Academic literature on the topic 'Firewall'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Firewall.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Firewall"
Umm e Khadija and Iqra Saqib. "Comparison Of Different Firewalls Performance In A Virtual For Cloud Data Center." Journal of Advancement in Computing 1, no. 1 (2023): 21–28. http://dx.doi.org/10.36755/jac.v1i1.49.
Full textHanane Aznaoui and Canan Batur Şahin. "A Virtual Data Center Comparison Of Different Firewalls' Performance." Journal of Advancement in Computing 1, no. 1 (2023): 1–8. http://dx.doi.org/10.36755/jac.v1i1.46.
Full textKhummanee, Suchart, Panida Songram, and Potchara Pruksasri. "FFF: Fast Firewall Framework to Enhance Rule Verifying over High-speed Networks." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 1 (2022): 35–47. http://dx.doi.org/10.37936/ecti-cit.2022161.246990.
Full textSingh, Sachin. "To Design and Implementation of Framework for Firewall Policy with Minimum Rule Set." International Journal of Advance Research and Innovation 2, no. 4 (2014): 17–26. http://dx.doi.org/10.51976/ijari.241404.
Full textQian, Xinyang. "Network security and computer program." Applied and Computational Engineering 5, no. 1 (2023): 744–49. http://dx.doi.org/10.54254/2755-2721/5/20230688.
Full textAlicea, Michael, and Izzat Alsmadi. "Misconfiguration in Firewalls and Network Access Controls: Literature Review." Future Internet 13, no. 11 (2021): 283. http://dx.doi.org/10.3390/fi13110283.
Full textLindqvist, Janne, Essi Vehmersalo, Miika Komu, and Jukka Manner. "Enterprise Network Packet Filtering for Mobile Cryptographic Identities." International Journal of Handheld Computing Research 1, no. 1 (2010): 79–94. http://dx.doi.org/10.4018/jhcr.2010090905.
Full textSingleton, Douglas. "Non-Abelian firewall." International Journal of Modern Physics D 29, no. 14 (2020): 2043003. http://dx.doi.org/10.1142/s0218271820430038.
Full textPeriyasamy, A. R. Pon. "Security Issues of Firewall." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 455. http://dx.doi.org/10.23956/ijarcsse/v7i4/0208.
Full textTerentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko, and Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT." Management of Development of Complex Systems, no. 45 (March 1, 2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.
Full textDissertations / Theses on the topic "Firewall"
Höfler, Torsten, Christian Burkert, and Martin Telzer. "Comparative Firewall Study." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200401485.
Full textKugler, Zdeněk. "Proxy firewall." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218057.
Full textBonnevier, Jani, and Sebastian Heimlén. "The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232067.
Full textHorowitz, Eduardo. "Estudo sobre a extração de políticas de firewall e uma proposta de metodologia." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/12075.
Full textBidder-Senn, Diana von. "Specification-based firewall testing /." Zürich : ETH, 2007. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=17172.
Full textŽižka, Martin. "Stavový firewall v FPGA." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236618.
Full textJehmlich, Heiko. "Firewall mit nutzerindividuellen Regeln." [S.l. : s.n.], 2003. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10806306.
Full textVoronkov, Artem. "Usable Firewall Rule Sets." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-64703.
Full textRumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.
Full textRödig, Utz. "Firewall-Architekturen für Multimedia-Applikationen." [S.l. : s.n.], 2002. http://elib.tu-darmstadt.de/diss/000276.
Full textBooks on the topic "Firewall"
Book chapters on the topic "Firewall"
Weik, Martin H. "firewall." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_7188.
Full textProvos, Niels. "Firewall." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_506.
Full textNeel, Andrew J. "Firewall." In Encyclopedia of Sciences and Religions. Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-1-4020-8265-8_201152.
Full textRennie, Frank, and Keith Smyth. "Firewall." In Digital Learning: The Key Concepts, 2nd ed. Routledge, 2019. http://dx.doi.org/10.4324/9780429425240-84.
Full textPohlmann, Norbert. "Firewall-Systeme." In Cyber-Sicherheit. Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-25398-1_9.
Full textWeik, Martin H. "firewall component." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_7189.
Full textWeik, Martin H. "firewall principle." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_7190.
Full textLenhard, Thomas H. "Die Firewall." In Datensicherheit. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29866-1_16.
