Journal articles on the topic 'Firewall Policy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Firewall Policy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hakani, Dhwani, and Palvinder Singh Mann. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 141. https://doi.org/10.11591/ijict.v14i1.pp141-152.
Full textSingh, Sachin. "To Design and Implementation of Framework for Firewall Policy with Minimum Rule Set." International Journal of Advance Research and Innovation 2, no. 4 (2014): 17–26. http://dx.doi.org/10.51976/ijari.241404.
Full textJha, Ashutosh Chandra. "Automated Firewall Policy Generation with Reinforcement Learning." International journal of IoT 5, no. 1 (2025): 190–211. https://doi.org/10.55640/ijiot-05-01-10.
Full textDhwani, Hakani, and Singh Mann Palvinder. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology 14, no. 1 (2025): 141–52. https://doi.org/10.11591/ijict.v14i1.pp141-152.
Full textLindqvist, Janne, Essi Vehmersalo, Miika Komu, and Jukka Manner. "Enterprise Network Packet Filtering for Mobile Cryptographic Identities." International Journal of Handheld Computing Research 1, no. 1 (2010): 79–94. http://dx.doi.org/10.4018/jhcr.2010090905.
Full textTelkar, Prajwal S., and Dr Kiran V. "Implementation of Threat policies and Routing process in Firepower Threat Defense." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 833–39. http://dx.doi.org/10.51201/jusst/21/05344.
Full textAltamezvi, Alnuman Mohammed Abubaker, Abdulwahed Omran E. Alalwani, and Ashour Alsllami. "Comparing Context Based Access Control to Zone-based Policy Firewalls." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 1215–22. http://dx.doi.org/10.22214/ijraset.2022.44006.
Full textLiu, A. X., and M. G. Gouda. "Firewall Policy Queries." IEEE Transactions on Parallel and Distributed Systems 20, no. 6 (2009): 766–77. http://dx.doi.org/10.1109/tpds.2008.263.
Full textDr. Parvathi S, Raj shekhar Singh, Simpal Kumari, and Sudhanshu Kumar. "Dynamic AI-Augmented Firewall for Real-Time Threat Mitigation." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 353–57. https://doi.org/10.47392/irjaeh.2025.0049.
Full textChu, Jie, and Zhao Li. "Design and Implementation of the Firewall Policy Audit Based on Improved Policy Tree." Applied Mechanics and Materials 736 (March 2015): 179–82. http://dx.doi.org/10.4028/www.scientific.net/amm.736.179.
Full textPark, Jinyong, Byeongjo Park, and Tae-Sung Kim. "Development of an Anomaly Classification Model and a Decision Support Tool for Firewall Policy Configuration." Applied Sciences 15, no. 6 (2025): 2979. https://doi.org/10.3390/app15062979.
Full textJ., Britto Dennis, Chindhya Baby U., and Sashikumar S. "FIREWALL OPTIMIZATION TECHNIQUE USING SMART CONTEXT SENSITIVE METHOD." International Journal of Engineering Research and Modern Education (IJERME) 5, no. 1 (2020): 6–11. https://doi.org/10.5281/zenodo.3634357.
Full textBodei, Chiara, Lorenzo Ceragioli, Pierpaolo Degano, et al. "FWS: Analyzing, maintaining and transcompiling firewalls." Journal of Computer Security 29, no. 1 (2021): 77–134. http://dx.doi.org/10.3233/jcs-200017.
Full textDarade, R.V., and P.B. Kumbharkar. "Firewall policy anomaly detection and resolution." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 06 (2014): 879–83. https://doi.org/10.5281/zenodo.14742678.
Full textBateni, Shirin, and Ali Asghar Khavasi. "DESIGN A SECURITY FIREWALL POLICY TO FILTER INCOMING TRAFFIC IN PACKET SWITCHED NETWORKS USING CLASSIFICATION METHODS." Ciência e Natura 38, no. 2 (2016): 821. http://dx.doi.org/10.5902/2179460x21530.
Full textHamed, Hazem, and Ehab Al-Shaer. "On autonomic optimization of firewall policy organization." Journal of High Speed Networks 15, no. 3 (2006): 209–27. https://doi.org/10.3233/hsn-2006-287.
Full textLiu, Alex X. "Firewall policy change-impact analysis." ACM Transactions on Internet Technology 11, no. 4 (2012): 1–24. http://dx.doi.org/10.1145/2109211.2109212.
Full textLiu, Alex X. "Firewall policy verification and troubleshooting." Computer Networks 53, no. 16 (2009): 2800–2809. http://dx.doi.org/10.1016/j.comnet.2009.07.003.
