Статті в журналах з теми "Whitelist"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Whitelist".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Kim, DaeYoub, and Jihoon Lee. "Blacklist vs. Whitelist-Based Ransomware Solutions." IEEE Consumer Electronics Magazine 9, no. 3 (May 1, 2020): 22–28. http://dx.doi.org/10.1109/mce.2019.2956192.
Повний текст джерелаชัยกังวาฬ, กรวิชญ์, ณัฐพัชร์ วัฒนชาญสิทธิ์, สุรศักดิ์ สงวนพงษ์, พีรวัฒน์ วัฒนพงศ์ та พิรุณ ศรีสว่าง. "การตรวจสอบอุปกรณ์ที่ติดบอตเน็ตโดยวิเคราะห์ข้อมูลจราจรดีเอ็นเอส". วารสารงานวิจัยและพัฒนาเชิงประยุกต์ โดยสมาคม ECTI 1, № 2 (29 серпня 2021): 36–43. http://dx.doi.org/10.37936/ectiard.2021-1-2.244240.
Повний текст джерелаTakaki, Osamu, Ichiro Suzuta, Kota Torikai, Yuichiro Saito, Tsuyoshi Kato, Tetsuya Sato, Hiroki Endo, and Yoshifumi Atarashi. "Evaluation of a Network Switch with Whitelist-Based Packet Monitoring and Control in Hospital Networks." Advanced Engineering Forum 38 (November 2020): 222–32. http://dx.doi.org/10.4028/www.scientific.net/aef.38.222.
Повний текст джерелаAzeez, Nureni Ayofe, Sanjay Misra, Ihotu Agbo Margaret, Luis Fernandez-Sanz, and Shafi'i Muhammad Abdulhamid. "Adopting automated whitelist approach for detecting phishing attacks." Computers & Security 108 (September 2021): 102328. http://dx.doi.org/10.1016/j.cose.2021.102328.
Повний текст джерелаYoo, Hyunguk, Jeong-Han Yun, and Taeshik Shon. "Whitelist-Based Anomaly Detection for Industrial Control System Security." Journal of Korean Institute of Communications and Information Sciences 38B, no. 8 (August 30, 2013): 641–53. http://dx.doi.org/10.7840/kics.2013.38b.8.641.
Повний текст джерелаPratama, Januar Ariq. "Implementation of Network Security with the Whitelist Method on the Server of the Department of Electrical Engineering at State Polytechnic of Malang." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 8, no. 1 (March 1, 2019): 56–61. http://dx.doi.org/10.33795/jartel.v8i1.166.
Повний текст джерелаKim, Chang-Hong, Jeong-Hyun Yi, and Jong-Bae Kim. "The Endpoint Application Execution Control Scheme based on the Whitelist." International Journal of Control and Automation 8, no. 4 (April 30, 2015): 83–88. http://dx.doi.org/10.14257/ijca.2015.8.4.10.
Повний текст джерелаFUJITA, Shintaro, Kenji SAWADA, Seiichi SHIN, and Shu HOSOKAWA. "On Auto-generation Method of Whitelist for PLC Operation Sequence." Transactions of the Society of Instrument and Control Engineers 57, no. 8 (2021): 367–77. http://dx.doi.org/10.9746/sicetr.57.367.
Повний текст джерелаTang, Yi, Zhao Kai Luo, and Ji Zhang. "UOFilter: A Whitelist-Based Filter for Unintended Objects in Web Pages." Applied Mechanics and Materials 519-520 (February 2014): 373–76. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.373.
Повний текст джерелаBisaccio, Michael. "Cabells’ Journal Whitelist and Blacklist: Intelligent data for informed journal evaluations." Learned Publishing 31, no. 3 (April 19, 2018): 243–48. http://dx.doi.org/10.1002/leap.1164.
Повний текст джерелаKim, Young-Gab, Minsoo Lee, Sanghyun Cho, and Sungdeok Cha. "A quantitative approach to estimate a website security risk using whitelist." Security and Communication Networks 5, no. 10 (February 6, 2012): 1181–92. http://dx.doi.org/10.1002/sec.420.
