Academic literature on the topic 'Whitelist'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Whitelist.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Whitelist"

1

Kim, DaeYoub, and Jihoon Lee. "Blacklist vs. Whitelist-Based Ransomware Solutions." IEEE Consumer Electronics Magazine 9, no. 3 (May 1, 2020): 22–28. http://dx.doi.org/10.1109/mce.2019.2956192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

ชัยกังวาฬ, กรวิชญ์, ณัฐพัชร์ วัฒนชาญสิทธิ์, สุรศักดิ์ สงวนพงษ์, พีรวัฒน์ วัฒนพงศ์, and พิรุณ ศรีสว่าง. "การตรวจสอบอุปกรณ์ที่ติดบอตเน็ตโดยวิเคราะห์ข้อมูลจราจรดีเอ็นเอส." วารสารงานวิจัยและพัฒนาเชิงประยุกต์ โดยสมาคม ECTI 1, no. 2 (August 29, 2021): 36–43. http://dx.doi.org/10.37936/ectiard.2021-1-2.244240.

Full text
Abstract:
บอตเน็ตเป็นหนึ่งในภัยคุกคามในอินเทอร์เน็ตที่ผู้ไม่ประสงค์ดีสร้างขึ้นเพื่อใช้ก่ออาชญากรรมไซเบอร์ เช่น การทำให้ระบบปฏิเสธบริการ (DoS) การขโมยข้อมูลสำคัญและการกระจายสแปม เป็นต้น เนื่องจากบอตเน็ตมีพัฒนาการอย่างต่อเนื่องและตรวจจับได้ยาก จากเทคนิคการซ่อนเซิร์ฟเวอร์สั่งการและควบคุม โดยบอตต้องอาศัยดีเอ็นเอสในการค้นหาไอพีแอดเดรสของเซิร์ฟเวอร์สั่งการและควบคุม งานวิจัยฉบับนี้นำเสนอวิธีการค้นหาอุปกรณ์ในระบบที่ติดบอตเน็ตโดยใช้ข้อมูลการติดต่อสื่อสารระหว่างอุปกรณ์กับระบบดีเอ็นเอส เพื่อจำแนกประเภทของชื่อโดเมนที่สร้างจากขั้นตอนวิธีการสร้างโดเมนแบบสุ่ม (DGAs) ที่ใช้ซ่อนเซิร์ฟเวอร์สั่งการและควบคุมกับชื่อโดเมนที่มนุษย์เป็นผู้สร้างโดยอาศัยเทคนิคบัญชีขาว (Whitelist) ร่วมกับหลักประมวลผลภาษาธรรมชาติ
APA, Harvard, Vancouver, ISO, and other styles
3

Takaki, Osamu, Ichiro Suzuta, Kota Torikai, Yuichiro Saito, Tsuyoshi Kato, Tetsuya Sato, Hiroki Endo, and Yoshifumi Atarashi. "Evaluation of a Network Switch with Whitelist-Based Packet Monitoring and Control in Hospital Networks." Advanced Engineering Forum 38 (November 2020): 222–32. http://dx.doi.org/10.4028/www.scientific.net/aef.38.222.

Full text
Abstract:
A "whitelist network switch (WLS)", which can monitor and filter packets based on a whitelist, is particularly effective for stronger information security in closed network environments, such as in factories. This paper focuses on the base network environment for a nurse call system within a large hospital. This network environment is of particular importance to security, and the types of network protocols used are limited. We note important points regarding the practical operation and effectiveness of WLS through two approaches: (i) test introduction into an existing, actual hospital network system; (ii) test introduction in an experimental nurse call system environment.
APA, Harvard, Vancouver, ISO, and other styles
4

Azeez, Nureni Ayofe, Sanjay Misra, Ihotu Agbo Margaret, Luis Fernandez-Sanz, and Shafi'i Muhammad Abdulhamid. "Adopting automated whitelist approach for detecting phishing attacks." Computers & Security 108 (September 2021): 102328. http://dx.doi.org/10.1016/j.cose.2021.102328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yoo, Hyunguk, Jeong-Han Yun, and Taeshik Shon. "Whitelist-Based Anomaly Detection for Industrial Control System Security." Journal of Korean Institute of Communications and Information Sciences 38B, no. 8 (August 30, 2013): 641–53. http://dx.doi.org/10.7840/kics.2013.38b.8.641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pratama, Januar Ariq. "Implementation of Network Security with the Whitelist Method on the Server of the Department of Electrical Engineering at State Polytechnic of Malang." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 8, no. 1 (March 1, 2019): 56–61. http://dx.doi.org/10.33795/jartel.v8i1.166.

Full text
Abstract:
State Polytechnic of Malang is an educational institution based on technique where the database is needed here, the database itself is important data that must be stored and cannot be seen by others. Database security must be developed and prioritized so that no one breaks into important data on the server. This whitelist method utilizes a port that can block port access to outside networks that are vulnerable to criminal acts, this method uses ssh as a medium to manage control of an ip address. The ip address will be added a port behind it. Use IP block with Linux OS and tested via the web and laptop using a local access point. The test results show that the quality used for security is whitelist, where this method is used for the IP security used. IP block and unblock process can be done well. The process of adding and deleting ports can be done well. So that in general, the whole system is running well and easy access.
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Chang-Hong, Jeong-Hyun Yi, and Jong-Bae Kim. "The Endpoint Application Execution Control Scheme based on the Whitelist." International Journal of Control and Automation 8, no. 4 (April 30, 2015): 83–88. http://dx.doi.org/10.14257/ijca.2015.8.4.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

FUJITA, Shintaro, Kenji SAWADA, Seiichi SHIN, and Shu HOSOKAWA. "On Auto-generation Method of Whitelist for PLC Operation Sequence." Transactions of the Society of Instrument and Control Engineers 57, no. 8 (2021): 367–77. http://dx.doi.org/10.9746/sicetr.57.367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tang, Yi, Zhao Kai Luo, and Ji Zhang. "UOFilter: A Whitelist-Based Filter for Unintended Objects in Web Pages." Applied Mechanics and Materials 519-520 (February 2014): 373–76. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.373.

Full text
Abstract:
A web page often contains objects that the hosted web server intends a browser to render. Rendering those objects can instruct network requests to foreign origins. Although the same origin policy (SOP) limits the access for foreign objects, web attackers could circumvent the SOP controls through injected unintended objects for sensitive data smuggling. In this paper, we propose UOFilter, a whitelist-based method to filter out unintended objects in web pages. We define a list item structure to describe intended objects with optional integrity guarantees. The UOFilter in a web browser interprets the items and blocks the network requests issued by those unintended objects. We implement a proof of concept UOFilter prototype as a chrome browser extension and validate it with experiments.
APA, Harvard, Vancouver, ISO, and other styles
10

Bisaccio, Michael. "Cabells’ Journal Whitelist and Blacklist: Intelligent data for informed journal evaluations." Learned Publishing 31, no. 3 (April 19, 2018): 243–48. http://dx.doi.org/10.1002/leap.1164.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Whitelist"

1

Соколов, Руслан Миколайович. "Поліпшення захисту веб-застосунків впровадженням моделі білого списоку при розробці." Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2019. https://ela.kpi.ua/handle/123456789/31341.

Full text
Abstract:
Робота обсягом 46 сторінок містить 9 рисунків, 9 таблиць та 13 літературних посилань, 1 додаток. Метою даної кваліфікаційної роботи є проектування та створення прототипу методики розробки захищених веб-застосунків на основі моделі білого списку. Об’єктом дослідження є сучасні методи розробки захищених безпечних веб-застосунків Предметом дослідження є поліпшення захисту і контроль за впровадженням механізмів захисту веб-застосунків. Наукова новизна полягає в тому, що вперше було застосовано модель білого списку як методику розробки захищених веб-застосунків. Результати роботи представлені методикою розробки захищених веб-застосунків, яка була успішно застосована і демонструє особливості безпеки впровадження моделі білого списку під час розробки. Результати роботи можуть бути використані як додатковий модуль при проектуванні повноцінних методик розробки захищених застосунків для удосконалення механізмів захисту і контролем за їх працездатністю.
The work contains 46 pages, 9 figures, 9 tables, 13 references, 1 attachment. The aim of this qualification work is to design method concept for secure web application development based on whitelist model. The subject of the study is improving security and controlling web-application security implementation. Scientific novelty is the fact that for the first time whitelist model was used as methodic for secure web-application development. The results of the work are presented by secure development methodic which was successfully used and demonstrate security features of whitelist model implementation during development stage. The results of the work can be used as additional module during designing completed secure web apps development methodology for improving and controlling web-application security implementation.
APA, Harvard, Vancouver, ISO, and other styles
2

Chuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.

Full text
Abstract:
Whitelisting IP addresses and hostnames allow organizations to employ a default-deny approach to network traffic. Organizations employing a default-deny approach can stop many malicious threats, even including zero-day attacks, because it only allows explicitly stated legitimate activities. However, creating a comprehensive whitelist for a default-deny approach is difficult due to user-supplied destinations that can only be known at the time of usage. Whitelists, therefore, interfere with user experience by denying network traffic to user-supplied legitimate destinations. In this thesis, we focus on creating dynamic whitelists that are capable of allowing user-supplied network activity. We designed and built a system called Harbinger, which leverages user interface activity to provide contextual information in which network activity took place. We built Harbinger for Microsoft Windows operating systems and have tested its usability and effectiveness on four popular Microsoft applications. We find that Harbinger can reduce false positives-positive detection rates from 44%-54% to 0%-0.4% in IP and DNS whitelists. Furthermore, while traditional whitelists failed to detect propagation attacks, Harbinger detected the same attacks 96% of the time. We find that our system only introduced six milliseconds of delay or less for 96% of network activity.
APA, Harvard, Vancouver, ISO, and other styles
3

Samuel, Justin Clayton. "IMPROVING CROSS-SITE REQUEST PRIVACY AND SECURITY: CLIENT-SIDE CROSS-SITE REQUEST WHITELISTS." Thesis, The University of Arizona, 2009. http://hdl.handle.net/10150/192976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Geib, David C. "Multiplexing of Extrinsic Fabry-Perot Optical Fiber Sensors for Strain Measurements." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/34354.

Full text
Abstract:
Elevators are a necessary component of the modern urban and suburban life. The guide rails the car and counterweight move on are the most sensitive parts when it comes to de-habilitating damage that can be caused by an earthquake. Conventional sensors are becoming obsolete in sensing for today's multistory buildings because they don't monitor the structural health of the guide rails. This sensing task falls into the fiber sensing niche market because of a fiber sensor's ability to be multiplexed. Previous work by Taplin and Jackson showed demodulation of the interference spectrum of two Fabry-Perot cavities using Fourier analysis. The goal of this research is to use Fourier analysis to demodulate the spectrum of four multiplexed extrinsic Fabry-Perot fiber interferometers for strain measurements. Comparisons of fiber, foil, and theoretical strains are made. Also, experiments showing the system's air-gap stability and crosstalk are provided.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
5

Schmidt, Christian. "Fake Science und was Bibliotheken dagegen tun können." Berufsverband Information Bibliothek, 2019. https://monarch.qucosa.de/id/qucosa%3A38365.

Full text
Abstract:
»Fake Science« ist eine von vielen Bezeichnungen für gefälschte oder manipulierte Wissenschaft. Wie andere Begriffe, die auf das Attribut »Fake« zurückgreifen, ist auch dieser jüngst von Umdeutungen betroffen. So machte sich die breit inszenierte Medienberichterstattung des Jahres 2018 zu unseriösen Zeitschriftenverlagen den Fake-Science-Begriff für das Phänomen »Predatory Publishing« großzügig zu eigen. Diese rhetorische Aneignung trägt zu sprachlicher Unschärfe bei, lenkt vom Kern des Problems ab und macht den Begriff für seine politische Vereinnahmung anfällig. In Bibliotheken sind die Kompetenzen vorhanden, sowohl gegen die angesprochenen Phänomene im wissenschaftlichen Publikationssystem selbst etwas zu tun als auch solche terminologischen Nebelkerzen zu löschen.
»Fake science« is one of many names for bogus or manipulated science. Like other terms that use the attribute »fake«, it has recently been subject to misinterpretation. For example, the broad media coverage of the year 2018 on dubious journal publishers generously adopted the »fake science« term for the phenomenon known as »predatory publishing«, which is, however, a very different problem. This rhetorical appropriation contributes to terminological imprecision, distracts from the core of the problem and makes the term vulnerable to political usurpation. Academic libraries have the competence not only to do something about the phenomena addressed in the academic publication system itself, but also to remove such terminological smoke candles.
APA, Harvard, Vancouver, ISO, and other styles
6

von, Wenckstern Michael. "Web applications using the Google Web Toolkit." Master's thesis, Technische Universitaet Bergakademie Freiberg Universitaetsbibliothek "Georgius Agricola", 2013. http://nbn-resolving.de/urn:nbn:de:bsz:105-qucosa-115009.

Full text
Abstract:
This diploma thesis describes how to create or convert traditional Java programs to desktop-like rich internet applications with the Google Web Toolkit. The Google Web Toolkit is an open source development environment, which translates Java code to browser and device independent HTML and JavaScript. Most of the GWT framework parts, including the Java to JavaScript compiler as well as important security issues of websites will be introduced. The famous Agricola board game will be implemented in the Model-View-Presenter pattern to show that complex user interfaces can be created with the Google Web Toolkit. The Google Web Toolkit framework will be compared with the JavaServer Faces one to find out which toolkit is the right one for the next web project
Diese Diplomarbeit beschreibt die Erzeugung desktopähnlicher Anwendungen mit dem Google Web Toolkit und die Umwandlung klassischer Java-Programme in diese. Das Google Web Toolkit ist eine Open-Source-Entwicklungsumgebung, die Java-Code in browserunabhängiges als auch in geräteübergreifendes HTML und JavaScript übersetzt. Vorgestellt wird der Großteil des GWT Frameworks inklusive des Java zu JavaScript-Compilers sowie wichtige Sicherheitsaspekte von Internetseiten. Um zu zeigen, dass auch komplizierte graphische Oberflächen mit dem Google Web Toolkit erzeugt werden können, wird das bekannte Brettspiel Agricola mittels Model-View-Presenter Designmuster implementiert. Zur Ermittlung der richtigen Technologie für das nächste Webprojekt findet ein Vergleich zwischen dem Google Web Toolkit und JavaServer Faces statt
APA, Harvard, Vancouver, ISO, and other styles
7

徐宇松. "A Client-side Oriented Whitelist Policy Against Cross-site Scripting Attack and Phishing Attack." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/53757864958987393859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Kuan-Cheng, and 李冠錚. "Access Control and Automatic Decryption for Encrypted E-Mail Attachments based on Whitelist Policy." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/4xexwk.

Full text
Abstract:
碩士
國立中央大學
軟體工程研究所
106
Currently, sending emails via the internet is the most popular method all over the world. To protect internal documents, most enterprises would deploy relevant Document Management and Protection systems. However, this in turn, creates a problem and an inconvenience for other external users as they are unable to open the emails with the protected files directly. In this thesis, our system architecture will enable the existing mail system to perform access control and automatic decryption on attachments based on multi-level whitelist rules in a way that becomes one of the MTA mail relay nodes of SMTP. For an email that has multiple recipients at the same time, it is possible to individually detect the recipient and ensure the corresponding access control and automatic decryption of the attachments are consistent with the recipient list.
APA, Harvard, Vancouver, ISO, and other styles
9

Chang, Ping-Hui, and 張平煇. "Studies on Transdermal Permeation of Whitelight Ingredients in Cosmetics." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/95964933301044103507.

Full text
Abstract:
碩士
嘉南藥理科技大學
生物科技系暨研究所
93
Abstract Background and Purpose : The transdermal permeation subject has been studied in pharmaceutical field for years to assess transport of drug molecule. Nevertheless , there is no systematic research on the permeation of whitelight ingredients through skin in the field of cosmetic science. The purpose of this study is to evaluate transdermal permeation of whitelight ingredients which are often used in cosmetics and to investigate the factors which affect the permeation of whitelight ingredients. This basic study can be helpful to reveal the transdermal properties of whitelight ingredients ; the obtained information can also be utilized to design cosmetic formulations. Methods : Permeation studies of whitelight ingredients across nude mice skin was conducted using side-by-side diffusion cell at 37℃. High performance liquid chromatographic methods were developed for determination of ?Arbutin as well as Sodium ascorbyl phosphate. A reverse phase column was used as the stationary phase , whereas mixture of 0.05MKH2PO4 buffer solution (pH 3.5) and methanol (90:10,v/v) was used as mobile phase of ?Arbutin. The mobile phase of Sodium ascorbyl phosphate was 0.005MKH2PO4 buffer solution (pH 3). The UV detector was set at 280 nm for ?Arbutin and at 240 nm for Sodium ascorbyl phosphate. Results & Conclusions : The results showed that the ?Arbutin and Sodium ascorbyl phosphate did not permeate through model skin effectively. After removal of stratum corneum (SC) , significant improvement of the permeability of ?Arbutin and Sodium ascorbyl phosphate were observed. The results indicated that SC is the major barrier for the permeation process. The studies of ?Arbutin and Sodium ascorbyl phosphate permeated through skin from various formulations provide further evidence for the proposed mechanism. The information can be utilized for designing optimum formulations for the whitelight ingredients. Keywords: transdermal ;whitelight ingredient ;stratum corneum (SC) ; ?Arbutin ; Sodium ascorbyl phosphate
APA, Harvard, Vancouver, ISO, and other styles
10

Lin, Huan-Ting, and 林煥庭. "Study on the angular CCT uniformity in whitelight-emitting diodes with packaging technology." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/66350391073997133098.

Full text
Abstract:
碩士
國立中興大學
精密工程學系所
102
In this thesis, the thin-film flip-chip (TFFC) GaN light-emitting diodes (LEDs)have been fabricated by combination of laser lift-off (LLO) and surface roughening process. Two kinds of white LED methods were prepared in this study. First one is the phosphor plate pasted on the surfaces of sapphire-based flip-chip LEDs (FC-LEDs) and TFFC-LEDs, respectively. The other one is the phosphor slurry sprayed onto the TFFC-LEDs with different packaging by conformal distribution method to realize white light. Typical I–V characteristics of the FC-LEDs and TFFC-LEDs are nearly the same. The reverse leakage currents of all LEDs are all below -1 μA at -5 V. The TFFC white LED and conventional FC white LED with ceramic phosphor plate have exhibited the small angular color correlated temperature (CCT) deviation between -70° to +70° were 72 K and 175 K with the CCT near 3867 K and 5471 K. Additionally, the white LED samples with different packaging of TFFC on lead frame (TFFC-Cup) and TFFC on Cu substrate (TFFC-Cu-sub) were fabricated by conformal distribution method. For the average CCT 4300 K from -70° to +70°, the angular CCT deviation of the TFFC-Cup and the TFFC-Cu-sub were 111 and 77 K,respectively. As the average CCT was around 5000 K, the TFFC-Cup and the TFFC-Cu-sub were 783 and 523 K, respectively. It indicates that the TFFC white LED exhibit high performance in angular CCT deviation and keep the good quality of epitaxial layer after LLO. It shows that the same phosphor thickness on the surface of LED and the lead frame with low altitude reflector can fabricate a high uniformity color distribution device.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Whitelist"

1

City whitelight: A novel. Edinburgh: Mainstream, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stillwell, Robert M. Whiteline Lessons. AuthorHouse, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

City whitelight. Fontana, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

MacKenzie, John. City Whitelight (Fontana). HarperCollins Publishers Ltd, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Carter, J. Scott, Cameron D. Lippard, David G. Embrick, and Eduardo Bonilla-Silva. Protecting Whiteness: Whitelash and the Rejection of Racial Equality. University of Washington Press, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Carter, J. Scott, Cameron D. Lippard, David G. Embrick, and Eduardo Bonilla-Silva. Protecting Whiteness: Whitelash and the Rejection of Racial Equality. University of Washington Press, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Terry. Whitelash: Unmasking White Grievance in the Age of Trump. University of Cambridge ESOL Examinations, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Whitelist"

1

Kang, Dong-Ho, Byoung-Koo Kim, Jung-Chan Na, and Kyoung-Sun Jhang. "Whitelist Generation Technique for Industrial Firewall in SCADA Networks." In Lecture Notes in Electrical Engineering, 525–34. Dordrecht: Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-8798-7_63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Inoue, Keisuke, Toshiki Honda, Kohei Mukaiyama, Tetsushi Ohki, and Masakatsu Nishigaki. "Automatic Examination-Based Whitelist Generation for XSS Attack Detection." In Lecture Notes on Data Engineering and Communications Technologies, 326–38. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02613-4_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jang, Uijin, Changjin Suh, and Hyungmin Lim. "A Study on the Efficient Management of Android Apps Using a Whitelist." In Lecture Notes in Electrical Engineering, 473–82. Dordrecht: Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-8798-7_58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cho, Michael Cheng Yi, Yuan-Hsiang Su, Hsiu-Chuan Huang, and Yu-Lung Tsai. "Top of the Pops: A Novel Whitelist Generation Scheme for Data Exfiltration Detection." In Lecture Notes in Networks and Systems, 65–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80126-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kuehl, Niklas, and Marc Goutier. "Needmining: Evaluating a Whitelist-Based Assignment Method to Quantify Customer Needs from Micro Blog Data." In Operations Research Proceedings 2016, 165–70. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55702-1_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kobayashi, Nobuhiro, Koichi Shimizu, Tsunato Nakai, Teruyoshi Yamaguchi, and Masakatsu Nishigaki. "Intrusion Detection Method Using Enhanced Whitelist Based on Cooperation of System Development, System Deployment, and Device Development Domains in CPS." In Advances in Network-Based Information Systems, 430–44. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98530-5_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Choi, Seungoh, Yeop Chang, Jeong-Han Yun, and Woonyon Kim. "Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks." In IFIP Advances in Information and Communication Technology, 87–102. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26567-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wittmann, Emanuel, Maximilian Bradler, and Eberhard Riedle. "Direct Generation of 7 fs Whitelight Pulses from Bulk Sapphire." In Springer Proceedings in Physics, 725–28. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13242-6_178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nwankwo, Iheanyi Samuel. "The “Whitelist” and its Value during a Data Protection Impact Assessment." In Turning Point in Data Protection Law, 141–44. Nomos Verlagsgesellschaft mbH & Co. KG, 2020. http://dx.doi.org/10.5771/9783748921561-141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"The Long Night of Déjà Vu." In Whitelash, 1–6. Cambridge University Press, 2020. http://dx.doi.org/10.1017/9781108698412.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Whitelist"

