Journal articles on the topic 'Whitelist'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Whitelist.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kim, DaeYoub, and Jihoon Lee. "Blacklist vs. Whitelist-Based Ransomware Solutions." IEEE Consumer Electronics Magazine 9, no. 3 (May 1, 2020): 22–28. http://dx.doi.org/10.1109/mce.2019.2956192.
Full textชัยกังวาฬ, กรวิชญ์, ณัฐพัชร์ วัฒนชาญสิทธิ์, สุรศักดิ์ สงวนพงษ์, พีรวัฒน์ วัฒนพงศ์, and พิรุณ ศรีสว่าง. "การตรวจสอบอุปกรณ์ที่ติดบอตเน็ตโดยวิเคราะห์ข้อมูลจราจรดีเอ็นเอส." วารสารงานวิจัยและพัฒนาเชิงประยุกต์ โดยสมาคม ECTI 1, no. 2 (August 29, 2021): 36–43. http://dx.doi.org/10.37936/ectiard.2021-1-2.244240.
Full textTakaki, Osamu, Ichiro Suzuta, Kota Torikai, Yuichiro Saito, Tsuyoshi Kato, Tetsuya Sato, Hiroki Endo, and Yoshifumi Atarashi. "Evaluation of a Network Switch with Whitelist-Based Packet Monitoring and Control in Hospital Networks." Advanced Engineering Forum 38 (November 2020): 222–32. http://dx.doi.org/10.4028/www.scientific.net/aef.38.222.
Full textAzeez, Nureni Ayofe, Sanjay Misra, Ihotu Agbo Margaret, Luis Fernandez-Sanz, and Shafi'i Muhammad Abdulhamid. "Adopting automated whitelist approach for detecting phishing attacks." Computers & Security 108 (September 2021): 102328. http://dx.doi.org/10.1016/j.cose.2021.102328.
Full textYoo, Hyunguk, Jeong-Han Yun, and Taeshik Shon. "Whitelist-Based Anomaly Detection for Industrial Control System Security." Journal of Korean Institute of Communications and Information Sciences 38B, no. 8 (August 30, 2013): 641–53. http://dx.doi.org/10.7840/kics.2013.38b.8.641.
Full textPratama, Januar Ariq. "Implementation of Network Security with the Whitelist Method on the Server of the Department of Electrical Engineering at State Polytechnic of Malang." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 8, no. 1 (March 1, 2019): 56–61. http://dx.doi.org/10.33795/jartel.v8i1.166.
Full textKim, Chang-Hong, Jeong-Hyun Yi, and Jong-Bae Kim. "The Endpoint Application Execution Control Scheme based on the Whitelist." International Journal of Control and Automation 8, no. 4 (April 30, 2015): 83–88. http://dx.doi.org/10.14257/ijca.2015.8.4.10.
Full textFUJITA, Shintaro, Kenji SAWADA, Seiichi SHIN, and Shu HOSOKAWA. "On Auto-generation Method of Whitelist for PLC Operation Sequence." Transactions of the Society of Instrument and Control Engineers 57, no. 8 (2021): 367–77. http://dx.doi.org/10.9746/sicetr.57.367.
Full textTang, Yi, Zhao Kai Luo, and Ji Zhang. "UOFilter: A Whitelist-Based Filter for Unintended Objects in Web Pages." Applied Mechanics and Materials 519-520 (February 2014): 373–76. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.373.
Full textBisaccio, Michael. "Cabells’ Journal Whitelist and Blacklist: Intelligent data for informed journal evaluations." Learned Publishing 31, no. 3 (April 19, 2018): 243–48. http://dx.doi.org/10.1002/leap.1164.
Full textKim, Young-Gab, Minsoo Lee, Sanghyun Cho, and Sungdeok Cha. "A quantitative approach to estimate a website security risk using whitelist." Security and Communication Networks 5, no. 10 (February 6, 2012): 1181–92. http://dx.doi.org/10.1002/sec.420.