Повний текст джерелаNgwogu, Onyeabor Onyekachi, and Suk-Jun Lim. "Media Presentation of Japan-Korea Whitelist and GSOMIA Dispute: A Content Analysis." JOURNAL OF INTERNATIONAL RELATIONS 23, no. 2 (June 30, 2020): 31–49. http://dx.doi.org/10.15235/jir.2020.06.23.2.31.
Повний текст джерелаSirait, Emyana Ruth Eritha. "Respon Masyarakat terhadap Sistem Whitelist: Alternatif untuk Akses Internet yang Lebih Aman." Jurnal PIKOM (Penelitian Komunikasi dan Pembangunan) 17, no. 2 (January 18, 2017): 127. http://dx.doi.org/10.31346/jpikom.v17i2.705.
Повний текст джерелаSirait, Emyana Ruth Eritha. "Respon Masyarakat terhadap Sistem Whitelist: Alternatif untuk Akses Internet yang Lebih Aman." Jurnal Penelitian Komunikasi dan Pembangunan 17, no. 2 (January 18, 2017): 127. http://dx.doi.org/10.31346/jpkp.v17i2.705.
Повний текст джерелаPark, Jungsoo, Minho Park, and Souhwan Jung. "A Whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device." Journal of Korean Institute of Communications and Information Sciences 38B, no. 8 (August 30, 2013): 632–40. http://dx.doi.org/10.7840/kics.2013.38b.8.632.
Повний текст джерелаShang, Wen Li, Sheng Shan Zhang, and Ming Wan. "Modbus/TCP Communication Anomaly Detection Based on PSO-SVM." Applied Mechanics and Materials 490-491 (January 2014): 1745–53. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1745.
Повний текст джерелаDanko, O. S., and T. A. Medvedeva. "Exploring the impact of similarity index on the accuracy of a phishing site detection model using machine learning." Journal of Physics: Conference Series 2131, no. 2 (December 1, 2021): 022076. http://dx.doi.org/10.1088/1742-6596/2131/2/022076.
Повний текст джерелаKim, Ju-Wan, Jea-Tek Ryu, Ki-Yeol Ryu, and Byeong-Hee Roh. "A Countermeasure Scheme Based on Whitelist using Bloom Filter against SIP DDoS Attacks." Journal of Korea Information and Communications Society 36, no. 11B (November 30, 2011): 1297–304. http://dx.doi.org/10.7840/kics.2011.36b.11.1297.
Повний текст джерелаWu, Chun-Jung, Ying Tie, Satoshi Hara, Kazuki Tamiya, Akira Fujita, Katsunari Yoshioka, and Tsutomu Matsumoto. "IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices." Journal of Information Processing 26 (2018): 662–72. http://dx.doi.org/10.2197/ipsjjip.26.662.
Повний текст джерелаRoh, Byeong-hee, Ju Wan Kim, Ki-Yeol Ryu, and Jea-Tek Ryu. "A whitelist-based countermeasure scheme using a Bloom filter against SIP flooding attacks." Computers & Security 37 (September 2013): 46–61. http://dx.doi.org/10.1016/j.cose.2013.04.001.
Повний текст джерелаJiang, Jianfeng. "Research on Application of Idc Virtualization Security Technology Based on Host Whitelist Protection." Journal of Physics: Conference Series 1915, no. 3 (May 1, 2021): 032011. http://dx.doi.org/10.1088/1742-6596/1915/3/032011.
Повний текст джерелаMathew, Alexander, Gayatri Moindi, Ketan Bende, and Neha Singh. "Credit Card Fraud Prediction System." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 3 (March 31, 2015): 30–35. http://dx.doi.org/10.53555/nncse.v2i3.481.
Повний текст джерелаAkinyelu, Andronicus A. "Machine Learning and Nature Inspired Based Phishing Detection: A Literature Survey." International Journal on Artificial Intelligence Tools 28, no. 05 (August 2019): 1930002. http://dx.doi.org/10.1142/s0218213019300023.
