Journal articles on the topic 'Firewall Performance'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Firewall Performance.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mohammed, Raya Kahtan, and Yoichiro UENO. "An FPGA-based Network Firewall with Expandable Rule Description." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 3 (June 1, 2018): 1310. http://dx.doi.org/10.11591/ijeecs.v10.i3.pp1310-1318.
Full textKonikiewicz, Wojciech, and Marcin Markowski. "Analysis of Performance and Efficiency of Hardware and Software Firewalls." Journal of Applied Computer Science Methods 9, no. 1 (June 1, 2017): 49–63. http://dx.doi.org/10.1515/jacsm-2017-0003.
Full textTelkar, Prajwal S., and Dr Kiran V. "Implementation of Threat policies and Routing process in Firepower Threat Defense." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 18, 2021): 833–39. http://dx.doi.org/10.51201/jusst/21/05344.
Full textAzzam, Ahmad Thoriq, Rendy Munadi, and Ratna Mayasari. "Performance Analysis Of Firewall As Virtualized Network Function On VMware ESXi Hypervisor." JURNAL INFOTEL 11, no. 1 (March 25, 2019): 29. http://dx.doi.org/10.20895/infotel.v11i1.425.
Full textPrajapati, Gourishankar, and Nilay Khare. "A Comparative Study of Software Firewall on Windows and Linux Platform." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 8 (June 2, 2015): 5967–78. http://dx.doi.org/10.24297/ijct.v14i8.1868.
Full textXuan, Shichang, Dapeng Man, Jiangchuan Zhang, Wu Yang, and Miao Yu. "Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/8130152.
Full textCho, Sung-Ho, Sung-Uk Choi, and . "A Study on Comparison of Network Location Efficiency of Web Application Firewall." International Journal of Engineering & Technology 7, no. 3.33 (August 29, 2018): 183. http://dx.doi.org/10.14419/ijet.v7i3.33.21009.
Full textTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (April 6, 2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Full textBateni, Shirin, and Ali Asghar Khavasi. "DESIGN A SECURITY FIREWALL POLICY TO FILTER INCOMING TRAFFIC IN PACKET SWITCHED NETWORKS USING CLASSIFICATION METHODS." Ciência e Natura 38, no. 2 (May 31, 2016): 821. http://dx.doi.org/10.5902/2179460x21530.
Full textParfenov, Denis I., Irina P. Bolodurina, and Vadim A. Torchin. "Development and Study of Algorithms for the Formation of Rules for Network Security Nodes in the Multi-Cloud Platform." Modeling and Analysis of Information Systems 26, no. 1 (March 15, 2019): 90–100. http://dx.doi.org/10.18255/1818-1015-2019-1-90-100.
Full textHasan, Mohamed Yousuf, Poornima V.P, Sujendran S, and Karthikraja D. "FPGA Based Firewall using Embedded Processor for Vulnarability Packet Detection." International Journal of Reconfigurable and Embedded Systems (IJRES) 3, no. 1 (March 1, 2014): 31. http://dx.doi.org/10.11591/ijres.v3.i1.pp31-38.
Full textXing, Wen Qi, Qian Zhong Zhang, and Zi Wei Feng. "A Kind of Embedded Firewall Mechanism for ARM Processors." Applied Mechanics and Materials 556-562 (May 2014): 1757–60. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.1757.
Full textDi, Xiao Qiang, Hua Min Yang, and Jin Qing Li. "Intrusion Response Mobile Firewall Design in Ad Hoc Networks and Based on SMP Performance Analysis." Applied Mechanics and Materials 496-500 (January 2014): 1909–14. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.1909.
Full textYang, Fan, Xinlei Yang, Wei Wang, Peng Du, Jifeng Shi, Feng Li, and Hong Hu. "Research and implementation on high-speed transmission performance optimization technology of ten gigabit firewall UDP multicast." MATEC Web of Conferences 309 (2020): 01012. http://dx.doi.org/10.1051/matecconf/202030901012.
Full textShi, Leyi, Yang Li, and Haijie Feng. "Performance Analysis of Honeypot with Petri Nets." Information 9, no. 10 (September 30, 2018): 245. http://dx.doi.org/10.3390/info9100245.
Full textXu, Jun, and Mukesh Singhal. "Design of a high-performance ATM firewall." ACM Transactions on Information and System Security 2, no. 3 (August 1999): 269–94. http://dx.doi.org/10.1145/322510.322520.
Full textLY, SUNG, and ABBAS BIGDELI. "EXTENDABLE AND DYNAMICALLY RECONFIGURABLE MULTI-PROTOCOL FIREWALL." International Journal of Software Engineering and Knowledge Engineering 15, no. 02 (April 2005): 363–71. http://dx.doi.org/10.1142/s0218194005001926.
Full textBarznji, Ammar O., Tarik A. Rashid, and Nawzad K. Al-Salihi. "Computer Network Simulation of Firewall and VoIP Performance Monitoring." International Journal of Online Engineering (iJOE) 14, no. 09 (September 30, 2018): 4. http://dx.doi.org/10.3991/ijoe.v14i09.8508.
