Academic literature on the topic 'Firewall Policy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Firewall Policy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Firewall Policy"
Hakani, Dhwani, and Palvinder Singh Mann. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 141. https://doi.org/10.11591/ijict.v14i1.pp141-152.
Full textSingh, Sachin. "To Design and Implementation of Framework for Firewall Policy with Minimum Rule Set." International Journal of Advance Research and Innovation 2, no. 4 (2014): 17–26. http://dx.doi.org/10.51976/ijari.241404.
Full textJha, Ashutosh Chandra. "Automated Firewall Policy Generation with Reinforcement Learning." International journal of IoT 5, no. 1 (2025): 190–211. https://doi.org/10.55640/ijiot-05-01-10.
Full textDhwani, Hakani, and Singh Mann Palvinder. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology 14, no. 1 (2025): 141–52. https://doi.org/10.11591/ijict.v14i1.pp141-152.
Full textLindqvist, Janne, Essi Vehmersalo, Miika Komu, and Jukka Manner. "Enterprise Network Packet Filtering for Mobile Cryptographic Identities." International Journal of Handheld Computing Research 1, no. 1 (2010): 79–94. http://dx.doi.org/10.4018/jhcr.2010090905.
Full textTelkar, Prajwal S., and Dr Kiran V. "Implementation of Threat policies and Routing process in Firepower Threat Defense." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 833–39. http://dx.doi.org/10.51201/jusst/21/05344.
Full textAltamezvi, Alnuman Mohammed Abubaker, Abdulwahed Omran E. Alalwani, and Ashour Alsllami. "Comparing Context Based Access Control to Zone-based Policy Firewalls." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 1215–22. http://dx.doi.org/10.22214/ijraset.2022.44006.
Full textLiu, A. X., and M. G. Gouda. "Firewall Policy Queries." IEEE Transactions on Parallel and Distributed Systems 20, no. 6 (2009): 766–77. http://dx.doi.org/10.1109/tpds.2008.263.
Full textDr. Parvathi S, Raj shekhar Singh, Simpal Kumari, and Sudhanshu Kumar. "Dynamic AI-Augmented Firewall for Real-Time Threat Mitigation." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 353–57. https://doi.org/10.47392/irjaeh.2025.0049.
Full textChu, Jie, and Zhao Li. "Design and Implementation of the Firewall Policy Audit Based on Improved Policy Tree." Applied Mechanics and Materials 736 (March 2015): 179–82. http://dx.doi.org/10.4028/www.scientific.net/amm.736.179.
Full textDissertations / Theses on the topic "Firewall Policy"
Tapdiya, Ashish. "Firewall policy optimization and management." Winston-Salem, NC : Wake Forest University, 2008. http://dspace.zsr.wfu.edu/jspui/handle/10339/37458.
Full textHorowitz, Eduardo. "Estudo sobre a extração de políticas de firewall e uma proposta de metodologia." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/12075.
Full textPITSCHEIDER, CHRISTIAN. "Distributed Security Policy Analysis." Doctoral thesis, Politecnico di Torino, 2016. http://hdl.handle.net/11583/2644186.
Full textEl-Moussa, Fadi Ali. "An integrated active network approach to the provision of intrusion detection, network access policy and firewall functionality." Thesis, University of Salford, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.401982.
Full textKourtesis, Marios. "Creating a Secure Server Architecture and Policy for Linux-based Systems." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-41007.
Full textPenz, Leandro Lisboa. "Coherence in distributed packet filters." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/22813.
Full textRaheem, Muhammad. "Mitigation of inter-domain Policy Violations at Internet eXchange Points." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-247908.
Full textKonstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Full textCasalino, Matteo Maria. "Approches pour la gestion de configurations de sécurité dans les systèmes d'information distribués." Phd thesis, Université Claude Bernard - Lyon I, 2014. http://tel.archives-ouvertes.fr/tel-01058803.
Full textChen, Ying-ta, and 陳盈達. "Internet Firewall Policy Verification System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/34626331685126079736.
Full textBooks on the topic "Firewall Policy"
National Institute of Standards and Technology. NIST SP 800-41 Guidelines on Firewalls and Firewall Policy: NiST SP 800-41. Createspace Independent Publishing Platform, 2009.
Find full textWack, John. Guidelines on Firewalls and Firewall Policy: Recommendation of the National Institute of Standards and Technology. United States Government Printing Office, 2002.
Find full textGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2019.
Find full textGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.
Find full textGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.
Find full textGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.
Find full textGriffiths, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Find full textGriffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Find full textBook chapters on the topic "Firewall Policy"
Al-Shaer, Ehab. "Classification and Discovery of Firewalls Policy Anomalies." In Automated Firewall Analytics. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10371-6_1.
Full textCaldeira, Filipe, and Edmundo Monteiro. "A policy-based approach to firewall management." In IFIP Advances in Information and Communication Technology. Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35620-4_10.
Full textYin, Yi, Yuichiro Tateiwa, Yun Wang, Yoshiaki Katayama, and Naohisa Takahashi. "Inconsistency Analysis of Time-Based Security Policy and Firewall Policy." In Formal Methods and Software Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68690-5_27.
Full textWang, Weiping, Wenhui Chen, Zhepeng Li, and Huaping Chen. "Comparison Model and Algorithm for Distributed Firewall Policy." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-37275-2_67.
Full textSolanki, Vijender Kumar, Kumar Pal Singh, M. Venkatesan, and Sudhanshu Raghuwanshi. "Securing Networks Using Situation-Based Firewall Policy Computations." In Intelligent Computing, Networking, and Informatics. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1665-0_105.
Full textFadwa, Bezzazi, Mohammed El Marraki, and Ali Kartit. "Enhanced Algorithm for Type II Firewall Policy Deployment." In Lecture Notes in Electrical Engineering. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30298-0_53.
Full textMaddumala, Mahesh Nath, and Vijay Kumar. "Dynamic Firewall Policy Management Framework for Private Cloud." In Proceedings of International Symposium on Sensor Networks, Systems and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75683-7_8.
Full textSveda, Miroslav, Ondrej Rysavy, Gayan de Silva, Petr Matousek, and Jaroslav Rab. "Static Analysis of Routing and Firewall Policy Configurations." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25206-8_2.
Full textBandara, Arosha K., Antonis Kakas, Emil C. Lupu, and Alessandra Russo. "Using Argumentation Logic for Firewall Policy Specification and Analysis." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11907466_16.
Full textAbedin, Muhammad, Syeda Nessa, Latifur Khan, and Bhavani Thuraisingham. "Detection and Resolution of Anomalies in Firewall Policy Rules." In Data and Applications Security XX. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11805588_2.
Full textConference papers on the topic "Firewall Policy"
Shruthikaa, S., P. Thanushree, and Gunavathie. "SDN based Firewall with Real Time Policy Updates." In 2025 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2025. https://doi.org/10.1109/iciccs65191.2025.10984995.
Full textHuang, Tianrui, Lina You, Nishui Cai, and Ting Huang. "Large Language Model Firewall for AIGC Protection with Intelligent Detection Policy." In 2024 2nd International Conference On Mobile Internet, Cloud Computing and Information Security (MICCIS). IEEE, 2024. http://dx.doi.org/10.1109/miccis63508.2024.00047.
Full textRanathunga, Dinesha, Matthew Roughan, Phil Kernick, and Nick Falkner. "Malachite: Firewall policy comparison." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543759.
Full textJeffrey, Alan, and Taghrid Samak. "Model Checking Firewall Policy Configurations." In 2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2009. http://dx.doi.org/10.1109/policy.2009.32.
Full textYin, Yi, Xiaodong Xu, Yoshiaki Katayama, and Naohisa Takahashi. "Inconsistency Detection System for Security Policy and Firewall Policy." In 2010 First International Conference on Networking and Computing (ICNC). IEEE, 2010. http://dx.doi.org/10.1109/ic-nc.2010.45.
Full textYin, Yi, Yuichiro Tateiwa, Guoqiang Zhang, and Yun Wang. "Consistency Decision Between IPv6 Firewall Policy and Security Policy." In 2021 4th International Conference on Information Communication and Signal Processing (ICICSP). IEEE, 2021. http://dx.doi.org/10.1109/icicsp54369.2021.9611983.
Full textChen, Haining, Omar Chowdhury, Jing Chen, Ninghui Li, and Robert Proctor. "Towards quantification of firewall policy complexity." In HotSoS '15: Symposium and Bootcamp on the Science of Security. ACM, 2015. http://dx.doi.org/10.1145/2746194.2746212.
Full textParmar, P. N., Priya Rajagopal, and Ravi Sahita. "Protocol decode based stateful firewall policy definition language." In Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004. IEEE, 2004. http://dx.doi.org/10.1109/policy.2004.1309169.
Full textEl-Atawy, Adel, Taghrid Samak, Zein Wali, et al. "An Automated Framework for Validating Firewall Policy Enforcement." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.5.
Full textWei, Lingbo, Chi Zhang, Yanmin Gong, Yuguang Fang, and Kefei Chen. "A Firewall of Two Clouds: Preserving Outsourced Firewall Policy Confidentiality with Heterogeneity." In GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7841497.
Full textReports on the topic "Firewall Policy"
Wack, John, Ken Cutler, and Jamie Pole. Guidelines on firewalls and firewall policy :. National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-41.
Full textScarfone, K. A., and P. Hoffman. Guidelines on firewalls and firewall policy. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.sp.800-41r1.
Full text