Journal articles on the topic 'Whitelist'

To see the other types of publications on this topic, follow the link: Whitelist.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Whitelist.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kim, DaeYoub, and Jihoon Lee. "Blacklist vs. Whitelist-Based Ransomware Solutions." IEEE Consumer Electronics Magazine 9, no. 3 (May 1, 2020): 22–28. http://dx.doi.org/10.1109/mce.2019.2956192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

ชัยกังวาฬ, กรวิชญ์, ณัฐพัชร์ วัฒนชาญสิทธิ์, สุรศักดิ์ สงวนพงษ์, พีรวัฒน์ วัฒนพงศ์, and พิรุณ ศรีสว่าง. "การตรวจสอบอุปกรณ์ที่ติดบอตเน็ตโดยวิเคราะห์ข้อมูลจราจรดีเอ็นเอส." วารสารงานวิจัยและพัฒนาเชิงประยุกต์ โดยสมาคม ECTI 1, no. 2 (August 29, 2021): 36–43. http://dx.doi.org/10.37936/ectiard.2021-1-2.244240.

Full text
Abstract:
บอตเน็ตเป็นหนึ่งในภัยคุกคามในอินเทอร์เน็ตที่ผู้ไม่ประสงค์ดีสร้างขึ้นเพื่อใช้ก่ออาชญากรรมไซเบอร์ เช่น การทำให้ระบบปฏิเสธบริการ (DoS) การขโมยข้อมูลสำคัญและการกระจายสแปม เป็นต้น เนื่องจากบอตเน็ตมีพัฒนาการอย่างต่อเนื่องและตรวจจับได้ยาก จากเทคนิคการซ่อนเซิร์ฟเวอร์สั่งการและควบคุม โดยบอตต้องอาศัยดีเอ็นเอสในการค้นหาไอพีแอดเดรสของเซิร์ฟเวอร์สั่งการและควบคุม งานวิจัยฉบับนี้นำเสนอวิธีการค้นหาอุปกรณ์ในระบบที่ติดบอตเน็ตโดยใช้ข้อมูลการติดต่อสื่อสารระหว่างอุปกรณ์กับระบบดีเอ็นเอส เพื่อจำแนกประเภทของชื่อโดเมนที่สร้างจากขั้นตอนวิธีการสร้างโดเมนแบบสุ่ม (DGAs) ที่ใช้ซ่อนเซิร์ฟเวอร์สั่งการและควบคุมกับชื่อโดเมนที่มนุษย์เป็นผู้สร้างโดยอาศัยเทคนิคบัญชีขาว (Whitelist) ร่วมกับหลักประมวลผลภาษาธรรมชาติ
APA, Harvard, Vancouver, ISO, and other styles
3

Takaki, Osamu, Ichiro Suzuta, Kota Torikai, Yuichiro Saito, Tsuyoshi Kato, Tetsuya Sato, Hiroki Endo, and Yoshifumi Atarashi. "Evaluation of a Network Switch with Whitelist-Based Packet Monitoring and Control in Hospital Networks." Advanced Engineering Forum 38 (November 2020): 222–32. http://dx.doi.org/10.4028/www.scientific.net/aef.38.222.

Full text
Abstract:
A "whitelist network switch (WLS)", which can monitor and filter packets based on a whitelist, is particularly effective for stronger information security in closed network environments, such as in factories. This paper focuses on the base network environment for a nurse call system within a large hospital. This network environment is of particular importance to security, and the types of network protocols used are limited. We note important points regarding the practical operation and effectiveness of WLS through two approaches: (i) test introduction into an existing, actual hospital network system; (ii) test introduction in an experimental nurse call system environment.
APA, Harvard, Vancouver, ISO, and other styles
4

Azeez, Nureni Ayofe, Sanjay Misra, Ihotu Agbo Margaret, Luis Fernandez-Sanz, and Shafi'i Muhammad Abdulhamid. "Adopting automated whitelist approach for detecting phishing attacks." Computers & Security 108 (September 2021): 102328. http://dx.doi.org/10.1016/j.cose.2021.102328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yoo, Hyunguk, Jeong-Han Yun, and Taeshik Shon. "Whitelist-Based Anomaly Detection for Industrial Control System Security." Journal of Korean Institute of Communications and Information Sciences 38B, no. 8 (August 30, 2013): 641–53. http://dx.doi.org/10.7840/kics.2013.38b.8.641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pratama, Januar Ariq. "Implementation of Network Security with the Whitelist Method on the Server of the Department of Electrical Engineering at State Polytechnic of Malang." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 8, no. 1 (March 1, 2019): 56–61. http://dx.doi.org/10.33795/jartel.v8i1.166.

