程學系所
102
In this thesis, the thin-film flip-chip (TFFC) GaN light-emitting diodes (LEDs)have been fabricated by combination of laser lift-off (LLO) and surface roughening process. Two kinds of white LED methods were prepared in this study. First one is the phosphor plate pasted on the surfaces of sapphire-based flip-chip LEDs (FC-LEDs) and TFFC-LEDs, respectively. The other one is the phosphor slurry sprayed onto the TFFC-LEDs with different packaging by conformal distribution method to realize white light. Typical I–V characteristics of the FC-LEDs and TFFC-LEDs are nearly the same. The reverse leakage currents of all LEDs are all below -1 μA at -5 V. The TFFC white LED and conventional FC white LED with ceramic phosphor plate have exhibited the small angular color correlated temperature (CCT) deviation between -70° to +70° were 72 K and 175 K with the CCT near 3867 K and 5471 K. Additionally, the white LED samples with different packaging of TFFC on lead frame (TFFC-Cup) and TFFC on Cu substrate (TFFC-Cu-sub) were fabricated by conformal distribution method. For the average CCT 4300 K from -70° to +70°, the angular CCT deviation of the TFFC-Cup and the TFFC-Cu-sub were 111 and 77 K,respectively. As the average CCT was around 5000 K, the TFFC-Cup and the TFFC-Cu-sub were 783 and 523 K, respectively. It indicates that the TFFC white LED exhibit high performance in angular CCT deviation and keep the good quality of epitaxial layer after LLO. It shows that the same phosphor thickness on the surface of LED and the lead frame with low altitude reflector can fabricate a high uniformity color distribution device.
Books on the topic "Whitelist"
City whitelight: A novel. Edinburgh: Mainstream, 1986.
Find full textStillwell, Robert M. Whiteline Lessons. AuthorHouse, 2006.
Find full textCity whitelight. Fontana, 1988.
Find full textMacKenzie, John. City Whitelight (Fontana). HarperCollins Publishers Ltd, 1988.
Find full textCarter, J. Scott, Cameron D. Lippard, David G. Embrick, and Eduardo Bonilla-Silva. Protecting Whiteness: Whitelash and the Rejection of Racial Equality. University of Washington Press, 2020.
Find full textCarter, J. Scott, Cameron D. Lippard, David G. Embrick, and Eduardo Bonilla-Silva. Protecting Whiteness: Whitelash and the Rejection of Racial Equality. University of Washington Press, 2020.
Find full textSmith, Terry. Whitelash: Unmasking White Grievance in the Age of Trump. University of Cambridge ESOL Examinations, 2020.
Find full textBook chapters on the topic "Whitelist"
Kang, Dong-Ho, Byoung-Koo Kim, Jung-Chan Na, and Kyoung-Sun Jhang. "Whitelist Generation Technique for Industrial Firewall in SCADA Networks." In Lecture Notes in Electrical Engineering, 525–34. Dordrecht: Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-8798-7_63.
Full textInoue, Keisuke, Toshiki Honda, Kohei Mukaiyama, Tetsushi Ohki, and Masakatsu Nishigaki. "Automatic Examination-Based Whitelist Generation for XSS Attack Detection." In Lecture Notes on Data Engineering and Communications Technologies, 326–38. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02613-4_29.
Full textJang, Uijin, Changjin Suh, and Hyungmin Lim. "A Study on the Efficient Management of Android Apps Using a Whitelist." In Lecture Notes in Electrical Engineering, 473–82. Dordrecht: Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-8798-7_58.
Full textCho, Michael Cheng Yi, Yuan-Hsiang Su, Hsiu-Chuan Huang, and Yu-Lung Tsai. "Top of the Pops: A Novel Whitelist Generation Scheme for Data Exfiltration Detection." In Lecture Notes in Networks and Systems, 65–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80126-7_6.
Full textKuehl, Niklas, and Marc Goutier. "Needmining: Evaluating a Whitelist-Based Assignment Method to Quantify Customer Needs from Micro Blog Data." In Operations Research Proceedings 2016, 165–70. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55702-1_23.
