Showing 1 - 20 results of 21 for search '"blacklist"', query time: 0.06s Refine Results
  1. 1
  2. 2
  3. 3

    Smart-blacklisting:an efficient methodology for mitigating fake block attack in P2P file-sharing systems by Ru-hao YAO, Bing-shuang LIU, De-shuai QU, Yuan ZHOU, Xin-hui HAN

    Published 2013-08-01
    “…Fake block attack intends to prolong the downloading time by providing fake data to make the file block fail in the hash check.P2P file-sharing systems are susceptible to fake block attacks,whereby malicious clients are able to make a big impact on users’ downloading experience.An efficient methodology named Smart-blacklisting,which aims to lessen the downloading time and bandwidth wastes interfered by the attack was proposed through using a mathematic model,and the efficiency of this method was analyzed during a simulation experiment.The ovel approach presents 87% downloading time and 50% bandwidth wastes compare less than those of eMule blacklisting method.…”
    Get full text
    Article
  4. 4
  5. 5

    SDN self-protection system based on Renyi entropy by Pu ZHAO, Wentao ZHAO, Zhangjie FU, Qiang LIU

    Published 2021-06-01
    “…Aiming at the abnormal behaviors in SDN architecture, a self-protection system based on Renyi entropy that implemented a set of detection, diagnosis and defense method of SDN abnormal behaviors was proposed.The system did not need to introduce the third-party measurement equipment, and directly used the flow table information of OpenFlow switches.Firstly, the abnormal network behavior was detected by calculating the characteristic entropy.Then, the information of the OpenFlow flow table was further analyzed to realize the diagnosis of abnormal behavior.Finally, a blacklist mechanism was established.And the system added the hosts with abnormal behavior to the blacklist and blocked the corresponding abnormal traffic.In order to verify the effectiveness of the system, a prototype was developed on the Floodlight controller.The simulation results on Mininet show that the system can effectively detect, diagnose and defend the abnormal behaviors.The system has low deployment cost, which enhances the security of SDN.…”
    Get full text
    Article
  6. 6

    Research of phishing detection technology by Xi ZHANG, Zhi-wei YAN, Hong-tao LI, Guang-gang GENG

    Published 2017-07-01
    “…The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included blacklist strategies,heuristic methods,visual matching methods,and methods based on machine learning and natural language processing.The comparison and analysis of those methods were given,and furtherly,the challenges and future trends of phishing detection were discussed.…”
    Get full text
    Article
  7. 7

    (Post)utopian Vineland: Ideological Conflicts in the 1960s and the 1980s by Lovorka Gruic Grmusa

    Published 2010-12-01
    “…It brings controversial aspects of U.S. history and culture into view: the blacklist period in the 1950s, the rise of counterculture and the hippie movement, and the politics of the eighties. …”
    Get full text
    Article
  8. 8

    APPLYING THE AUTOENCODER MODEL FOR URL PHISHING DETECTION by Dang Thi Mai

    Published 2024-12-01
    “…Traditional methods for detecting malicious URLs often rely on blacklist-based techniques. However, these techniques have significant limitations as they cannot identify new URLs. …”
    Get full text
    Article
  9. 9

    Analisis Kinerja Intrusion Detection System Berbasis Algoritma Random Forest Menggunakan Dataset Unbalanced Honeynet BSSN by Kuni Inayah, Kalamullah Ramli

    Published 2024-08-01
    “…Pada penelitian ini, diusulkan desain IDS berbasis algoritma random forest menggunakan dataset CIC-ToN-IoT sebagai dataset whitelist dan dataset Honeynet BSSN sebagai dataset blacklist. Model mengklasifikasikan 10 (sepuluh) klasifikasi yaitu Benign, Information Leak, Malware, Trojan Activity, Information Gathering, APT, Exploit, Web Application Attack, Denial of Service (DoS), dan jenis serangan lainnya (other). …”
    Get full text
    Article
  10. 10

    A New Rule-Based Approach for Classical Arabic in Natural Language Processing by Ramzi Salah, Muaadh Mukred, Lailatul Qadri binti Zakaria, Rashad Ahmed, Hasan Sari

    Published 2022-01-01
    “…The proposed method relied on triggers words, patterns, gazetteers, rules, and blacklists generated by the linguistic information about entities named in Arabic. …”
    Get full text
    Article
  11. 11

    A multi-source threat intelligence confidence value evaluation method based on machine learning by Hansheng LIU, Hongyu TANG, Mingxia BO, Jianfeng NIU, Tianbo LI, Lingxiao LI