Full text
Abstract:
State Polytechnic of Malang is an educational institution based on technique where the database is needed here, the database itself is important data that must be stored and cannot be seen by others. Database security must be developed and prioritized so that no one breaks into important data on the server. This whitelist method utilizes a port that can block port access to outside networks that are vulnerable to criminal acts, this method uses ssh as a medium to manage control of an ip address. The ip address will be added a port behind it. Use IP block with Linux OS and tested via the web and laptop using a local access point. The test results show that the quality used for security is whitelist, where this method is used for the IP security used. IP block and unblock process can be done well. The process of adding and deleting ports can be done well. So that in general, the whole system is running well and easy access.
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Chang-Hong, Jeong-Hyun Yi, and Jong-Bae Kim. "The Endpoint Application Execution Control Scheme based on the Whitelist." International Journal of Control and Automation 8, no. 4 (April 30, 2015): 83–88. http://dx.doi.org/10.14257/ijca.2015.8.4.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

FUJITA, Shintaro, Kenji SAWADA, Seiichi SHIN, and Shu HOSOKAWA. "On Auto-generation Method of Whitelist for PLC Operation Sequence." Transactions of the Society of Instrument and Control Engineers 57, no. 8 (2021): 367–77. http://dx.doi.org/10.9746/sicetr.57.367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tang, Yi, Zhao Kai Luo, and Ji Zhang. "UOFilter: A Whitelist-Based Filter for Unintended Objects in Web Pages." Applied Mechanics and Materials 519-520 (February 2014): 373–76. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.373.

Full text
Abstract:
A web page often contains objects that the hosted web server intends a browser to render. Rendering those objects can instruct network requests to foreign origins. Although the same origin policy (SOP) limits the access for foreign objects, web attackers could circumvent the SOP controls through injected unintended objects for sensitive data smuggling. In this paper, we propose UOFilter, a whitelist-based method to filter out unintended objects in web pages. We define a list item structure to describe intended objects with optional integrity guarantees. The UOFilter in a web browser interprets the items and blocks the network requests issued by those unintended objects. We implement a proof of concept UOFilter prototype as a chrome browser extension and validate it with experiments.
APA, Harvard, Vancouver, ISO, and other styles
10

Bisaccio, Michael. "Cabells’ Journal Whitelist and Blacklist: Intelligent data for informed journal evaluations." Learned Publishing 31, no. 3 (April 19, 2018): 243–48. http://dx.doi.org/10.1002/leap.1164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kim, Young-Gab, Minsoo Lee, Sanghyun Cho, and Sungdeok Cha. "A quantitative approach to estimate a website security risk using whitelist." Security and Communication Networks 5, no. 10 (February 6, 2012): 1181–92. http://dx.doi.org/10.1002/sec.420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Ngwogu, Onyeabor Onyekachi, and Suk-Jun Lim. "Media Presentation of Japan-Korea Whitelist and GSOMIA Dispute: A Content Analysis." JOURNAL OF INTERNATIONAL RELATIONS 23, no. 2 (June 30, 2020): 31–49. http://dx.doi.org/10.15235/jir.2020.06.23.2.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Sirait, Emyana Ruth Eritha. "Respon Masyarakat terhadap Sistem Whitelist: Alternatif untuk Akses Internet yang Lebih Aman." Jurnal PIKOM (Penelitian Komunikasi dan Pembangunan) 17, no. 2 (January 18, 2017): 127. http://dx.doi.org/10.31346/jpikom.v17i2.705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sirait, Emyana Ruth Eritha. "Respon Masyarakat terhadap Sistem Whitelist: Alternatif untuk Akses Internet yang Lebih Aman." Jurnal Penelitian Komunikasi dan Pembangunan 17, no. 2 (January 18, 2017): 127. http://dx.doi.org/10.31346/jpkp.v17i2.705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Park, Jungsoo, Minho Park, and Souhwan Jung. "A Whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device." Journal of Korean Institute of Communications and Information Sciences 38B, no. 8 (August 30, 2013): 632–40. http://dx.doi.org/10.7840/kics.2013.38b.8.632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Shang, Wen Li, Sheng Shan Zhang, and Ming Wan. "Modbus/TCP Communication Anomaly Detection Based on PSO-SVM." Applied Mechanics and Materials 490-491 (January 2014): 1745–53. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1745.

Full text
Abstract:
Industrial firewall and intrusion detection system based on Modbus TCP protocol analysis and whitelist policy cannot effectively identify attacks on Modbus controller which exactly take advantage of the configured rules. An Industrial control systems simulation environment is established and a data preprocessing method for Modbus TCP traffic captured is designed to meet the need of anomaly detection module. Furthermore a Modbus function code sequence anomaly detection model based on SVM optimized by PSO method is designed. And the model can effectively identify abnormal Modbus TCP traffic, according to frequency of different short mode sequences in a Modbus code sequence.
APA, Harvard, Vancouver, ISO, and other styles
17

Danko, O. S., and T. A. Medvedeva. "Exploring the impact of similarity index on the accuracy of a phishing site detection model using machine learning." Journal of Physics: Conference Series 2131, no. 2 (December 1, 2021): 022076. http://dx.doi.org/10.1088/1742-6596/2131/2/022076.