Full textNgwogu, Onyeabor Onyekachi, and Suk-Jun Lim. "Media Presentation of Japan-Korea Whitelist and GSOMIA Dispute: A Content Analysis." JOURNAL OF INTERNATIONAL RELATIONS 23, no. 2 (June 30, 2020): 31–49. http://dx.doi.org/10.15235/jir.2020.06.23.2.31.
Full textSirait, Emyana Ruth Eritha. "Respon Masyarakat terhadap Sistem Whitelist: Alternatif untuk Akses Internet yang Lebih Aman." Jurnal PIKOM (Penelitian Komunikasi dan Pembangunan) 17, no. 2 (January 18, 2017): 127. http://dx.doi.org/10.31346/jpikom.v17i2.705.
Full textSirait, Emyana Ruth Eritha. "Respon Masyarakat terhadap Sistem Whitelist: Alternatif untuk Akses Internet yang Lebih Aman." Jurnal Penelitian Komunikasi dan Pembangunan 17, no. 2 (January 18, 2017): 127. http://dx.doi.org/10.31346/jpkp.v17i2.705.
Full textPark, Jungsoo, Minho Park, and Souhwan Jung. "A Whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device." Journal of Korean Institute of Communications and Information Sciences 38B, no. 8 (August 30, 2013): 632–40. http://dx.doi.org/10.7840/kics.2013.38b.8.632.
Full textShang, Wen Li, Sheng Shan Zhang, and Ming Wan. "Modbus/TCP Communication Anomaly Detection Based on PSO-SVM." Applied Mechanics and Materials 490-491 (January 2014): 1745–53. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1745.
Full textDanko, O. S., and T. A. Medvedeva. "Exploring the impact of similarity index on the accuracy of a phishing site detection model using machine learning." Journal of Physics: Conference Series 2131, no. 2 (December 1, 2021): 022076. http://dx.doi.org/10.1088/1742-6596/2131/2/022076.
Full textKim, Ju-Wan, Jea-Tek Ryu, Ki-Yeol Ryu, and Byeong-Hee Roh. "A Countermeasure Scheme Based on Whitelist using Bloom Filter against SIP DDoS Attacks." Journal of Korea Information and Communications Society 36, no. 11B (November 30, 2011): 1297–304. http://dx.doi.org/10.7840/kics.2011.36b.11.1297.
Full textWu, Chun-Jung, Ying Tie, Satoshi Hara, Kazuki Tamiya, Akira Fujita, Katsunari Yoshioka, and Tsutomu Matsumoto. "IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices." Journal of Information Processing 26 (2018): 662–72. http://dx.doi.org/10.2197/ipsjjip.26.662.
Full textRoh, Byeong-hee, Ju Wan Kim, Ki-Yeol Ryu, and Jea-Tek Ryu. "A whitelist-based countermeasure scheme using a Bloom filter against SIP flooding attacks." Computers & Security 37 (September 2013): 46–61. http://dx.doi.org/10.1016/j.cose.2013.04.001.
Full textJiang, Jianfeng. "Research on Application of Idc Virtualization Security Technology Based on Host Whitelist Protection." Journal of Physics: Conference Series 1915, no. 3 (May 1, 2021): 032011. http://dx.doi.org/10.1088/1742-6596/1915/3/032011.
Full textMathew, Alexander, Gayatri Moindi, Ketan Bende, and Neha Singh. "Credit Card Fraud Prediction System." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 3 (March 31, 2015): 30–35. http://dx.doi.org/10.53555/nncse.v2i3.481.
Full textAkinyelu, Andronicus A. "Machine Learning and Nature Inspired Based Phishing Detection: A Literature Survey." International Journal on Artificial Intelligence Tools 28, no. 05 (August 2019): 1930002. http://dx.doi.org/10.1142/s0218213019300023.