Full textY. Ameen, Siddeeq, and Shayma Wail Nourildean. "Firewall and VPN Investigation on Cloud Computing Performance." International Journal of Computer Science & Engineering Survey 5, no. 2 (April 30, 2014): 15–25. http://dx.doi.org/10.5121/ijcses.2014.5202.
Full textKhairi, Mutaz Hamed Hussien, Sharifah H. S. Ariffin, N. M. Abdul Latiff, Kamaludin Mohamad Yusof, M. K. Hassan, and Mohammad Rava. "The impact of firewall on TCP and UDP throughput in an openflow software defined network." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (October 1, 2020): 256. http://dx.doi.org/10.11591/ijeecs.v20.i1.pp256-263.
Full textWang, Shun Qing, and Hai Yan Chen. "Research on ASIC Firewall Based on State Detection Technology." Applied Mechanics and Materials 644-650 (September 2014): 3283–86. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3283.
Full textVarun Kumar, K. A., and D. Arivudainambi. "Performance analysis of security framework for software defined network architectures." International Journal of Advances in Applied Sciences 8, no. 3 (September 1, 2019): 232. http://dx.doi.org/10.11591/ijaas.v8.i3.pp232-242.
Full textŠimon, M., L. Huraj, and M. Čerňanský. "Performance Evaluations of IPTables Firewall Solutions under DDoS attacks." Journal of Applied Mathematics, Statistics and Informatics 11, no. 2 (December 1, 2015): 35–45. http://dx.doi.org/10.1515/jamsi-2015-0010.
Full textTrabelsi, Zouheir, Liren Zhang, Safaa Zeidan, and Kilani Ghoudi. "Dynamic traffic awareness statistical model for firewall performance enhancement." Computers & Security 39 (November 2013): 160–72. http://dx.doi.org/10.1016/j.cose.2013.07.001.
Full textObiniyi, Afolayan A., Ezugwu E. Absalom, and Mohammed Dikko. "Network Security and Firewall Technology." International Journal of Dependable and Trustworthy Information Systems 2, no. 2 (April 2011): 40–60. http://dx.doi.org/10.4018/jdtis.2011040103.
Full textNahar, Nivedita, Prerna Dewan, and Rakesh Kumar. "An Approach to Mitigate Malware Attacks Using Netfilter's Hybrid Frame in Firewall Security." International Journal of Open Source Software and Processes 9, no. 1 (January 2018): 32–61. http://dx.doi.org/10.4018/ijossp.2018010103.
Full textCheminod, Manuel, Luca Durante, Lucia Seno, and Adriano Valenzano. "Performance Evaluation and Modeling of an Industrial Application-Layer Firewall." IEEE Transactions on Industrial Informatics 14, no. 5 (May 2018): 2159–70. http://dx.doi.org/10.1109/tii.2018.2802903.
Full textKiesel, Sebastian, and Michael Scharf. "Modeling and performance evaluation of transport protocols for firewall control." Computer Networks 51, no. 11 (August 2007): 3232–51. http://dx.doi.org/10.1016/j.comnet.2006.11.031.
Full textKhamdamov, Rustam Kh, and Komil F. Kerimov. "DATABASE PROTECTION BASED ON WEB APPLICATION FIREWALL." Journal of Automation and Information sciences 1 (January 1, 2021): 84–90. http://dx.doi.org/10.34229/0572-2691-2021-1-7.
Full textAli, Ali A., Saad M. Darwish, and Shawkat K. Guirguis. "An Approach for Improving Performance of a Packet Filtering Firewall Based on Fuzzy Petri Net." Journal of Advances in Computer Networks 3, no. 1 (2015): 67–74. http://dx.doi.org/10.7763/jacn.2015.v3.144.
Full textRafamantanantsoa, Fontaine, and Haja Louis Rabetafika. "Performance Comparison and Simulink Model of Firewall Free BSD and Linux." Communications and Network 10, no. 04 (2018): 180–95. http://dx.doi.org/10.4236/cn.2018.104015.
Full textKaur, Kirandeep. "Automation the Process of Unifying the Change in the Firewall Performance." International Journal of Computer Applications 164, no. 11 (April 19, 2017): 42–45. http://dx.doi.org/10.5120/ijca2017913545.
Full textLu, Na, and Ying Yang. "Application of evolutionary algorithm in performance optimization of embedded network firewall." Microprocessors and Microsystems 76 (July 2020): 103087. http://dx.doi.org/10.1016/j.micpro.2020.103087.
Full textSami Hasan, Amer, and Zaid Hashim Jaber. "FPKIN: Firewall Public Key Infrastructure for NEMO." International Journal of Engineering & Technology 7, no. 3.20 (September 1, 2018): 422. http://dx.doi.org/10.14419/ijet.v7i3.20.20585.