Full text
Abstract:
Abstract In this paper, the problem of phishing site detection using machine learning is discussed. The main goal is to study the effectiveness of various binary classification models when extracting only lexical features from a URL. Special attention has been given to the analysis of features obtained from the domain by calculating the similarity index using the whitelist. After training and testing the models, accuracy metrics were calculated and the results were compared. The lexical features that have the greatest weight for the classification of URLs are highlighted, and the advantages and disadvantages of this approach are described.
APA, Harvard, Vancouver, ISO, and other styles
18

Kim, Ju-Wan, Jea-Tek Ryu, Ki-Yeol Ryu, and Byeong-Hee Roh. "A Countermeasure Scheme Based on Whitelist using Bloom Filter against SIP DDoS Attacks." Journal of Korea Information and Communications Society 36, no. 11B (November 30, 2011): 1297–304. http://dx.doi.org/10.7840/kics.2011.36b.11.1297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Wu, Chun-Jung, Ying Tie, Satoshi Hara, Kazuki Tamiya, Akira Fujita, Katsunari Yoshioka, and Tsutomu Matsumoto. "IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices." Journal of Information Processing 26 (2018): 662–72. http://dx.doi.org/10.2197/ipsjjip.26.662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Roh, Byeong-hee, Ju Wan Kim, Ki-Yeol Ryu, and Jea-Tek Ryu. "A whitelist-based countermeasure scheme using a Bloom filter against SIP flooding attacks." Computers & Security 37 (September 2013): 46–61. http://dx.doi.org/10.1016/j.cose.2013.04.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Jiang, Jianfeng. "Research on Application of Idc Virtualization Security Technology Based on Host Whitelist Protection." Journal of Physics: Conference Series 1915, no. 3 (May 1, 2021): 032011. http://dx.doi.org/10.1088/1742-6596/1915/3/032011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Mathew, Alexander, Gayatri Moindi, Ketan Bende, and Neha Singh. "Credit Card Fraud Prediction System." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 3 (March 31, 2015): 30–35. http://dx.doi.org/10.53555/nncse.v2i3.481.

Full text
Abstract:
Identity crime is common, and pricey, and credit card fraud is a specific case of identity crime. The existing systems of known fraud matching and business rules have restrictions. To remove these negative aspects in real world, this paper proposes a data mining approach: Communal Detection (CD) and Spike Detection (SD). CD finds real social relationships to reduce the suspicion score, and is impervious to fake social relationships. This approach on a fixed set of attributes is whitelist-oriented. SD increases the suspicion score by finding discrepancies in duplicates. These data mining approaches can detect more types of attacks and removes the unnecessary attributes.
APA, Harvard, Vancouver, ISO, and other styles
23

Akinyelu, Andronicus A. "Machine Learning and Nature Inspired Based Phishing Detection: A Literature Survey." International Journal on Artificial Intelligence Tools 28, no. 05 (August 2019): 1930002. http://dx.doi.org/10.1142/s0218213019300023.

Full text
Abstract:
Phishing detection remains one of the most challenging problems currently faced by cyber users as sophisticated phishing schemes evolves rapidly. This paper presents a comprehensive survey of different phishing detection techniques with a focus of identifying gaps and proffering solutions to the current phishing detection problems. As shown in the survey, numerous techniques have been proposed to tackle phishing, including Machine Learning (ML) based, Nature Inspired (NI) based, heuristic-based, blacklist-based and whitelist-based techniques. However, ML-based techniques outperform other techniques in terms of classification accuracy due to their ability to analyze data contents, extract unknown or concealed patterns from the data and consequently turn the patterns into meaningful information for decision making. Unfortunately, ML algorithms cannot effectively handle big datasets, hence they can be combined with NI algorithms to build fast and improved models for phishing detection. Although, some surveys on phishing detection techniques exist, very few focused on ML-based and NI-based techniques. Therefore, this study presents a survey on ML-based and NI-based phishing detection techniques. The survey reveals the various shortcomings of phishing detection techniques, including limited dataset, use of third-party services (age of domain, search engine query, etc.), use of small feature set, use of classification rules, use of blacklist and whitelist, etc. There is an obvious need for efficient and reliable solutions for phishing detection. The recent success and prevalence of deep learning provides a rare opportunity for researchers seeking to design improved and effective phishing detection techniques. This study aims to empower the research community with suitable solutions and motivating insights that can be used to effectively tackle the phishing detection problem. It provides a good picture of the current state-of-the-art on phishing detection and serves as a reliable springboard for further studies.
APA, Harvard, Vancouver, ISO, and other styles
24

Teixeira da Silva, Jaime A. "UPDATES ON INFORMATION REGARDING THE DIRECTORY OF OPEN ACCESS JOURNALS PLATFORM MAY INCREASE ITS RELIABILITY." Central Asian Journal of Medical Hypotheses and Ethics 2, no. 3 (October 5, 2021): 162–65. http://dx.doi.org/10.47316/cajmhe.2021.2.3.05.

