Academic literature on the topic 'Firewalls'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Firewalls.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Firewalls"
Hanane Aznaoui and Canan Batur Şahin. "A Virtual Data Center Comparison Of Different Firewalls' Performance." Journal of Advancement in Computing 1, no. 1 (2023): 1–8. http://dx.doi.org/10.36755/jac.v1i1.46.
Full textUmm e Khadija and Iqra Saqib. "Comparison Of Different Firewalls Performance In A Virtual For Cloud Data Center." Journal of Advancement in Computing 1, no. 1 (2023): 21–28. http://dx.doi.org/10.36755/jac.v1i1.49.
Full textHakani, Dhwani, and Palvinder Singh Mann. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 141. https://doi.org/10.11591/ijict.v14i1.pp141-152.
Full textSablok, Aman, and Rohini S. Hallikar. "SDN Integration with Firewalls and Enhancing Security Monitoring on Firewalls." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26202.
Full textKhummanee, Suchart, Panida Songram, and Potchara Pruksasri. "FFF: Fast Firewall Framework to Enhance Rule Verifying over High-speed Networks." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 1 (2022): 35–47. http://dx.doi.org/10.37936/ecti-cit.2022161.246990.
Full textAlicea, Michael, and Izzat Alsmadi. "Misconfiguration in Firewalls and Network Access Controls: Literature Review." Future Internet 13, no. 11 (2021): 283. http://dx.doi.org/10.3390/fi13110283.
Full textThume, Vamshi Krishna. "Dominance Of Hardware Firewalls And Denial Of Firewall Attacks (Case Study BlackNurse Attack)." Dominance Of Hardware Firewalls And Denial Of Firewall Attacks (Case Study BlackNurse Attack) 11, no. 4 (2022): 28–33. https://doi.org/10.5281/zenodo.6586032.
Full textManisha, Patil, and Mohurle Savita. "The Empirical Study of the Evolution of the Next Generation Firewalls." International Journal of Trend in Scientific Research and Development 1, no. 5 (2017): 193–96. https://doi.org/10.31142/ijtsrd2259.
Full textTerentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko, and Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT." Management of Development of Complex Systems, no. 45 (March 1, 2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.
Full textNikhil, Bhagat. "Implementing Stateful vs. Stateless Firewalls: Choosing the Right Approach for Modern Network Security." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 10, no. 5 (2022): 1–8. https://doi.org/10.5281/zenodo.14005344.
Full textDissertations / Theses on the topic "Firewalls"
Verwoerd, Theuns Willem. "Stateful distributed firewalls." Thesis, University of Canterbury. Computer Science and Software Engineering, 2001. http://hdl.handle.net/10092/9620.
Full textBonnevier, Jani, and Sebastian Heimlén. "The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232067.
Full textSchreiber, Alexander. "Firewalls - Brandmauer oder Feuermelder ?" Universitätsbibliothek Chemnitz, 1999. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199900516.
Full textHearn, Kay, and n/a. "Sniffer Packets & Firewalls." University of Canberra. n/a, 2008. http://erl.canberra.edu.au./public/adt-AUC20081217.153550.
Full textNguyen, Vu. "Class firewalls in Java." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0021/MQ48439.pdf.
Full textNguyen, Vu Carleton University Dissertation Computer Science. "Class firewalls in Java." Ottawa, 1999.
Find full textPrasetijo, Agung Budi. "Application-level proxy firewalls." Thesis, Queensland University of Technology, 2001.
Find full textHöfler, Torsten, Christian Burkert, and Martin Telzer. "Comparative Firewall Study." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200401485.
Full textHarris, B. A. "Firewalls and virtual private networks." Thesis, University of Canterbury. Computer Science, 1998. http://hdl.handle.net/10092/8413.
Full textRangarajan, Vinod K. (Vinod Kashyap) 1975. "End-to-end connectivity across firewalls." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47623.
Full textBooks on the topic "Firewalls"
More sourcesBook chapters on the topic "Firewalls"
Kizza, Joseph Migga. "Firewalls." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_12.
Full textPerez, André. "Firewalls." In Network Security. John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043942.ch9.
Full textKizza, Joseph Migga. "Firewalls." In Texts in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_12.
Full textKizza, Joseph Migga. "Firewalls." In Guide to Computer Network Security. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_12.
Full textKizza, Joseph Migga. "Firewalls." In Guide to Computer Network Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_12.
Full textO’Leary, Mike. "Firewalls." In Cyber Operations. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0457-3_14.