Full textTrabelsi, Zouheir, Liren Zhang, and Safaa Zeidan. "Dynamic rule and rule-field optimisation for improving firewall performance and security." IET Information Security 8, no. 4 (July 1, 2014): 250–57. http://dx.doi.org/10.1049/iet-ifs.2011.0146.
Full textKimmy, Kimmy, and Shivani Khurana. "Performance Evaluation of Dynamic Routing Protocols using Firewall and VPN_Firewall under Cloud Computing." International Journal of Computer Applications 90, no. 10 (March 26, 2014): 31–36. http://dx.doi.org/10.5120/15759-4419.
Full textPrabakaran, Senthil, and Ramalakshmi Ramar. "Stateful firewall-enabled software-defined network with distributed controllers: A network performance study." International Journal of Communication Systems 32, no. 17 (October 30, 2019): e4237. http://dx.doi.org/10.1002/dac.4237.
Full textJun Xu and M. Singhal. "Design and evaluation of a high-performance ATM firewall switch and its applications." IEEE Journal on Selected Areas in Communications 17, no. 6 (June 1999): 1190–200. http://dx.doi.org/10.1109/49.772457.
Full textAriyanto, Y., B. Harijanto, V. A. H. Firdaus, and S. N. Arief. "Performance analysis of Proxmox VE firewall for network security in cloud computing server implementation." IOP Conference Series: Materials Science and Engineering 732 (January 27, 2020): 012081. http://dx.doi.org/10.1088/1757-899x/732/1/012081.
Full textMohan, Ratish, Anis Yazidi, Boning Feng, and John Oommen. "On optimizing firewall performance in dynamic networks by invoking a novelswapping window-based paradigm." International Journal of Communication Systems 31, no. 15 (July 24, 2018): e3773. http://dx.doi.org/10.1002/dac.3773.
Full textYeasmin, Mahbuba, Nahida Akter, Mohammed Humayun Kabir, Javed Hossain, and Kuei-Ping Shih. "Performance evaluation of multi-cloud compared to the single-cloud under varying firewall conditions." Cogent Engineering 5, no. 1 (January 1, 2018): 1471974. http://dx.doi.org/10.1080/23311916.2018.1471974.
Full textGuo, Zhen Hong, Lin Li, Qing Wang, Meng Lin, and Rui Pan. "FMPC: A Fast Multi-Dimensional Packet Classification Algorithm." Applied Mechanics and Materials 644-650 (September 2014): 3365–70. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3365.
Full textChen, Shuming, Dengfeng Wang, Tianze Shi, and Jing Chen. "Multi-Objective Optimization of Vehicle Sound Package in Middle Frequency Using Gray Relational Analysis Coupled with Principal Component Analysis." Fluctuation and Noise Letters 14, no. 01 (December 25, 2014): 1550010. http://dx.doi.org/10.1142/s0219477515500108.
Full textLi, Junnan, Zhigang Sun, Jinli Yan, Xiangrui Yang, Yue Jiang, and Wei Quan. "DrawerPipe: A Reconfigurable Pipeline for Network Processing on FPGA-Based SmartNIC." Electronics 9, no. 1 (December 31, 2019): 59. http://dx.doi.org/10.3390/electronics9010059.
Full textFotiadou, Konstantina, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Dimitrios Skias, Sofia Tsekeridou, and Theodore Zahariadis. "Network Traffic Anomaly Detection via Deep Learning." Information 12, no. 5 (May 19, 2021): 215. http://dx.doi.org/10.3390/info12050215.
Full textMohammed, Sarah Hashim, and Ammar Dawood Jasim. "Evaluation of Firewall and Load balance in Fat-Tree Topology Based on Floodlight Controller." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (March 1, 2020): 1157. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1157-1164.
Full textS, Kendaganna Swamy, Anand Jatti, and Uma B. V. "Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-based Monitoring System." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 4164. http://dx.doi.org/10.11591/ijece.v8i6.pp4164-4174.
Full textHuang, Yi, Shah Nazir, Xinqiang Ma, Shiming Kong, and Youyuan Liu. "Acquiring Data Traffic for Sustainable IoT and Smart Devices Using Machine Learning Algorithm." Security and Communication Networks 2021 (June 19, 2021): 1–11. http://dx.doi.org/10.1155/2021/1852466.
Full textFeng, Guohui, Xing Sheng, and Xiaolong Xu. "Thermal Performance Analysis of Combined Heating of Phase Change Kang and Firewall for Village Room under Winter Condition." Procedia Engineering 146 (2016): 541–48. http://dx.doi.org/10.1016/j.proeng.2016.06.395.
Full textMelkov, Dmitrij, and Šarūnas Paulikas. "ANALYSIS OF LINUX OS SECURITY TOOLS FOR PACKET FILTERING AND PROCESSING." Mokslas - Lietuvos ateitis 13 (August 24, 2021): 1–5. http://dx.doi.org/10.3846/mla.2021.15180.
Full text