Journal articles on the topic 'Computer networks Firewalls (Computer security) TCP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer networks Firewalls (Computer security) TCP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cheng, Haosu, Jianwei Liu, Jian Mao, Mengmeng Wang, Jie Chen, and Jingdong Bian. "A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN." Security and Communication Networks 2018 (November 15, 2018): 1–20. http://dx.doi.org/10.1155/2018/8392080.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textMenkus, Belden. "Firewalls in Information Systems Security." EDPACS 23, no. 3 (1995): 9–15. http://dx.doi.org/10.1080/07366989509451685.
Full textHarris, B., and R. Hunt. "TCP/IP security threats and attack methods." Computer Communications 22, no. 10 (1999): 885–97. http://dx.doi.org/10.1016/s0140-3664(99)00064-x.
Full textNour, Boubakr, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, and Hassine Moungla. "Access Control Mechanisms in Named Data Networks." ACM Computing Surveys 54, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3442150.
Full textBellovin, S. M. "Security problems in the TCP/IP protocol suite." ACM SIGCOMM Computer Communication Review 19, no. 2 (1989): 32–48. http://dx.doi.org/10.1145/378444.378449.
Full textPrabadevi, B., and N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks." Cybernetics and Information Technologies 17, no. 4 (2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.
Full textKent, S. "Comments on “security problems in the TCP/IP protocol suite”." ACM SIGCOMM Computer Communication Review 19, no. 3 (1989): 10–19. http://dx.doi.org/10.1145/74674.74675.
Full textBodei, Chiara, Lorenzo Ceragioli, Pierpaolo Degano, et al. "FWS: Analyzing, maintaining and transcompiling firewalls." Journal of Computer Security 29, no. 1 (2021): 77–134. http://dx.doi.org/10.3233/jcs-200017.
Full textBuduri, Reddaiah, SrinivasaRao Kanusu, Swetha Chinthakunta, Amruthavani Godina, and Sivajyothi Siddavatam. "Linear Congruential Pseudorandom Numbered Hybrid Crypto-System with Genetic Algorithms." International Journal of Engineering and Advanced Technology 10, no. 2 (2020): 159–63. http://dx.doi.org/10.35940/ijeat.b2092.1210220.
Full textFilippov, M. V., N. Yu Ryazanova, and B. I. Ryazantsev. "The Outgoing and Incoming Network Packets Intercepting Method." Mechanical Engineering and Computer Science, no. 12 (January 4, 2018): 45–56. http://dx.doi.org/10.24108/1217.0001344.
Full textMahfouz, Ahmed, Abdullah Abuhussein, Deepak Venugopal, and Sajjan Shiva. "Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset." Future Internet 12, no. 11 (2020): 180. http://dx.doi.org/10.3390/fi12110180.
Full textRemlein, Piotr, and Urszula Stachowiak. "Security Verification in the Context of 5G Sensor Networks." Journal of Telecommunications and Information Technology 2 (March 30, 2021): 107–19. http://dx.doi.org/10.26636/jtit.2021.153221.
Full textCaprolu, Maurantonio, Simone Raponi, and Roberto Di Pietro. "FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN." Security and Communication Networks 2019 (February 19, 2019): 1–16. http://dx.doi.org/10.1155/2019/6874592.
Full textLee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.
Full textLY, SUNG, and ABBAS BIGDELI. "EXTENDABLE AND DYNAMICALLY RECONFIGURABLE MULTI-PROTOCOL FIREWALL." International Journal of Software Engineering and Knowledge Engineering 15, no. 02 (2005): 363–71. http://dx.doi.org/10.1142/s0218194005001926.
Full textSuherman, Suherman, Deddy Dikmawanto, Syafruddin Hasan, and Marwan Al-Akaidi. "Embedding the three pass protocol messages into transmission control protocol header." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 442. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp442-449.
Full textPrakash N Kalavadekar, Mr, and Dr Shirish S. Sane. "Effect of Mutation and Crossover Probabilities on Genetic Algorithm and Signature Based Intrusion Detection System." International Journal of Engineering & Technology 7, no. 4.19 (2018): 1011. http://dx.doi.org/10.14419/ijet.v7i4.19.28277.
Full textObanaik, Venkatesh, Lillykutty Jacob, and A. L. Ananda. "Secure performance enhancing proxy: To ensure end-to-end security and enhance TCP performance over IPv6 wireless networks." Computer Networks 50, no. 13 (2006): 2225–38. http://dx.doi.org/10.1016/j.comnet.2005.08.003.