Full textFirmansyah, Firmansyah, and Mochamad Wahyudi. "Analisis Performa Access Control List Menggunakan Metode Firewall Policy Base." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 20, no. 2 (2021): 283–92. http://dx.doi.org/10.30812/matrik.v20i2.1068.
Full textPutri, Herika Andini, Rohmat Tulloh, and Nazel Djibran. "Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware." Jurnal Informatika Universitas Pamulang 8, no. 2 (2023): 322–29. http://dx.doi.org/10.32493/informatika.v8i2.33656.
Full textZhang, Tao, Yuan Yuan Ma, Wei Li, Jian Shi, and Na Wang. "An Improved Method of Firewall Policy Anomaly Detection Based on Decision Tree." Applied Mechanics and Materials 672-674 (October 2014): 1925–30. http://dx.doi.org/10.4028/www.scientific.net/amm.672-674.1925.
Full textTimmerman, Ruben I., Arjen Leerkes, Richard Staring, and Nicola Delvino. "‘Free In, Free Out’: Exploring Dutch Firewall Protections for Irregular Migrant Victims of Crime." European Journal of Migration and Law 22, no. 3 (2020): 427–55. http://dx.doi.org/10.1163/15718166-12340082.
Full textAli, Muhammad Qasim, Ehab Al-Shaer, and Taghrid Samak. "Firewall Policy Reconnaissance: Techniques and Analysis." IEEE Transactions on Information Forensics and Security 9, no. 2 (2014): 296–308. http://dx.doi.org/10.1109/tifs.2013.2296874.
Full textHu, Hongxin, Gail-Joon Ahn, and Ketan Kulkarni. "Detecting and Resolving Firewall Policy Anomalies." IEEE Transactions on Dependable and Secure Computing 9, no. 3 (2012): 318–31. http://dx.doi.org/10.1109/tdsc.2012.20.
Full textRaziya, Abdul, and Amrutasagar Kavarthapu. "Resolving Cross Domain Firewall Policy Anomalies." International Journal of Computer Applications 124, no. 14 (2015): 12–15. http://dx.doi.org/10.5120/ijca2015905771.
Full textMorzhov, Sergey V., and Valeriy A. Sokolov. "An Effective Algorithm for Collision Resolution in Security Policy Rules." Modeling and Analysis of Information Systems 26, no. 1 (2019): 75–89. http://dx.doi.org/10.18255/1818-1015-2019-1-75-89.
Full textCho, Sung-Ho, Sung-Uk Choi, and . "A Study on Comparison of Network Location Efficiency of Web Application Firewall." International Journal of Engineering & Technology 7, no. 3.33 (2018): 183. http://dx.doi.org/10.14419/ijet.v7i3.33.21009.
Full textSudarma Putri, Dewa Ayu Rai, Lilik Widyawati, Husain, and I Made Yadi Dharma. "Analysis of Firewall Policy Effectiveness in Filtering Network Traffic Using Elastic Stack." Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4, no. 3 (2025): 2129–33. https://doi.org/10.59934/jaiea.v4i3.1116.
Full textAkash, Belkhede *., Sonawane Sanket, Khirsagar Chaitanya, and D. D. Sapkal Prof. "FIREWALL ENGINE BASED ON GRAPHICS PROCESSING UNIT." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 3 (2016): 424–29. https://doi.org/10.5281/zenodo.47575.
Full textAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Full textArunkumar.k, Arunkumar k. "Auto Finding and Resolving Distributed Firewall Policy." IOSR Journal of Computer Engineering 10, no. 5 (2013): 56–60. http://dx.doi.org/10.9790/0661-1055660.
Full textK, Arunkumar, and Suganthi B. "Auto Finding and Resolving Distributed Firewall Policy." IOSR Journal of Computer Engineering 16, no. 5 (2014): 93–97. http://dx.doi.org/10.9790/0661-16579397.
Full textCaldeira, Filipe, and Edmundo Monteiro. "Policy-based networking: applications to firewall management." Annales des Télécommunications 59, no. 1-2 (2004): 38–54. http://dx.doi.org/10.1007/bf03179673.
Full textCeragioli, Lorenzo, Pierpaolo Degano, and Letterio Galletta. "Can my firewall system enforce this policy?" Computers & Security 117 (June 2022): 102683. http://dx.doi.org/10.1016/j.cose.2022.102683.
Full textK . Chawan, Abhishek, and Shashikant S . Mahajan. "Solving Firewall Policy Anomalies Using Generic Algorithm." International Journal of Engineering Trends and Technology 20, no. 4 (2015): 200–203. http://dx.doi.org/10.14445/22315381/ijett-v20p238.
Full textTaylor, Onate, and Promise Ezekiel. "Firewall Defense and Response Policy towards Resisting Attacks on Network Logs." International Journal of Computing Sciences Research 8 (January 1, 2024): 2886–904. https://doi.org/10.25147/ijcsr.2017.001.1.193.
Full textLee, Hyunjung, Suryeon Lee, Kyounggon Kim, and Huy Kang Kim. "HSViz: Hierarchy Simplified Visualizations for Firewall Policy Analysis." IEEE Access 9 (2021): 71737–53. http://dx.doi.org/10.1109/access.2021.3077146.
Full textArchana, V., and T. Kumesh. "Anomaly Discovery and Resolution in Distributed Firewall Policy." International Journal of MC Square Scientific Research 6, no. 1 (2014): 43–49. http://dx.doi.org/10.20894/ijmsr.117.006.001.007.
Full textVanikalyani, G., P. Avinash P.Avinash, and P. Pandarinath P.Pandarinath. "Cross-Domain Search for Policy Anomalies in Firewall." International Journal of Computer Applications 104, no. 6 (2014): 20–24. http://dx.doi.org/10.5120/18205-9337.
Full textLiang, Xiaoyan, Chunhe Xia, Jian Jiao, Junshun Hu, and Xiaojian Li. "Modeling and global conflict analysis of firewall policy." China Communications 11, no. 5 (2014): 124–35. http://dx.doi.org/10.1109/cc.2014.6880468.
Full textLin, Zhiming, and Zhiqiang Yao. "Firewall Anomaly Detection Based on Double Decision Tree." Symmetry 14, no. 12 (2022): 2668. http://dx.doi.org/10.3390/sym14122668.
Full textRoup, Abdul. "Integration of Firewall Log Data into Accounting Information Systems to Enhance Internal Control and Cyber Threat Detection: A Case Study Using Palo Alto PA820." Jurnal Ilmiah Akuntansi Kesatuan 11, no. 3 (2023): 663–68. https://doi.org/10.37641/jiakes.v11i3.3673.
Full textAbedin, Muhammad, Syeda Nessa, Latifur Khan, Ehab Al Shaer, and Mamoun Awad. "Analysis of firewall policy rules using traffic mining techniques." International Journal of Internet Protocol Technology 5, no. 1/2 (2010): 3. http://dx.doi.org/10.1504/ijipt.2010.032611.
Full textDuan, Qi, and Ehab Al-Shaer. "Traffic-aware dynamic firewall policy management: techniques and applications." IEEE Communications Magazine 51, no. 7 (2013): 73–79. http://dx.doi.org/10.1109/mcom.2013.6553681.
Full textSangeetha, Dr S. Brilly. "DDoS Deflate and APF (Advanced Policy Firewall):A Report." International Journal of Computer Trends and Technology 27, no. 2 (2015): 64–69. http://dx.doi.org/10.14445/22312803/ijctt-v27p111.
Full textHunt, Ray. "Internet/Intranet firewall security—policy, architecture and transaction services." Computer Communications 21, no. 13 (1998): 1107–23. http://dx.doi.org/10.1016/s0140-3664(98)00173-x.
Full textChen, Fei, Alex X. Liu, Jeehyun Hwang, and Tao Xie. "First step towards automatic correction of firewall policy faults." ACM Transactions on Autonomous and Adaptive Systems 7, no. 2 (2012): 1–24. http://dx.doi.org/10.1145/2240166.2240177.
Full textR, Sherine Jenny, and Sugirtham N. "SDN-Based Security for Smart Devices Against Denial of Service Attacks." Indian Journal of Science and Technology 16, no. 3 (2023): 181–89. https://doi.org/10.17485/IJST/v16i3.1960.
Full textKim, Gwang-Hyeok, Yun-Ju Gwon, Dong-Su Kim, and Tae-Myeong Jeong. "The Policy Distribution Algorithm of Firewall in Integrated Security Management." KIPS Transactions:PartC 9C, no. 4 (2002): 467–72. http://dx.doi.org/10.3745/kipstc.2002.9c.4.467.
Full textJufri, Muhammad, and Heryanto Heryanto. "PENINGKATAN KEAMANAN JARINGAN WIRELESS DENGAN MENERAPKAN SECURITY POLICY PADA FIREWALL." JOISIE (Journal Of Information Systems And Informatics Engineering) 5, no. 2 (2021): 98–108. http://dx.doi.org/10.35145/joisie.v5i2.1759.
Full text