Full textTeixeira da Silva, Jaime A. "UPDATES ON INFORMATION REGARDING THE DIRECTORY OF OPEN ACCESS JOURNALS PLATFORM MAY INCREASE ITS RELIABILITY." Central Asian Journal of Medical Hypotheses and Ethics 2, no. 3 (October 5, 2021): 162–65. http://dx.doi.org/10.47316/cajmhe.2021.2.3.05.
Full textIndrawan, B., and Y. Kerlooza. "The Development of the Education Related Multimedia Whitelist Filter using Cache Proxy Log Analysis." IOP Conference Series: Materials Science and Engineering 407 (September 26, 2018): 012125. http://dx.doi.org/10.1088/1757-899x/407/1/012125.
Full textJi, Shujuan, Haiyan Ma, Yongquan Liang, Hofung Leung, and Chunjin Zhang. "A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks." Applied Intelligence 47, no. 4 (May 13, 2017): 1115–31. http://dx.doi.org/10.1007/s10489-017-0944-x.
Full textDoke, Tanmay, Pranav Khismatrao, Vaibhav Jambhale, and Nilesh Marathe. "Phishing-Inspector: Detection & Prevention of Phishing Websites." ITM Web of Conferences 32 (2020): 03004. http://dx.doi.org/10.1051/itmconf/20203203004.
Full textIIZUKA, Yamato, Tamotsu MURAKAMI, Kazutaka UEDA, and Yasunobu SANO. "Safety and Usability Problem Detection by Whitelist Approach Based on Gap between Designer and User." Proceedings of Design & Systems Conference 2016.26 (2016): 1103. http://dx.doi.org/10.1299/jsmedsd.2016.26.1103.
Full textSudharsan, N. S., and K. Latha. "Preeminent System for Detecting Venomous Banking Sites in Online Business." Applied Mechanics and Materials 573 (June 2014): 519–22. http://dx.doi.org/10.4028/www.scientific.net/amm.573.519.
Full textJi, Shujuan, Haiyan Ma, Yongquan Liang, Hofung Leung, and Chunjin Zhang. "Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks." Applied Intelligence 48, no. 7 (May 12, 2018): 1891. http://dx.doi.org/10.1007/s10489-018-1195-1.
Full textLi, Linfeng, Eleni Berki, Marko Helenius, and Saila Ovaska. "Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate?" Behaviour & Information Technology 33, no. 11 (January 31, 2014): 1136–47. http://dx.doi.org/10.1080/0144929x.2013.875221.
Full textCho, Chaeho, Yeonsang Seong, and Yoojae Won. "Mandatory Access Control Method for Windows Embedded OS Security." Electronics 10, no. 20 (October 12, 2021): 2478. http://dx.doi.org/10.3390/electronics10202478.
Full textKim, Boungjin, and Sangjun Lee. "Improvement of Methods for Discriminating Harmful Web Sites by using Link Relations between Web Sites and Constructing Whitelist." KIISE Transactions on Computing Practices 25, no. 10 (October 31, 2019): 506–10. http://dx.doi.org/10.5626/ktcp.2019.25.10.506.
Full textWang, Yunmin, Abla Smahi, Huayu Zhang, and Hui Li. "Towards Double Defense Network Security Based on Multi-Identifier Network Architecture." Sensors 22, no. 3 (January 19, 2022): 747. http://dx.doi.org/10.3390/s22030747.
Full textBen Stewart S., Dhanush N., Santhosh G., and Angelin Gladston. "Efficient Client-Side Cross-Platform Compatible Solution for Phishing Prevention." International Journal of Cyber Warfare and Terrorism 12, no. 1 (January 2022): 1–24. http://dx.doi.org/10.4018/ijcwt.297855.
Full textBehairy, Hatim, Waleed Alrobian, Adnan Alghammas, Amr Alasaad, Brian Suter, Mohammed Alshareef, and Yahya Alsuwayyeh. "Selective Mobile Communication within a Coverage Area Bounded by Radiating Cables." Mobile Information Systems 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/138067.