Повний текст джерелаTeixeira da Silva, Jaime A. "UPDATES ON INFORMATION REGARDING THE DIRECTORY OF OPEN ACCESS JOURNALS PLATFORM MAY INCREASE ITS RELIABILITY." Central Asian Journal of Medical Hypotheses and Ethics 2, no. 3 (October 5, 2021): 162–65. http://dx.doi.org/10.47316/cajmhe.2021.2.3.05.
Повний текст джерелаIndrawan, B., and Y. Kerlooza. "The Development of the Education Related Multimedia Whitelist Filter using Cache Proxy Log Analysis." IOP Conference Series: Materials Science and Engineering 407 (September 26, 2018): 012125. http://dx.doi.org/10.1088/1757-899x/407/1/012125.
Повний текст джерелаJi, Shujuan, Haiyan Ma, Yongquan Liang, Hofung Leung, and Chunjin Zhang. "A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks." Applied Intelligence 47, no. 4 (May 13, 2017): 1115–31. http://dx.doi.org/10.1007/s10489-017-0944-x.
Повний текст джерелаDoke, Tanmay, Pranav Khismatrao, Vaibhav Jambhale, and Nilesh Marathe. "Phishing-Inspector: Detection & Prevention of Phishing Websites." ITM Web of Conferences 32 (2020): 03004. http://dx.doi.org/10.1051/itmconf/20203203004.
Повний текст джерелаIIZUKA, Yamato, Tamotsu MURAKAMI, Kazutaka UEDA, and Yasunobu SANO. "Safety and Usability Problem Detection by Whitelist Approach Based on Gap between Designer and User." Proceedings of Design & Systems Conference 2016.26 (2016): 1103. http://dx.doi.org/10.1299/jsmedsd.2016.26.1103.
Повний текст джерелаSudharsan, N. S., and K. Latha. "Preeminent System for Detecting Venomous Banking Sites in Online Business." Applied Mechanics and Materials 573 (June 2014): 519–22. http://dx.doi.org/10.4028/www.scientific.net/amm.573.519.
Повний текст джерелаJi, Shujuan, Haiyan Ma, Yongquan Liang, Hofung Leung, and Chunjin Zhang. "Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks." Applied Intelligence 48, no. 7 (May 12, 2018): 1891. http://dx.doi.org/10.1007/s10489-018-1195-1.
Повний текст джерелаLi, Linfeng, Eleni Berki, Marko Helenius, and Saila Ovaska. "Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate?" Behaviour & Information Technology 33, no. 11 (January 31, 2014): 1136–47. http://dx.doi.org/10.1080/0144929x.2013.875221.
Повний текст джерелаCho, Chaeho, Yeonsang Seong, and Yoojae Won. "Mandatory Access Control Method for Windows Embedded OS Security." Electronics 10, no. 20 (October 12, 2021): 2478. http://dx.doi.org/10.3390/electronics10202478.
Повний текст джерелаKim, Boungjin, and Sangjun Lee. "Improvement of Methods for Discriminating Harmful Web Sites by using Link Relations between Web Sites and Constructing Whitelist." KIISE Transactions on Computing Practices 25, no. 10 (October 31, 2019): 506–10. http://dx.doi.org/10.5626/ktcp.2019.25.10.506.
Повний текст джерелаWang, Yunmin, Abla Smahi, Huayu Zhang, and Hui Li. "Towards Double Defense Network Security Based on Multi-Identifier Network Architecture." Sensors 22, no. 3 (January 19, 2022): 747. http://dx.doi.org/10.3390/s22030747.
Повний текст джерелаBen Stewart S., Dhanush N., Santhosh G., and Angelin Gladston. "Efficient Client-Side Cross-Platform Compatible Solution for Phishing Prevention." International Journal of Cyber Warfare and Terrorism 12, no. 1 (January 2022): 1–24. http://dx.doi.org/10.4018/ijcwt.297855.
Повний текст джерелаBehairy, Hatim, Waleed Alrobian, Adnan Alghammas, Amr Alasaad, Brian Suter, Mohammed Alshareef, and Yahya Alsuwayyeh. "Selective Mobile Communication within a Coverage Area Bounded by Radiating Cables." Mobile Information Systems 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/138067.
Повний текст джерелаMughees, Muhammad Haris, Zhiyun Qian, and Zubair Shafiq. "Detecting Anti Ad-blockers in the Wild." Proceedings on Privacy Enhancing Technologies 2017, no. 3 (July 1, 2017): 130–46. http://dx.doi.org/10.1515/popets-2017-0032.
Повний текст джерелаPratama, Bahar Budi, Dedik Tri Istiantara, Bambang Gunari, and Teguh Arifianto. "SISTEM SECURITY JARINGAN ETHERNET PADA PROTOTYPE STASIUN KERETA API YANG TERINTEGRASI DENGAN INTERLOCKING." Jurnal Mnemonic 3, no. 2 (September 14, 2020): 30–36. http://dx.doi.org/10.36040/mnemonic.v3i2.2819.
Повний текст джерелаAndiani, Andiani, and M. Farhan Zidni L. "DASHBOARD INFORMATION SYSTEM OF PEMINJAMAN UANG (PINANG) APPLICATION." Jurnal Riset Informatika 3, no. 1 (December 8, 2020): 67–76. http://dx.doi.org/10.34288/jri.v3i1.220.
Повний текст джерелаSteinbrener, Stefan V. "Patentable subject matter under Article 52(2) and (3) EPC: a whitelist of positive cases from the EPO Boards of Appeal—Part 1." Journal of Intellectual Property Law & Practice 13, no. 1 (August 18, 2017): 13–35. http://dx.doi.org/10.1093/jiplp/jpx139.
Повний текст джерелаSteinbrener, Stefan V. "Patentable subject matter under Article 52(2) and (3) EPC: a whitelist of positive cases from the EPO Boards of Appeal—Part 2." Journal of Intellectual Property Law & Practice 13, no. 2 (September 29, 2017): 103–19. http://dx.doi.org/10.1093/jiplp/jpx145.
Повний текст джерелаChoi, Ye-Jin, Hee-Jung Kang, and Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7 (July 3, 2019): 752. http://dx.doi.org/10.3390/electronics8070752.
Повний текст джерелаA. Hassen, Oday, Ansam A. Abdulhussein, Saad M. Darwish, Zulaiha Ali Othman, Sabrina Tiun, and Yasmin A. Lotfy. "Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network." Symmetry 12, no. 10 (October 15, 2020): 1699. http://dx.doi.org/10.3390/sym12101699.
Повний текст джерелаZhou, Yinghai, Yi Tang, Ming Yi, Chuanyu Xi, and Hai Lu. "CTI View: APT Threat Intelligence Analysis System." Security and Communication Networks 2022 (January 3, 2022): 1–15. http://dx.doi.org/10.1155/2022/9875199.
Повний текст джерелаSulaiman, Agus, and Marza Ihsan Marzuki. "Development of Streaming Media Security using Geolocation." Journal of Integrated and Advanced Engineering (JIAE) 2, no. 1 (March 18, 2022): 11–18. http://dx.doi.org/10.51662/jiae.v2i1.34.
Повний текст джерелаHajok, Daniel. "Was finden Kinder bei f r a g F i n n? Eine Studie gibt Auskunft zur Zusammensetzung der Whitelist und Perspektive junger Nutzer auf ausgewählte Inhalte." Jugend Medien Schutz-Report 35, no. 2 (2012): 9. http://dx.doi.org/10.5771/0170-5067-2012-2-9.
Повний текст джерелаPiper, Adrian. "Whiteless." Art Journal 60, no. 4 (December 2001): 62–67. http://dx.doi.org/10.1080/00043249.2001.10792097.
Повний текст джерелаHuh, Jun Ho, John Lyle, Cornelius Namiluko, and Andrew Martin. "Managing application whitelists in trusted distributed systems." Future Generation Computer Systems 27, no. 2 (February 2011): 211–26. http://dx.doi.org/10.1016/j.future.2010.08.014.
Повний текст джерелаKang, DongHo, ByoungKoo Kim, JungChan Na, and KyoungSon Jhang. "Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks." Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/597697.
Повний текст джерелаGriffin, Clare. "Mentoring young people leaving care." Children Australia 31, no. 3 (2006): 59. http://dx.doi.org/10.1017/s1035077200011251.
Повний текст джерела