Full textKobayashi, Nobuhiro, Koichi Shimizu, Tsunato Nakai, Teruyoshi Yamaguchi, and Masakatsu Nishigaki. "Intrusion Detection Method Using Enhanced Whitelist Based on Cooperation of System Development, System Deployment, and Device Development Domains in CPS." In Advances in Network-Based Information Systems, 430–44. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98530-5_36.
Full textChoi, Seungoh, Yeop Chang, Jeong-Han Yun, and Woonyon Kim. "Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks." In IFIP Advances in Information and Communication Technology, 87–102. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26567-4_6.
Full textWittmann, Emanuel, Maximilian Bradler, and Eberhard Riedle. "Direct Generation of 7 fs Whitelight Pulses from Bulk Sapphire." In Springer Proceedings in Physics, 725–28. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13242-6_178.
Full textNwankwo, Iheanyi Samuel. "The “Whitelist” and its Value during a Data Protection Impact Assessment." In Turning Point in Data Protection Law, 141–44. Nomos Verlagsgesellschaft mbH & Co. KG, 2020. http://dx.doi.org/10.5771/9783748921561-141.
Full text"The Long Night of Déjà Vu." In Whitelash, 1–6. Cambridge University Press, 2020. http://dx.doi.org/10.1017/9781108698412.002.
Full textConference papers on the topic "Whitelist"
Kim, Kyoungmin, Jeonghwan Lee, Seonguk Lee, and Jiman Hong. "Whitelist for Analyzing Android Malware." In RACS '17: International Conference on Research in Adaptive and Convergent Systems. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3129676.3129726.
Full textKim, Tae-Hyung, Young-Sik Choi, Jong Kim, and Sung Je Hong. "Annulling SYN Flooding Attacks with Whitelist." In 2008 22nd International Conference on Advanced Information Networking and Applications (AINA 2008). IEEE, 2008. http://dx.doi.org/10.1109/waina.2008.218.
Full textZhao, Shuai, Achir Kalra, Chong Wang, Cristian Borcea, and Yi Chen. "Ad Blocking Whitelist Prediction for Online Publishers." In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9006402.
Full textPowers, Josh, Rhett Smith, Zafer Korkmaz, and Husam Ahmed. "Whitelist malware defense for embedded control system devices." In 2015 Saudi Arabia Smart Grid (SASG). IEEE, 2015. http://dx.doi.org/10.1109/sasg.2015.7449271.
Full textBelabed, A., E. Aimeur, and A. Chikh. "A Personalized Whitelist Approach for Phishing Webpage Detection." In 2012 Seventh International Conference on Availability, Reliability and Security (ARES). IEEE, 2012. http://dx.doi.org/10.1109/ares.2012.54.
Full textWibowo, Fahrudin Mukti, Muhammad Fajar Sidiq, Imadudin Alif Akbar, Akbari Indra Basuki, and Didi Rosiyadi. "Collaborative Whitelist Packet Filtering Driven by Smart Contract Forum." In 2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI). IEEE, 2019. http://dx.doi.org/10.1109/isriti48646.2019.9034654.
Full textJung, Woo-Suk, Jeong-Han Yun, Sin-Kyu Kim, Kyu-Seok Shim, and Myung-Sup Kim. "Structured whitelist generation in SCADA network using PrefixSpan algorithm." In 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2017. http://dx.doi.org/10.1109/apnoms.2017.8094163.
Full textChoi, Jeongwoo, Yongmin Kim, Jinwoo Lee, and Jiman Hong. "Dynamic code whitelist for efficient analysis of Android code." In RACS '18: International Conference on Research in Adaptive and Convergent Systems. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3264746.3264812.
Full textPeng, Dan, Guiran Chang, Rui Guo, and Yanjun Tang. "Research on DDoS Filtering Algorithm Based on Bloom Filter WhiteList." In 2008 International Conference on MultiMedia and Information Technology (MMIT). IEEE, 2008. http://dx.doi.org/10.1109/mmit.2008.105.
Full textNomura, Komei, Kenji Rikitake, and Ryosuke Matsumoto. "Automatic Whitelist Generation for SQL Queries Using Web Application Tests." In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2019. http://dx.doi.org/10.1109/compsac.2019.10250.
Full text