Full text
Abstract:
The Directory of Open Access Journals (DOAJ) is a leading whitelist of open access journals (OAJs), that is, OAJs that are presumably safe to publish in, or scholarly, because they follow best practices established by COPE/DOAJ/OASPA/WAME. Academics rely on the DOAJ to select OAJs of choice, and filter for particular needs, for example, English-only or no article processing charges. A search of DOAJ-indexed OAJs publishing work on ornamental research identified five OAJs, but 60% of them had incorrect and thus misleading information. The ‘last update’ of all five OAJs were outdated. The DOAJ must ensure that indexed OAJs have updated information. The Editors of OAJs also bear responsibility.
APA, Harvard, Vancouver, ISO, and other styles
25

Indrawan, B., and Y. Kerlooza. "The Development of the Education Related Multimedia Whitelist Filter using Cache Proxy Log Analysis." IOP Conference Series: Materials Science and Engineering 407 (September 26, 2018): 012125. http://dx.doi.org/10.1088/1757-899x/407/1/012125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ji, Shujuan, Haiyan Ma, Yongquan Liang, Hofung Leung, and Chunjin Zhang. "A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks." Applied Intelligence 47, no. 4 (May 13, 2017): 1115–31. http://dx.doi.org/10.1007/s10489-017-0944-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Doke, Tanmay, Pranav Khismatrao, Vaibhav Jambhale, and Nilesh Marathe. "Phishing-Inspector: Detection & Prevention of Phishing Websites." ITM Web of Conferences 32 (2020): 03004. http://dx.doi.org/10.1051/itmconf/20203203004.

Full text
Abstract:
With a tremendous boost in technologies & available learning material developing any website has become very easy. Due to this the number of websites are exponentially growing day by day. The traditional approach of comparing websites with Blacklist and whitelist is not so efficient. As attackers have become more intelligent regarding hiding and redirecting of the URL and thereby tricking the user into phishing attack without been getting detected. So there’s a need to have a novel approaches based on Machine learning (ML) which would expose this phishing websites. In this paper, the proposed system is an extension to web browser which made use of ML algorithm to extract various features and thereby helping the user to distinguish between Legitimate website and Phishing website.
APA, Harvard, Vancouver, ISO, and other styles
28

IIZUKA, Yamato, Tamotsu MURAKAMI, Kazutaka UEDA, and Yasunobu SANO. "Safety and Usability Problem Detection by Whitelist Approach Based on Gap between Designer and User." Proceedings of Design & Systems Conference 2016.26 (2016): 1103. http://dx.doi.org/10.1299/jsmedsd.2016.26.1103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Sudharsan, N. S., and K. Latha. "Preeminent System for Detecting Venomous Banking Sites in Online Business." Applied Mechanics and Materials 573 (June 2014): 519–22. http://dx.doi.org/10.4028/www.scientific.net/amm.573.519.

Full text
Abstract:
. Phishing has become most notorious security issues in online real time web pages. Many studies and ideas have been proposed related to phishing attack in order to overcome the security issues. Phishing attack can be easily done by Uniform resource locator (URL) obfuscation. It is the trick where the user will be forwarded to fake web page which has look and feel effect as the original web page when they click through the fake link. Organizations which use online business and transaction like ebay, paypal use many preventive approaches like blacklist, whitelist of URL in order to prevent any online theft using phishing attack. This paper propose a novel idea for detecting Phishing attack by checking the URL patterns of the suspected page with generated legitimate common URL pattern by inspecting different international URL patterns of that particular banking site.
APA, Harvard, Vancouver, ISO, and other styles
30

Ji, Shujuan, Haiyan Ma, Yongquan Liang, Hofung Leung, and Chunjin Zhang. "Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks." Applied Intelligence 48, no. 7 (May 12, 2018): 1891. http://dx.doi.org/10.1007/s10489-018-1195-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Li, Linfeng, Eleni Berki, Marko Helenius, and Saila Ovaska. "Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate?" Behaviour & Information Technology 33, no. 11 (January 31, 2014): 1136–47. http://dx.doi.org/10.1080/0144929x.2013.875221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Cho, Chaeho, Yeonsang Seong, and Yoojae Won. "Mandatory Access Control Method for Windows Embedded OS Security." Electronics 10, no. 20 (October 12, 2021): 2478. http://dx.doi.org/10.3390/electronics10202478.