Full textCabaj, Krzysztof, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, and Piotr Żórawski. "Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System." Security and Communication Networks 2019 (February 21, 2019): 1–22. http://dx.doi.org/10.1155/2019/4930908.
Full textMurakami, Tadashi, Fukuko Yuasa, Ryouichi Baba, et al. "Long-term experiences in keeping balance between safety and usability in research activities in KEK." EPJ Web of Conferences 214 (2019): 08001. http://dx.doi.org/10.1051/epjconf/201921408001.
Full textStatkus, Arūnas, Šarūnas Paulikas, and Audrius Krukonis. "TCP Acknowledgment Optimization in Low Power and Embedded Devices." Electronics 10, no. 6 (2021): 639. http://dx.doi.org/10.3390/electronics10060639.
Full textHu, F. F., S. T. Zhang, X. B. Lin, L. Wu, and N. D. Liao. "Classification of Abnormal Traffic in Smart Grids Based on GACNN and Data Statistical Analysis." Security and Communication Networks 2021 (June 16, 2021): 1–19. http://dx.doi.org/10.1155/2021/9927325.
Full textFeltus, Frank A., Joseph R. Breen, Juan Deng, et al. "The Widening Gulf between Genomics Data Generation and Consumption: A Practical Guide to Big Data Transfer Technology." Bioinformatics and Biology Insights 9s1 (January 2015): BBI.S28988. http://dx.doi.org/10.4137/bbi.s28988.
Full textChandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.
Full textMelo-López, Cristian Andrés, Octavio José Salcedo-Parra, and Rómulo Andrés Gallego-Torres. "Networks and their traffic in multiplayer games." Revista Científica 1, no. 24 (2016): 100. http://dx.doi.org/10.14483/10.14483/udistrital.jour.rc.2016.24.a10.
Full textLei, Gang, Lejun Ji, Ruiwen Ji, Yuanlong Cao, Xun Shao, and Xin Huang. "Extracting Low-Rate DDoS Attack Characteristics: The Case of Multipath TCP-Based Communication Networks." Wireless Communications and Mobile Computing 2021 (July 7, 2021): 1–10. http://dx.doi.org/10.1155/2021/2264187.
Full textSun, Wei, Hao Zhang, Li-jun Cai, Ai-min Yu, Jin-qiao Shi, and Jian-guo Jiang. "A Novel Device Identification Method Based on Passive Measurement." Security and Communication Networks 2019 (June 23, 2019): 1–11. http://dx.doi.org/10.1155/2019/6045251.
Full textTien, Chin-Wei, Tse-Yung Huang, Ping-Chun Chen, and Jenq-Haur Wang. "Using Autoencoders for Anomaly Detection and Transfer Learning in IoT." Computers 10, no. 7 (2021): 88. http://dx.doi.org/10.3390/computers10070088.
Full textLiu, Likun, Hongli Zhang, Xiangzhan Yu, Yi Xin, Muhammad Shafiq, and Mengmeng Ge. "An Efficient Security System for Mobile Data Monitoring." Wireless Communications and Mobile Computing 2018 (June 11, 2018): 1–10. http://dx.doi.org/10.1155/2018/9809345.
Full textLi, Qing Xue, and Long Hua Mu. "Analysis of Security of SCADA System." Applied Mechanics and Materials 568-570 (June 2014): 1417–21. http://dx.doi.org/10.4028/www.scientific.net/amm.568-570.1417.
Full textBorum, Randy, John Felker, Sean Kern, Kristen Dennesen, and Tonya Feyes. "Strategic cyber intelligence." Information & Computer Security 23, no. 3 (2015): 317–32. http://dx.doi.org/10.1108/ics-09-2014-0064.
Full textMoualla, Soulaiman, Khaldoun Khorzom, and Assef Jafar. "Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset." Computational Intelligence and Neuroscience 2021 (June 15, 2021): 1–13. http://dx.doi.org/10.1155/2021/5557577.
Full textCao, Yuanlong, Ruiwen Ji, Lejun Ji, Mengshuang Bao, Lei Tao, and Wei Yang. "Can Multipath TCP Be Robust to Cyber Attacks? A Measuring Study of MPTCP with Active Queue Management Algorithms." Security and Communication Networks 2021 (May 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/9963829.