Full textMughees, Muhammad Haris, Zhiyun Qian, and Zubair Shafiq. "Detecting Anti Ad-blockers in the Wild." Proceedings on Privacy Enhancing Technologies 2017, no. 3 (July 1, 2017): 130–46. http://dx.doi.org/10.1515/popets-2017-0032.
Full textPratama, Bahar Budi, Dedik Tri Istiantara, Bambang Gunari, and Teguh Arifianto. "SISTEM SECURITY JARINGAN ETHERNET PADA PROTOTYPE STASIUN KERETA API YANG TERINTEGRASI DENGAN INTERLOCKING." Jurnal Mnemonic 3, no. 2 (September 14, 2020): 30–36. http://dx.doi.org/10.36040/mnemonic.v3i2.2819.
Full textAndiani, Andiani, and M. Farhan Zidni L. "DASHBOARD INFORMATION SYSTEM OF PEMINJAMAN UANG (PINANG) APPLICATION." Jurnal Riset Informatika 3, no. 1 (December 8, 2020): 67–76. http://dx.doi.org/10.34288/jri.v3i1.220.
Full textSteinbrener, Stefan V. "Patentable subject matter under Article 52(2) and (3) EPC: a whitelist of positive cases from the EPO Boards of Appeal—Part 1." Journal of Intellectual Property Law & Practice 13, no. 1 (August 18, 2017): 13–35. http://dx.doi.org/10.1093/jiplp/jpx139.
Full textSteinbrener, Stefan V. "Patentable subject matter under Article 52(2) and (3) EPC: a whitelist of positive cases from the EPO Boards of Appeal—Part 2." Journal of Intellectual Property Law & Practice 13, no. 2 (September 29, 2017): 103–19. http://dx.doi.org/10.1093/jiplp/jpx145.
Full textChoi, Ye-Jin, Hee-Jung Kang, and Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7 (July 3, 2019): 752. http://dx.doi.org/10.3390/electronics8070752.
Full textA. Hassen, Oday, Ansam A. Abdulhussein, Saad M. Darwish, Zulaiha Ali Othman, Sabrina Tiun, and Yasmin A. Lotfy. "Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network." Symmetry 12, no. 10 (October 15, 2020): 1699. http://dx.doi.org/10.3390/sym12101699.
Full textZhou, Yinghai, Yi Tang, Ming Yi, Chuanyu Xi, and Hai Lu. "CTI View: APT Threat Intelligence Analysis System." Security and Communication Networks 2022 (January 3, 2022): 1–15. http://dx.doi.org/10.1155/2022/9875199.
Full textSulaiman, Agus, and Marza Ihsan Marzuki. "Development of Streaming Media Security using Geolocation." Journal of Integrated and Advanced Engineering (JIAE) 2, no. 1 (March 18, 2022): 11–18. http://dx.doi.org/10.51662/jiae.v2i1.34.
Full textHajok, Daniel. "Was finden Kinder bei f r a g F i n n? Eine Studie gibt Auskunft zur Zusammensetzung der Whitelist und Perspektive junger Nutzer auf ausgewählte Inhalte." Jugend Medien Schutz-Report 35, no. 2 (2012): 9. http://dx.doi.org/10.5771/0170-5067-2012-2-9.
Full textPiper, Adrian. "Whiteless." Art Journal 60, no. 4 (December 2001): 62–67. http://dx.doi.org/10.1080/00043249.2001.10792097.
Full textHuh, Jun Ho, John Lyle, Cornelius Namiluko, and Andrew Martin. "Managing application whitelists in trusted distributed systems." Future Generation Computer Systems 27, no. 2 (February 2011): 211–26. http://dx.doi.org/10.1016/j.future.2010.08.014.
Full textKang, DongHo, ByoungKoo Kim, JungChan Na, and KyoungSon Jhang. "Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks." Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/597697.
Full textGriffin, Clare. "Mentoring young people leaving care." Children Australia 31, no. 3 (2006): 59. http://dx.doi.org/10.1017/s1035077200011251.
Full text