Full textLiu, Alex X., Mohamed G. Gouda, Huibo H. Ma, and Anne HH Ngu. "Firewall Queries." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11516798_15.
Full textLenhard, Thomas H. "Die Firewall." In Datensicherheit. Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-17983-0_16.
Full textConference papers on the topic "Firewall"
Acharya, H. B., Aditya Joshi, and M. G. Gouda. "Firewall modules and modular firewalls." In 2010 18th IEEE International Conference on Network Protocols (ICNP). IEEE, 2010. http://dx.doi.org/10.1109/icnp.2010.5762766.
Full textCosta Júnior, Edmilson P. da, Silas T. Medeiros, Carlos Eduardo da Silva, and Marcos Madruga. "An Architecture for Self-adaptive Distributed Firewall." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2016. http://dx.doi.org/10.5753/sbseg.2016.19318.
Full textFiorenza, Maurício, Diego Kreutz, and Rodrigo Mansilha. "Gerenciamento de Firewalls em Redes Híbridas." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19260.
Full textOliveira, Muryllo Pimenta de, and Carlo Marcelo Revoredo da Silva. "MinimalisticWAF: Um Web Application Firewall baseado em ganchos de APIs I/O." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg_estendido.2020.19279.
Full textShaikh, Zubair A., and Furqan Ahmed. "Disarming firewall." In 2010 International Conference on Information and Emerging Technologies (ICIET). IEEE, 2010. http://dx.doi.org/10.1109/iciet.2010.5625739.
Full textFu, Guangrui, Daichi Funato, Jonathan Wood, and Toshiro Kawahara. "Mobile Firewall." In Proceedings of the Fifth IFIP-TC6 International Conference. WORLD SCIENTIFIC, 2003. http://dx.doi.org/10.1142/9789812791146_0063.
Full textKhakpour, Amir R., Joshua W. Hulst, Zihui Ge, Alex X. Liu, Dan Pei, and Jia Wang. "Firewall fingerprinting." In IEEE INFOCOM 2012 - IEEE Conference on Computer Communications. IEEE, 2012. http://dx.doi.org/10.1109/infcom.2012.6195544.
Full textLiang, Junyan, and Yoohwan Kim. "Evolution of Firewalls: Toward Securer Network Using Next Generation Firewall." In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2022. http://dx.doi.org/10.1109/ccwc54503.2022.9720435.
Full textLiu, A. X., E. Torng, and C. R. Meiners. "Firewall Compressor: An Algorithm for Minimizing Firewall Policies." In 27th IEEE International Conference on Computer Communications (INFOCOM 2008). IEEE, 2008. http://dx.doi.org/10.1109/infocom.2007.44.
Full textLiu, A. X., E. Torng, and C. R. Meiners. "Firewall Compressor: An Algorithm for Minimizing Firewall Policies." In IEEE INFOCOM 2008 - IEEE Conference on Computer Communications. IEEE, 2008. http://dx.doi.org/10.1109/infocom.2008.44.
Full textReports on the topic "Firewall"
Wack, John, Ken Cutler, and Jamie Pole. Guidelines on firewalls and firewall policy :. National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-41.
Full textScarfone, K. A., and P. Hoffman. Guidelines on firewalls and firewall policy. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.sp.800-41r1.
Full textBellovin, S. Firewall-Friendly FTP. RFC Editor, 1994. http://dx.doi.org/10.17487/rfc1579.
Full textHumenn, Polar, and Dan Nessett. The Multilayer Firewall. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada385371.
Full textGaynor, M., and S. Bradner. Firewall Enhancement Protocol (FEP). RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3093.
Full textNewman, D. Benchmarking Terminology for Firewall Performance. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2647.
Full textHickman, B., D. Newman, S. Tadjudin, and T. Martin. Benchmarking Methodology for Firewall Performance. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3511.
Full textHUDSON, JACK A., and GERALD F. RUDOLFO. Experiences from Evaluating Telephone Firewall Systems. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/808626.
Full textMontenegro, G., and V. Gupta. Sun's SKIP Firewall Traversal for Mobile IP. RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2356.
Full textStiemerling, M., H. Tschofenig, C. Aoun, and E. Davies. NAT/Firewall NSIS Signaling Layer Protocol (NSLP). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5973.
Full text