Full textRao, Umesh Hodeghatta, and Umesha Nayak. "Firewalls." In The InfoSec Handbook. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_10.
Full textVazquez, Antonio. "Firewalls." In Learn CentOS Linux Network Services. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2379-6_10.
Full textAl-Shaer, Ehab. "Firewalls." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_911.
Full textO’Leary, Mike. "Firewalls." In Cyber Operations. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4294-0_17.
Full textConference papers on the topic "Firewalls"
Senthilkumar, Lohith, and Aaditya Rengarajan. "FLARE: Federated Learning And Resilient Encryption for Firewalls." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895282.
Full textPavlović, Milan, Marija Zajeganović, and Milan Milivojević. "Implementation of Next-Generation Firewalls in Modern Networks." In 7th International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2023. http://dx.doi.org/10.31410/itema.2023.19.
Full textAcharya, H. B., Aditya Joshi, and M. G. Gouda. "Firewall modules and modular firewalls." In 2010 18th IEEE International Conference on Network Protocols (ICNP). IEEE, 2010. http://dx.doi.org/10.1109/icnp.2010.5762766.
Full textFiorenza, Maurício, Diego Kreutz, and Rodrigo Mansilha. "Gerenciamento de Firewalls em Redes Híbridas." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19260.
Full textIlić, Predrag, Radomir Stamatović, Gordan Konečni, and Ivan Gojković. "ENHANCING SCADA SYSTEM SECURITY THROUGH THE IMPLEMENTATION OF PAIRED INTERNAL AND EXTERNAL FIREWALLS." In 21.Simpozijum CIGRE Srbija 2024. Srpski nacionalni komitet Međunarodnog saveta za velike električne mreže CIGRE Srbija, 2024. https://doi.org/10.46793/cigre21s.307i.
Full textCosta Júnior, Edmilson P. da, Silas T. Medeiros, Carlos Eduardo da Silva, and Marcos Madruga. "An Architecture for Self-adaptive Distributed Firewall." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2016. http://dx.doi.org/10.5753/sbseg.2016.19318.
Full textFiorenza, Maurício, Diego Kreutz, and Rodrigo B. Mansilha. "FWunify: uma Ferramenta para Simplificar a Configuração de Múltiplos Firewalls." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbseg_estendido.2021.17337.
Full textFiorenza, Maurício, Diego Kreutz, and Rodrigo B. Mansilha. "FWunify: uma Ferramenta para Simplificar a Configuração de Múltiplos Firewalls." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbseg_estendido.2021.17337.
Full textLohmann, Samir, Luciano Paschoal Gaspary, and Cristina Melchiors. "Avaliação do Emprego de Raciocínio baseado em Casos para Identificar Cenários de Intrusão em Logs de Firewalls." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2005. http://dx.doi.org/10.5753/sbseg.2005.21538.
Full textVieira, Emanuel de Franceschi Vieira, Emerson Wendler, Tiago Antonio Rizzetti, and Renato Preigschadt De Azevedo. "Estudo Comparativo de Firewalls de Código Aberto Baseados em FreeBSD: pfSense vs. OPNsense." In Escola Regional de Redes de Computadores. Sociedade Brasileira de Computação - SBC, 2024. https://doi.org/10.5753/errc.2024.4557.
Full textReports on the topic "Firewalls"
Wack, John, Ken Cutler, and Jamie Pole. Guidelines on firewalls and firewall policy :. National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-41.
Full textScarfone, K. A., and P. Hoffman. Guidelines on firewalls and firewall policy. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.sp.800-41r1.
Full textFithen, William, Julia Allen, and Ed Stoner. Deploying Firewalls. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada367717.
Full textFinlayson, R. IP Multicast and Firewalls. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2588.
Full textThaler, D. Reflections on Host Firewalls. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7288.
Full textOrvis, W. High-end Home Firewalls CIAC-2326. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/15013800.
Full textLe, F., S. Faccin, B. Patil, and H. Tschofenig. Mobile IPv6 and Firewalls: Problem Statement. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4487.
Full textChung, Yeji. Fighting North Korean fire with firewalls. East Asia Forum, 2024. http://dx.doi.org/10.59425/eabc.1721988000.
Full textFreed, N. Behavior of and Requirements for Internet Firewalls. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2979.
Full textNewman, Richard E., Vipan R. Nalla, and Ira S. Moskowitz. Covert Channels and Simple Timed Mix-Firewalls. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada426203.
Full text