Full textRusdan, Muchamad. "Design of Wireless Network System for Digital Village Using Wireless Distribution System." Journal of Informatics, Information System, Software Engineering and Applications (INISTA) 1, no. 2 (2019): 51–59. http://dx.doi.org/10.20895/inista.v1i2.66.
Full textTyler, Dan, and Thiago Viana. "Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture." Applied Sciences 11, no. 16 (2021): 7499. http://dx.doi.org/10.3390/app11167499.
Full textMadhavapandian, S., and P. MaruthuPandi. "FPGA implementation of highly scalable AES algorithm using modified mix column with gate replacement technique for security application in TCP/IP." Microprocessors and Microsystems 73 (March 2020): 102972. http://dx.doi.org/10.1016/j.micpro.2019.102972.
Full textFegade, Saurabh, Amey Bhadkamka, Kamlesh Karekar, Jaikishan Jeshnani, and Vinayak Kachare. "Network Intrusion Detection System Using C4.5 Algorithm." Journal of Communications Technology, Electronics and Computer Science 10 (March 1, 2017): 15. http://dx.doi.org/10.22385/jctecs.v10i0.139.
Full textPrajapati, Gourishankar, and Nilay Khare. "A Comparative Study of Software Firewall on Windows and Linux Platform." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 8 (2015): 5967–78. http://dx.doi.org/10.24297/ijct.v14i8.1868.
Full textPeisert, Sean, William Barnett, Eli Dart, et al. "The Medical Science DMZ." Journal of the American Medical Informatics Association 23, no. 6 (2016): 1199–201. http://dx.doi.org/10.1093/jamia/ocw032.
Full textPeisert, Sean, Eli Dart, William Barnett, et al. "The medical science DMZ: a network design pattern for data-intensive medical science." Journal of the American Medical Informatics Association 25, no. 3 (2017): 267–74. http://dx.doi.org/10.1093/jamia/ocx104.
Full textWang, Song, Karina Gomez, Kandeepan Sithamparanathan, Muhammad Rizwan Asghar, Giovanni Russello, and Paul Zanna. "Mitigating DDoS Attacks in SDN-Based IoT Networks Leveraging Secure Control and Data Plane Algorithm." Applied Sciences 11, no. 3 (2021): 929. http://dx.doi.org/10.3390/app11030929.
Full textGao, Zhenyu, Jian Cao, Wei Wang, Huayun Zhang, and Zengrong Xu. "Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time." Security and Communication Networks 2021 (September 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/4587862.
Full textAditya, Gadhing Putra, Aminuddin Aminuddin, and Sofyan Arifianto. "Improvisasi Algoritma RSA Menggunakan Generate Key ESRKGS pada Instant Messaging Berbasis Socket TCP." Jurnal Repositor 2, no. 11 (2020): 1444. http://dx.doi.org/10.22219/repositor.v2i11.731.
Full textAlkahtani, Hasan, Theyazn H. H. Aldhyani, and Mohammed Al-Yaari. "Adaptive Anomaly Detection Framework Model Objects in Cyberspace." Applied Bionics and Biomechanics 2020 (December 9, 2020): 1–14. http://dx.doi.org/10.1155/2020/6660489.
Full textStaudemeyer, Ralf C., and James Connan. "Burning money with firewalls." South African Computer Journal 56 (July 11, 2015). http://dx.doi.org/10.18489/sacj.v56i1.322.
Full textDowns, Daniel M., Ilir Ademaj, and Amie M. Schuck. "Internet security: Who is leaving the ‘virtual door’ open and why?" First Monday, December 26, 2008. http://dx.doi.org/10.5210/fm.v14i1.2251.
Full text"Guardicore: Rethink Firewalls – Security and agility for the modern enterprise." Network Security 2020, no. 11 (2020): 4. http://dx.doi.org/10.1016/s1353-4858(20)30125-2.
Full textLeiss, Ernst L., and Jianyu You. "Firewall Monitoring." CLEI Electronic Journal 1, no. 1 (1998). http://dx.doi.org/10.19153/cleiej.1.1.4.
Full textKaur, Goldendeep, and Jyoteesh Malhotra. "Comparative Investigation of ARP Poisoning Mitigation Techniques Using Standard Testbed for Wireless Networks." Journal of Cyber Security and Mobility, November 30, 2015. http://dx.doi.org/10.13052/2245-1439.423.
Full text