Academic literature on the topic 'Computer networks Firewalls (Computer security) TCP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks Firewalls (Computer security) TCP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer networks Firewalls (Computer security) TCP"
Cheng, Haosu, Jianwei Liu, Jian Mao, Mengmeng Wang, Jie Chen, and Jingdong Bian. "A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN." Security and Communication Networks 2018 (November 15, 2018): 1–20. http://dx.doi.org/10.1155/2018/8392080.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textMenkus, Belden. "Firewalls in Information Systems Security." EDPACS 23, no. 3 (1995): 9–15. http://dx.doi.org/10.1080/07366989509451685.
Full textHarris, B., and R. Hunt. "TCP/IP security threats and attack methods." Computer Communications 22, no. 10 (1999): 885–97. http://dx.doi.org/10.1016/s0140-3664(99)00064-x.
Full textNour, Boubakr, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, and Hassine Moungla. "Access Control Mechanisms in Named Data Networks." ACM Computing Surveys 54, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3442150.
Full textBellovin, S. M. "Security problems in the TCP/IP protocol suite." ACM SIGCOMM Computer Communication Review 19, no. 2 (1989): 32–48. http://dx.doi.org/10.1145/378444.378449.
Full textPrabadevi, B., and N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks." Cybernetics and Information Technologies 17, no. 4 (2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.
Full textKent, S. "Comments on “security problems in the TCP/IP protocol suite”." ACM SIGCOMM Computer Communication Review 19, no. 3 (1989): 10–19. http://dx.doi.org/10.1145/74674.74675.
Full textBodei, Chiara, Lorenzo Ceragioli, Pierpaolo Degano, et al. "FWS: Analyzing, maintaining and transcompiling firewalls." Journal of Computer Security 29, no. 1 (2021): 77–134. http://dx.doi.org/10.3233/jcs-200017.
Full textBuduri, Reddaiah, SrinivasaRao Kanusu, Swetha Chinthakunta, Amruthavani Godina, and Sivajyothi Siddavatam. "Linear Congruential Pseudorandom Numbered Hybrid Crypto-System with Genetic Algorithms." International Journal of Engineering and Advanced Technology 10, no. 2 (2020): 159–63. http://dx.doi.org/10.35940/ijeat.b2092.1210220.
Full textDissertations / Theses on the topic "Computer networks Firewalls (Computer security) TCP"
Snyder, Walter C. "Evaluating the effectiveness of packet filter firewall applications in a "dual stack" Internet Protocol environment /." Online version of thesis, 2010. http://hdl.handle.net/1850/12263.
Full textRumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.
Full textFarley, Ryan Joseph. "Parallel firewall designs for high-speed networks /." Electronic thesis, 2005. http://etd.wfu.edu/theses/available/etd-12142005-194043/.
Full textFelker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FFelker.pdf.
Full textAtkins, William Dee. "Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.umr.edu/thesis/pdf/Final_Thesis_09007dcc8031d3b0.pdf.
Full textAsarcıklı, Şükran Tuğlular Tuğkan. "Firewall monitoring using intrusion detection systems/." [s.l.]: [s.n.], 2005. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000390.pdf.
Full textFelker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/852.
Full textSavacool, Richard. "Firewall resistance to metaferography in network communications /." Online version of thesis, 2010. http://hdl.handle.net/1850/12272.
Full textGivens, Mark Allen. "Modeling and analyzing intrusion attempts to a computer network operating in a defense-in-depth posture." Thesis, View thesis View thesis via DTIC web site, 2004. http://handle.dtic.mil/100.2/ADA427180.
Full textTang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.
Full textBooks on the topic "Computer networks Firewalls (Computer security) TCP"
The book of PF: A no-nonsense guide to the OpenBSD firewall. 2nd ed. No Starch Press, 2011.
Find full textThe book of PF: A no-nonsense guide to the OpenBSD firewall. No Starch Press, 2008.
Find full textStewart, James Michael. Network security firewalls & VPNs. Jones & Bartlett Learning, 2010.
Find full textB, Oakes Edward, ed. Firewalls and VPNs: Principles and practices. Pearson Prentice Hall, 2005.
Find full textBook chapters on the topic "Computer networks Firewalls (Computer security) TCP"
Costa Cardoso, Rui, and Mário Marques Freire. "Intelligent Assessment of Distributed Security in TCP/IP Networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25969-5_101.
Full textHadi, Ali H., and Hussein Al-Bahadili. "A Hybrid Port-Knocking Technique for Host Authentication." In Simulation in Computer Network Design and Modeling. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch016.
Full textHadi, Ali H., and Hussein Al-Bahadili. "A Hybrid Port-Knocking Technique for Host Authentication." In IT Policy and Ethics. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2919-6.ch023.
Full textAdogbeji, Oghenevwogaga Benson. "Computer Security in Cybercafés." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch002.
Full textAl-Hamami, Alaa Hussein. "The State of the Art and Future Prospective of the Network Security." In Simulation in Computer Network Design and Modeling. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch017.
Full textMeghanathan, Natarajan. "Network Security." In Network Security Technologies. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4789-3.ch011.
Full textMogollon, Manuel. "Information Assurance." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch002.
Full textM., Thangavel, Pavithra V., and Guru Roja R. "Network Manipulation Using Network Scanning in SDN." In Artificial Intelligence and Security Challenges in Emerging Networks. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7353-1.ch004.
Full textBoyte, Kenneth James. "The Evolution of Cyber Warfare in Information Operations Targeting Estonia, the U.S., and Ukraine." In Developments in Information Security and Cybernetic Wars. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8304-2.ch007.
Full textBaruah, Siddhartha, Anjana Kakoty Mahanta, and Kanak Ch Sarma. "Security and Authentication Issues of an Embedded System Designed and Implemented for Interactive Internet Users." In Threats, Countermeasures, and Advances in Applied Information Security. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0978-5.ch011.
Full textConference papers on the topic "Computer networks Firewalls (Computer security) TCP"
Alferaidi, Khaled, Robert Piechocki, and F. Alfordy. "Improving TCP Performance in Multi-Hop Coded Wireless Networks." In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769518.
Full textTANG, Hong-wei, Sheng-zhong FENG, and Xiao-fang ZHAO. "TOSEC: A TCP/IP Offload based Virtual Network Security Framework in NFV Environment." In International Conference on Computer Networks and Communication Technology (CNCT 2016). Atlantis Press, 2017. http://dx.doi.org/10.2991/cnct-16.2017.117.
Full text