    Published 2020-01-01
    “…During the collection process of multi-source threat intelligence,it is very hard for the intelligence center to make a scientific decision to massive intelligence because the data value density is low,the intelligence repeatabil-ity is high,and the ineffective time is very short,etc.Based on those problems,a new multi-source threat intelligence confidence value evaluation method was put forward based on machine learning.First of all,according to the STIX intelligence standard format,a multi-source intelligence data standardization process was designed.Secondly,ac-cording to the characteristic of data,14 characteristics were extracted from four dimensions of publishing time,source,intelligence content and blacklist matching degree to be the basis of determining the intelligence reliability.After getting the feature encoding,an intelligence confidence value evaluation model was designed based on deep neural network algorithm and Softmax classifier.Backward propagation algorithm was also used to minimize recon-struction error.Last but not least,according to the 2 000 open source marked sample data,k-ford cross-validation method was used to evaluate the model and get an average of 91.37% macro-P rate and 84.89% macro-R rate.It was a good reference for multi-source threat intelligence confidence evaluation.…”
    Get full text
    Article
  12. 12

    Assessing the volume of money laundering in Iran’s economy using the capital flight approach by Mahsa Saeedi Goraghani, Kazem Yavari

    Published 2024-12-01
    “…Iran, due to being in the financial Action Task Force (FATF) blacklist, is considered a free zone from this perspective. …”
    Get full text
    Article
  13. 13

    RETRACTED: Reward dan punishment sebagai faktor-faktor determinan kepuasan kerja by Mardalena Mardalena, Sarinah Sarinah, Yesi Elfisa

    Published 2022-12-01
    “…The author and his/her affiliation will be blacklisted for publication in this journal in the future. …”
    Get full text
    Article
  14. 14

    Le genre féerique illustré à l’époque victorienne : splendeurs et déclin d’un genre entré en résistance by Audrey Doussot

    Published 2012-06-01
    “…After having been blacklisted for decades, fairy tales unexpectedly came back into favour in Great Britain during the Victorian period, being staunchly supported by authors like Ruskin, Dickens or MacDonald. …”
    Get full text
    Article
  15. 15

    La presse italienne, le pouvoir politique et l’autorité judiciaire durant le fascisme by Yannick Beaulieu

    Published 2004-09-01
    “…On one hand, left-wing parties viewed the judiciary as a bourgeoisie-closely allied to the government; on the other hand, the fascist groups published blacklists containing the names of Judges they claimed were too weak in dealing with left-wing activists or too biased against fascist defendants. …”
    Get full text
    Article
  16. 16

    A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques by Ali Soleymani, Fatemeh Arabgol

    Published 2021-01-01
    “…Classical approaches that rely heavily on static matching, such as blacklisting or regular expression patterns, may be limited in flexibility or uncertainty in detecting malicious data in system data. …”
    Get full text
    Article
  17. 17

    Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN) by Robert A. Sowah, Kwadwo B. Ofori-Amanfo, Godfrey A. Mills, Koudjo M. Koumadi

    Published 2019-01-01
    “…In this paper, ANN classification methods in intrusion detection for MANETs were developed and used with NS2 simulation platform for attack detection, identification, blacklisting, and node reconfiguration for control of nodes attacked. …”
    Get full text
    Article
  18. 18

    New Heuristics Method for Malicious URLs Detection Using Machine Learning by Maher Kassem Hasan

    Published 2024-09-01
    “…The techniques of detection conventionally applied are based on blacklisting and heuristic analyses, which are gradually becoming inefficient against sophisticated, rapidly evolving threats. …”
    Get full text
    Article
  19. 19

    TCN-Based DDoS Detection and Mitigation in 5G Healthcare-IoT: A Frequency Monitoring and Dynamic Threshold Approach by Mirza Akhi, Ciaran Eising, Lubna Luxmi Dhirani

    Published 2025-01-01
    “…This approach enhances classification accuracy, effectively mitigates actual DDoS attack nodes, and blacklists malicious nodes without false positives in H-IoT environments. …”
    Get full text
    Article
  20. 20

    The financial character of policing in Tunisia: collusions, extraversion and the criminalization of informality by Daniela Musina

    Published 2024-07-01
    “…The article then attempts to give empirical salience to the theoretical argument by tracing the processual developments of financial and pre-emptive intelligence from transnational forms of blacklisting (which affected Tunisia in 2018) to profiling, tracking, fund freezing practices that unfold contextually. …”
    Get full text
    Article