Full text
Abstract:
The Windows Embedded operating system (OS) adopts a discretionary access control (DAC)-based policy, but underlying vulnerabilities exist because of external hacker attacks and other factors. In this study, we propose a system that improves the security of the Windows Embedded OS by applying a mandatory access control (MAC) policy in which the access rights of objects, such as files and folders, and subjects’ privileges, such as processes, are compared. We conducted access control tests to verify whether the proposed system could avoid the vulnerabilities of DAC-based systems. Our results indicate that the existing DAC-based security systems could be neutralized if a principal’s security policy is removed. However, in the proposed MAC-based Windows Embedded OS, even if the clearance and category values of a subject’s files are given the highest rating, all accesses are automatically denied. Therefore, the execution of all files that were not previously registered on the whitelist was denied, proving that security was improved relative to DAC-based systems.
APA, Harvard, Vancouver, ISO, and other styles
33

Kim, Boungjin, and Sangjun Lee. "Improvement of Methods for Discriminating Harmful Web Sites by using Link Relations between Web Sites and Constructing Whitelist." KIISE Transactions on Computing Practices 25, no. 10 (October 31, 2019): 506–10. http://dx.doi.org/10.5626/ktcp.2019.25.10.506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, Yunmin, Abla Smahi, Huayu Zhang, and Hui Li. "Towards Double Defense Network Security Based on Multi-Identifier Network Architecture." Sensors 22, no. 3 (January 19, 2022): 747. http://dx.doi.org/10.3390/s22030747.

Full text
Abstract:
Recently, more and more mobile devices have been connected to the Internet. The Internet environment is complicated, and network security incidents emerge endlessly. Traditional blocking and killing passive defense measures cannot fundamentally meet the network security requirements. Inspired by the heuristic establishment of multiple lines of defense in immunology, we designed and prototyped a Double Defense strategy with Endogenous Safety and Security (DDESS) based on multi-identifier network (MIN) architecture. DDESS adopts the idea of a zero-trust network, with identity authentication as the core for access control, which solves security problems of traditional IP networks. In addition, DDESS achieves individual static security defense through encryption and decryption, consortium blockchain, trusted computing whitelist, and remote attestation strategies. At the same time, with the dynamic collection of data traffic and access logs, as well as the understanding and prediction of the situation, DDESS can realize the situation awareness of network security and the cultivation of immune vaccines against unknown network attacks, thus achieving the active herd defense of network security.
APA, Harvard, Vancouver, ISO, and other styles
35

Ben Stewart S., Dhanush N., Santhosh G., and Angelin Gladston. "Efficient Client-Side Cross-Platform Compatible Solution for Phishing Prevention." International Journal of Cyber Warfare and Terrorism 12, no. 1 (January 2022): 1–24. http://dx.doi.org/10.4018/ijcwt.297855.

Full text
Abstract:
Phishing is a crime where the victim is contacted by an attacker posing as a trustworthy source and lure them into providing sensitive information. This work makes sure that time delay is averted and the attack can be thwarted with fewer computational resources. To solve the above mentioned problem, a web browser add-on that works as a background script on the client side is implemented. All the background scripts made cross platform compatible to make the development easier and more efficient. The contribution in this paper is the new add-on, Off-the-hook-plus. The main objective of this Off-the-hook-plus is to find if the web page that the user visits is a phish or not. The page redirect logs along with the page details are used to find if the site is a phish or not. And then if the site happens to be a phish, the similar looking site which this web page tries to impersonate is given. To make the repeated accesses faster, a whitelist is maintained, where all the safe sites are logged. The add-on is experimentally evaluated and the results are discussed and is found to be effective.
APA, Harvard, Vancouver, ISO, and other styles
36

Behairy, Hatim, Waleed Alrobian, Adnan Alghammas, Amr Alasaad, Brian Suter, Mohammed Alshareef, and Yahya Alsuwayyeh. "Selective Mobile Communication within a Coverage Area Bounded by Radiating Cables." Mobile Information Systems 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/138067.

Full text
Abstract:
It is often desirable to control mobile phone services in areas where complete silence is either expected or mandatory, including schools, places of worship, hospitals, and prisons. In contrast to conventional techniques, such as jammers or Faraday cages, we present a novel technique to selectively control mobile phone services within a desired area. Our solution enables the area’s keeper to allow mobile phones on a whitelist to freely use mobile services without disruption while denying services to all other mobile phones that are within the boundaries of the desired area to be controlled. Our solution uses a base station controller to identify all mobile devices located within the area to be controlled, while an antenna is placed inside the area to attract all mobile devices in the area to connect to the base station controller. In previous work, we proposed a system that uses directional antennas for the attraction technique. In this work, we show that replacement of the directional antennas with a leaky feeder antenna enables more accurate control of mobile phone services in and around the area to be controlled. Simulations and experiments of the leaky feeder technique confirm its precise control of mobile phone services within the desired areas.
APA, Harvard, Vancouver, ISO, and other styles
37

Mughees, Muhammad Haris, Zhiyun Qian, and Zubair Shafiq. "Detecting Anti Ad-blockers in the Wild." Proceedings on Privacy Enhancing Technologies 2017, no. 3 (July 1, 2017): 130–46. http://dx.doi.org/10.1515/popets-2017-0032.

Full text
Abstract:
Abstract The rise of ad-blockers is viewed as an economic threat by online publishers who primarily rely on online advertising to monetize their services. To address this threat, publishers have started to retaliate by employing anti ad-blockers, which scout for ad-block users and react to them by pushing users to whitelist the website or disable ad-blockers altogether. The clash between ad-blockers and anti ad-blockers has resulted in a new arms race on the Web. In this paper, we present an automated machine learning based approach to identify anti ad-blockers that detect and react to ad-block users. The approach is promising with precision of 94.8% and recall of 93.1%. Our automated approach allows us to conduct a large-scale measurement study of anti ad-blockers on Alexa top-100K websites. We identify 686 websites that make visible changes to their page content in response to ad-block detection. We characterize the spectrum of different strategies used by anti ad-blockers. We find that a majority of publishers use fairly simple first-party anti ad-block scripts. However, we also note the use of third-party anti ad-block services that use more sophisticated tactics to detect and respond to ad-blockers.
APA, Harvard, Vancouver, ISO, and other styles
38

Pratama, Bahar Budi, Dedik Tri Istiantara, Bambang Gunari, and Teguh Arifianto. "SISTEM SECURITY JARINGAN ETHERNET PADA PROTOTYPE STASIUN KERETA API YANG TERINTEGRASI DENGAN INTERLOCKING." Jurnal Mnemonic 3, no. 2 (September 14, 2020): 30–36. http://dx.doi.org/10.36040/mnemonic.v3i2.2819.

Full text
Abstract:
Pada saat ini, pembangunan berkembang lebih cepat khususnya pada bidang transportasi salah satunya perkeretaapian. Salah satu sektor yang penting dalam pelayanan kereta api adalah sistem persinyalan kereta api. Sistem ini mengatur lalu lintas perjalanan kereta api yang berfungsi untuk memastikan kelancaran perjalanan kereta api dan menghindari terjadinya kecelakaan. Saat ini kebanyakan meja pelayanan yang digunakan adalah meja pelayanan jenis Local Control Panel. Namun saat ini sudah ada meja pelayanan berbasis komputer yang umum disebut dengan meja pelayanan jenis visual display unit (VDU). Teknologi saat ini telah berkembang cukup pesat dan banyak ditemukan alat-alat inovasi terbaru sehingga tidak menutup kemungkinan bahwa nanti akan ada pihak yang akan menyalahgunakan hal tersebut. Untuk menangani hal tersebut dibutuhkan pengamanan sistem dari VDU tersebut baik dari data base dan keamanan jaringan yang dipakai. Maka dilakukanlah pembuatan sistem security pada VDU yang dapat membantu mengamankan komunkasi VDU yang di implementasikan pada prototype interlocking base compute. Sistem ini dibuat menggunakan metode whitelist, menambahkan ip pada tiap tiap ethernet shield dengan menggunakan telnet dimana ethernet shield sebagai client dan data base sebagai server untuk keamanan tambahan ditambahkanya (secure hash algorithm) SHA 256 pada password untuk tambahan pengamanan komunikasi. Dari hasil pengujian terhadap program yang sudah dibuat, dapat diambil kesimpulan bahwa sistem security jaringan ethernet ini dapat membantu mengamankan jaringan komunikasi. Sistem ini hanya dapat digunakan pada prototype interlocking base computer.
APA, Harvard, Vancouver, ISO, and other styles
39

Andiani, Andiani, and M. Farhan Zidni L. "DASHBOARD INFORMATION SYSTEM OF PEMINJAMAN UANG (PINANG) APPLICATION." Jurnal Riset Informatika 3, no. 1 (December 8, 2020): 67–76. http://dx.doi.org/10.34288/jri.v3i1.220.

Full text
Abstract:
Pinang is a digital application-based BRI Agro product that runs on the Android operating system, wherewith this application customers can apply for loans without collateral digitally, anywhere, and anytime. Of course, we need a system that can help the process of managing data from Pinang customers, starting from adding company cooperation with the Pinang application to maintaining and monitoring the system. So a Pinang dashboard information system is needed that can assist in the operation of the Pinang application that is capable of managing data, monitoring, and maintenance if there are problems in the Pinang application borrowing process. The Pinang dashboard can make it easier to manage, monitor, and provide information related to the Pinang application, including customer status, whitelist, repayment, disbursement, outstanding, ID card approval, and report withdrawal. The areca dashboard is built using the waterfall method, this method in its design uses UML diagrams, use case diagrams, activity diagrams, sequence diagrams, class diagrams, and entity-relationship diagrams (ERD). The implementation of making Pinang dashboards uses the Golang programming language, Node Js, React Js, keycloak, and the PostgreSQL database. With the Pinang Dashboard, it is hoped that it can facilitate the operational team in maintaining the Pinang application and building a system that can manage, monitor, and provide information related to the Pinang application.
APA, Harvard, Vancouver, ISO, and other styles
40

Steinbrener, Stefan V. "Patentable subject matter under Article 52(2) and (3) EPC: a whitelist of positive cases from the EPO Boards of Appeal—Part 1." Journal of Intellectual Property Law & Practice 13, no. 1 (August 18, 2017): 13–35. http://dx.doi.org/10.1093/jiplp/jpx139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Steinbrener, Stefan V. "Patentable subject matter under Article 52(2) and (3) EPC: a whitelist of positive cases from the EPO Boards of Appeal—Part 2." Journal of Intellectual Property Law & Practice 13, no. 2 (September 29, 2017): 103–19. http://dx.doi.org/10.1093/jiplp/jpx145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Choi, Ye-Jin, Hee-Jung Kang, and Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7 (July 3, 2019): 752. http://dx.doi.org/10.3390/electronics8070752.

Full text
Abstract:
The Internet of things (IoT) technology, which is currently considered the new growth engine of the fourth industrial revolution, affects our daily life and has been applied to various industrial fields. Studies on overcoming the limitations of scalability and stability in a centralized IoT operating environment by employing distributed blockchain technology have been actively conducted. However, the nature of IoT that ensures connectivity with multiple objects at any time and any place increases security threats. Further, it extends the influence of the cyber world into the physical domain, resulting in serious damage to human life and property. Therefore, we aim to study a method to increase the security of IoT devices and effectively extend them simultaneously. To this end, we analyze the authentication methods and limitations of traditional IoT devices and examine cases for improving IoT environments by using blockchain technology. Accordingly, we propose a framework that allows IoT devices to be securely connected and extended to other devices by automatically evaluating security using blockchain technology and the whitelist. The method proposed in this paper restricts the extension of devices vulnerable to security risks by imposing penalties and allows only devices with high security to be securely and quickly authenticated and extended without user intervention. In this study, we applied the proposed method to IoT network simulation environments and observed that the number of devices vulnerable to security was reduced by 48.5% compared with traditional IoT environments.
APA, Harvard, Vancouver, ISO, and other styles
43

A. Hassen, Oday, Ansam A. Abdulhussein, Saad M. Darwish, Zulaiha Ali Othman, Sabrina Tiun, and Yasmin A. Lotfy. "Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network." Symmetry 12, no. 10 (October 15, 2020): 1699. http://dx.doi.org/10.3390/sym12101699.

Full text
Abstract:
Blockchain technology has been commonly used in the last years in numerous fields, such as transactions documenting and monitoring real assets (house, cash) or intangible assets (copyright, intellectual property). The internet of things (IoT) technology, on the other hand, has become the main driver of the fourth industrial revolution, and is currently utilized in diverse fields of industry. New approaches have been established through improving the authentication methods in the blockchain to address the constraints of scalability and protection in IoT operating environments of distributed blockchain technology by control of a private key. However, these authentication mechanisms do not consider security when applying IoT to the network, as the nature of IoT communication with numerous entities all the time in various locations increases security risks resulting in extreme asset damage. This posed many difficulties in finding harmony between security and scalability. To address this gap, the work suggested in this paper adapts multimodal biometrics to strengthen network security by extracting a private key with high entropy. Additionally, via a whitelist, the suggested scheme evaluates the security score for the IoT system with a blockchain smart contract to guarantee that highly secured applications authenticate easily and restrict compromised devices. Experimental results indicate that our system is existentially unforgeable to an efficient message attack, and therefore, decreases the expansion of infected devices to the network by up to 49 percent relative to traditional schemes.
APA, Harvard, Vancouver, ISO, and other styles
44

Zhou, Yinghai, Yi Tang, Ming Yi, Chuanyu Xi, and Hai Lu. "CTI View: APT Threat Intelligence Analysis System." Security and Communication Networks 2022 (January 3, 2022): 1–15. http://dx.doi.org/10.1155/2022/9875199.

Full text
Abstract:
With the development of advanced persistent threat (APT) and the increasingly severe situation of network security, the strategic defense idea with the concept of “active defense, traceability, and countermeasures” arises at the historic moment, thus cyberspace threat intelligence (CTI) has become increasingly valuable in enhancing the ability to resist cyber threats. Based on the actual demand of defending against the APT threat, we apply natural language processing to process the cyberspace threat intelligence (CTI) and design a new automation system CTI View, which is oriented to text extraction and analysis for the massive unstructured cyberspace threat intelligence (CTI) released by various security vendors. The main work of CTI View is as follows: (1) to deal with heterogeneous CTI, a text extraction framework for threat intelligence is designed based on automated test framework, text recognition technology, and text denoising technology. It effectively solves the problem of poor adaptability when crawlers are used to crawl heterogeneous CTI; (2) using regular expressions combined with blacklist and whitelist mechanism to extract the IOC and TTP information described in CTI effectively; (3) according to the actual requirements, a model based on bidirectional encoder representations from transformers (BERT) is designed to complete the entity extraction algorithm for heterogeneous threat intelligence. In this paper, the GRU layer is added to the existing BERT-BiLSTM-CRF model, and we evaluate the proposed model on the marked dataset and get better performance than the current mainstream entity extraction mode.
APA, Harvard, Vancouver, ISO, and other styles
45

Sulaiman, Agus, and Marza Ihsan Marzuki. "Development of Streaming Media Security using Geolocation." Journal of Integrated and Advanced Engineering (JIAE) 2, no. 1 (March 18, 2022): 11–18. http://dx.doi.org/10.51662/jiae.v2i1.34.

Full text
Abstract:
Video streaming is digital data that is shared over the internet network. Streaming video through security protection techniques creates a security that is expected to protect intellectual property rights because there is data transfer through the internet. The use of password-based and token-based authentication is a security technology widely used in exchanging data and information between the client and server. However, this method is currently not sufficient to represent a security system using a Geographic Information System. Geolocation is a system or designation of geographic location in a world on an object that is connected via the internet network. IP geolocation can be used to define a particular IP address based on the geographic location from which the device is connected to the internet. The benefit of applying this technology is that each individual or organization can identify the location of a device connected to the internet. The study will use applied research and quantitative data with the implementation of a Geographic Information System that includes the creation of a security architecture on video streaming using Geolocation and test variables that can be used as a basis for analysis to describe the results of the testers. The test results with a random access server system from 50 countries with a blacklist and whitelist grouping mapping system show a success rate of 80%. Based on the results obtained from the use of live streaming security with Geolocation, it can be implemented to improve the security system.
APA, Harvard, Vancouver, ISO, and other styles
46

Hajok, Daniel. "Was finden Kinder bei f r a g F i n n? Eine Studie gibt Auskunft zur Zusammensetzung der Whitelist und Perspektive junger Nutzer auf ausgewählte Inhalte." Jugend Medien Schutz-Report 35, no. 2 (2012): 9. http://dx.doi.org/10.5771/0170-5067-2012-2-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Piper, Adrian. "Whiteless." Art Journal 60, no. 4 (December 2001): 62–67. http://dx.doi.org/10.1080/00043249.2001.10792097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Huh, Jun Ho, John Lyle, Cornelius Namiluko, and Andrew Martin. "Managing application whitelists in trusted distributed systems." Future Generation Computer Systems 27, no. 2 (February 2011): 211–26. http://dx.doi.org/10.1016/j.future.2010.08.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Kang, DongHo, ByoungKoo Kim, JungChan Na, and KyoungSon Jhang. "Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks." Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/597697.

Full text
Abstract:
Internet of Things (IoT) consists of several tiny devices connected together to form a collaborative computing environment. Recently IoT technologies begin to merge with supervisory control and data acquisition (SCADA) sensor networks to more efficiently gather and analyze real-time data from sensors in industrial environments. But SCADA sensor networks are becoming more and more vulnerable to cyber-attacks due to increased connectivity. To safely adopt IoT technologies in the SCADA environments, it is important to improve the security of SCADA sensor networks. In this paper we propose a multiple filtering technique based on whitelists to detect illegitimate packets. Our proposed system detects the traffic of network and application protocol attacks with a set of whitelists collected from normal traffic.
APA, Harvard, Vancouver, ISO, and other styles
50

Griffin, Clare. "Mentoring young people leaving care." Children Australia 31, no. 3 (2006): 59. http://dx.doi.org/10.1017/s1035077200011251.

Full text
Abstract:
‘Whitelion’ is a non profit organisation that supports disadvantaged young people and helps make our community a more inclusive and safer place. Each year thousands of youths are disconnected from their families and our community due to abuse, neglect, drug addiction and poverty. These young people have often had horrific life experiences with few positive role models and are caught in a ‘cycle of discouragement’. Many of them end up in out-of-home care or the juvenile justice system. Whitelion gives them the best chance to ‘break the cycle’ through positive role modelling, mentoring and employment, and the opportunity to build positive lives for themselves.Clare Griffin is the Mentoring Team Leader at Whitelion. She has worked with young people involved with the out-of-home care system in a variety of roles over the past eight years.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography