Search

Your search keyword '"Whitelist"' showing total 269 results

Search Constraints

Start Over You searched for: Descriptor "Whitelist" Remove constraint Descriptor: "Whitelist"
269 results on '"Whitelist"'

Search Results

1. Combating Man-in-the-Middle Attacks within IoT Systems.

3. Hardening Containers with Static and Dynamic Analysis

4. Detection of Anomalies and Attacks in Container Systems: An Integrated Approach Based on Black and White Lists

5. Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data.

6. Top of the Pops: A Novel Whitelist Generation Scheme for Data Exfiltration Detection

10. Security Improvement of File System Filter Driver in Windows Embedded OS.

11. OpenPLC based control system testbed for PLC whitelisting system.

12. Detecting and Mitigating DDoS Attacks in SDN Using Spatial-Temporal Graph Convolutional Network

13. PhiDMA – A phishing detection model with multi-filter approach.

16. Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network

18. Navigating the Gray of Academic Publication

19. IoTD: An approach to identify E-mails sent by IoT devices

20. Phishing-Inspector: Detection & Prevention of Phishing Websites

21. A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era

22. Cabells Scholarly Analytics

23. A Study on the Detection Method for Malicious URLs Based on a Number of Search Results Matching the Internet Search Engines Combining the Machine Learning

24. On Auto-generation Method of Whitelist for PLC Operation Sequence

25. Publishing in black and white: the relevance of listing of scientific journals.

26. Hardware Trojan Free Netlist Identification: A Clustering Approach

27. OpenPLC based control system testbed for PLC whitelisting system

28. OpenPLC based control system testbed for PLC whitelisting system

29. DASHBOARD INFORMATION SYSTEM OF PEMINJAMAN UANG (PINANG) APPLICATION

30. Evaluation of a Network Switch with Whitelist-Based Packet Monitoring and Control in Hospital Networks

32. Avoiding predatory publishing for early career neurosurgeons: what should you know before you submit?

34. Blacklist vs. Whitelist-Based Ransomware Solutions

35. A W-EAP Algorithm for IEC 61850 Protocol against DoS/Replay Attack

36. Avoiding predatory publishing for early-career ophthalmologists

37. Spam Filtering at the Client E-mail Level

38. Prof-gen: Practical Study on System Call Whitelist Generation for Container Attack Surface Reduction

39. Detecting Phishing Websites Using Neural Network and Bayes Classifier

40. An Efficient Networking Approach for Broadband PLC Networks

41. Five-tier barrier anti-phishing scheme using hybrid approach.

42. Letting the right ones in: Whitelists, jurisdictional reputation, and the racial dynamics of online gambling regulation.

45. Implementation of Network Security with the Whitelist Method on the Server of the Department of Electrical Engineering at State Polytechnic of Malang

46. An empirical study of DLL injection bugs in the Firefox ecosystem

47. Malicious Domain Names Detection Algorithm Based on Lexical Analysis and Feature Quantification

48. Wikifying software artifacts

49. A call to eradicate non-inclusive terms from the life sciences

50. Tutorial and critical analysis of phishing websites methods.

Catalog

Books, media, physical & digital resources