1

Kim, Kyoungmin, Jeonghwan Lee, Seonguk Lee, and Jiman Hong. "Whitelist for Analyzing Android Malware." In RACS '17: International Conference on Research in Adaptive and Convergent Systems. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3129676.3129726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Tae-Hyung, Young-Sik Choi, Jong Kim, and Sung Je Hong. "Annulling SYN Flooding Attacks with Whitelist." In 2008 22nd International Conference on Advanced Information Networking and Applications (AINA 2008). IEEE, 2008. http://dx.doi.org/10.1109/waina.2008.218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhao, Shuai, Achir Kalra, Chong Wang, Cristian Borcea, and Yi Chen. "Ad Blocking Whitelist Prediction for Online Publishers." In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9006402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Powers, Josh, Rhett Smith, Zafer Korkmaz, and Husam Ahmed. "Whitelist malware defense for embedded control system devices." In 2015 Saudi Arabia Smart Grid (SASG). IEEE, 2015. http://dx.doi.org/10.1109/sasg.2015.7449271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Belabed, A., E. Aimeur, and A. Chikh. "A Personalized Whitelist Approach for Phishing Webpage Detection." In 2012 Seventh International Conference on Availability, Reliability and Security (ARES). IEEE, 2012. http://dx.doi.org/10.1109/ares.2012.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wibowo, Fahrudin Mukti, Muhammad Fajar Sidiq, Imadudin Alif Akbar, Akbari Indra Basuki, and Didi Rosiyadi. "Collaborative Whitelist Packet Filtering Driven by Smart Contract Forum." In 2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI). IEEE, 2019. http://dx.doi.org/10.1109/isriti48646.2019.9034654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jung, Woo-Suk, Jeong-Han Yun, Sin-Kyu Kim, Kyu-Seok Shim, and Myung-Sup Kim. "Structured whitelist generation in SCADA network using PrefixSpan algorithm." In 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2017. http://dx.doi.org/10.1109/apnoms.2017.8094163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Choi, Jeongwoo, Yongmin Kim, Jinwoo Lee, and Jiman Hong. "Dynamic code whitelist for efficient analysis of Android code." In RACS '18: International Conference on Research in Adaptive and Convergent Systems. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3264746.3264812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Peng, Dan, Guiran Chang, Rui Guo, and Yanjun Tang. "Research on DDoS Filtering Algorithm Based on Bloom Filter WhiteList." In 2008 International Conference on MultiMedia and Information Technology (MMIT). IEEE, 2008. http://dx.doi.org/10.1109/mmit.2008.105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nomura, Komei, Kenji Rikitake, and Ryosuke Matsumoto. "Automatic Whitelist Generation for SQL Queries Using Web Application Tests." In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2019. http://dx.doi.org/10.1109/compsac.2019.10250.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Whitelist"

1

Vesely, A. DNS Whitelist (DNSWL) Email Authentication Method Extension. RFC Editor, September 2020. http://dx.doi.org/10.17487/rfc8904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Levine, J. DNS Blacklists and Whitelists. RFC Editor, February 2010. http://dx.doi.org/10.17487/rfc5782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography