Journal articles on the topic 'Firewalls'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Firewalls.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hanane Aznaoui and Canan Batur Şahin. "A Virtual Data Center Comparison Of Different Firewalls' Performance." Journal of Advancement in Computing 1, no. 1 (2023): 1–8. http://dx.doi.org/10.36755/jac.v1i1.46.
Full textUmm e Khadija and Iqra Saqib. "Comparison Of Different Firewalls Performance In A Virtual For Cloud Data Center." Journal of Advancement in Computing 1, no. 1 (2023): 21–28. http://dx.doi.org/10.36755/jac.v1i1.49.
Full textHakani, Dhwani, and Palvinder Singh Mann. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 141. https://doi.org/10.11591/ijict.v14i1.pp141-152.
Full textSablok, Aman, and Rohini S. Hallikar. "SDN Integration with Firewalls and Enhancing Security Monitoring on Firewalls." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26202.
Full textKhummanee, Suchart, Panida Songram, and Potchara Pruksasri. "FFF: Fast Firewall Framework to Enhance Rule Verifying over High-speed Networks." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 1 (2022): 35–47. http://dx.doi.org/10.37936/ecti-cit.2022161.246990.
Full textAlicea, Michael, and Izzat Alsmadi. "Misconfiguration in Firewalls and Network Access Controls: Literature Review." Future Internet 13, no. 11 (2021): 283. http://dx.doi.org/10.3390/fi13110283.
Full textThume, Vamshi Krishna. "Dominance Of Hardware Firewalls And Denial Of Firewall Attacks (Case Study BlackNurse Attack)." Dominance Of Hardware Firewalls And Denial Of Firewall Attacks (Case Study BlackNurse Attack) 11, no. 4 (2022): 28–33. https://doi.org/10.5281/zenodo.6586032.
Full textManisha, Patil, and Mohurle Savita. "The Empirical Study of the Evolution of the Next Generation Firewalls." International Journal of Trend in Scientific Research and Development 1, no. 5 (2017): 193–96. https://doi.org/10.31142/ijtsrd2259.
Full textTerentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko, and Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT." Management of Development of Complex Systems, no. 45 (March 1, 2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.
Full textNikhil, Bhagat. "Implementing Stateful vs. Stateless Firewalls: Choosing the Right Approach for Modern Network Security." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 10, no. 5 (2022): 1–8. https://doi.org/10.5281/zenodo.14005344.
Full textChen, Pisin, Yen Chin Ong, Don Nelson Page, Misao Sasaki, and Dong-Han Yeom. "Unclothed firewalls." International Journal of Modern Physics D 25, no. 13 (2016): 1645003. http://dx.doi.org/10.1142/s0218271816450036.
Full textMansoor, Farooq, Khan Rafi, and Hassan Khan Mubashir. "Stout Implementation of Firewall and Network Segmentation for Securing IoT Devices." Indian Journal of Science and Technology 16, no. 33 (2023): 2609–21. https://doi.org/10.17485/IJST/v16i33.1262.
Full textSeyidova, I., and D. Karatova. "FIREWALLS: SECURITY AND THREAT RESEARCH." Sciences of Europe, no. 107 (December 24, 2022): 137–39. https://doi.org/10.5281/zenodo.7479808.
Full textSingh, Sachin. "To Design and Implementation of Framework for Firewall Policy with Minimum Rule Set." International Journal of Advance Research and Innovation 2, no. 4 (2014): 17–26. http://dx.doi.org/10.51976/ijari.241404.
Full textKhummanee, Suchart, Umaporn Saisangchan, Kritsanapong Somsuk, and Sarutte Atsawaraungsuk. "High-speed Firewall Rule Verification Technique Improves Throughput Performance for IP Version 6." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 3 (2022): 338–51. http://dx.doi.org/10.37936/ecti-cit.2022163.248690.
Full textDr. Parvathi S, Raj shekhar Singh, Simpal Kumari, and Sudhanshu Kumar. "Dynamic AI-Augmented Firewall for Real-Time Threat Mitigation." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 353–57. https://doi.org/10.47392/irjaeh.2025.0049.
Full textDhwani, Hakani, and Singh Mann Palvinder. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology 14, no. 1 (2025): 141–52. https://doi.org/10.11591/ijict.v14i1.pp141-152.
Full textAnwar, Raja Waseem, Tariq Abdullah, and Flavio Pastore. "Firewall Best Practices for Securing Smart Healthcare Environment: A Review." Applied Sciences 11, no. 19 (2021): 9183. http://dx.doi.org/10.3390/app11199183.
Full textCho, Sung-Ho, Sung-Uk Choi, and . "A Study on Comparison of Network Location Efficiency of Web Application Firewall." International Journal of Engineering & Technology 7, no. 3.33 (2018): 183. http://dx.doi.org/10.14419/ijet.v7i3.33.21009.
Full textFakiha, Bandr. "Effectiveness of Forensic Firewall in Protection of Devices from Cyberattacks." International Journal of Safety and Security Engineering 12, no. 1 (2022): 77–82. http://dx.doi.org/10.18280/ijsse.120110.
Full textLindqvist, Janne, Essi Vehmersalo, Miika Komu, and Jukka Manner. "Enterprise Network Packet Filtering for Mobile Cryptographic Identities." International Journal of Handheld Computing Research 1, no. 1 (2010): 79–94. http://dx.doi.org/10.4018/jhcr.2010090905.
Full textSatrya, Gandeva Bayu, Faiizal Eko Nugroho, and Tri Brotoharsono. "Improving Network Security - A Comparison of Open Source DPI Software." International Journal on Information and Communication Technology (IJoICT) 2, no. 2 (2017): 11. http://dx.doi.org/10.21108/ijoict.2016.22.77.
Full textQian, Xinyang. "Network security and computer program." Applied and Computational Engineering 5, no. 1 (2023): 744–49. http://dx.doi.org/10.54254/2755-2721/5/20230688.
Full textWang, Xing, and Tao Zhao. "Design and Research of Firewall System of Communication Department Based on Network Information Technology." Journal of Physics: Conference Series 2074, no. 1 (2021): 012044. http://dx.doi.org/10.1088/1742-6596/2074/1/012044.
Full textMohammed, Raya Kahtan, and Yoichiro UENO. "An FPGA-based Network Firewall with Expandable Rule Description." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 3 (2018): 1310. http://dx.doi.org/10.11591/ijeecs.v10.i3.pp1310-1318.
Full textRaya., K. Mohammed, and UENO Yoichiro. "An FPGA-based Network Firewall with Expandable Rule Description." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 3 (2018): 1310–18. https://doi.org/10.11591/ijeecs.v10.i3.pp1310-1318.
Full textHakani, Dhwani, and Palvinder Singh Mann. "Enhanced Particle Swarm Optimization-Based Approach to Firewall Optimal Rule Reordering." International Journal of Computer Theory and Engineering 16, no. 4 (2024): 134–44. http://dx.doi.org/10.7763/ijcte.2024.v16.1361.
Full textSchultz, E. Eugene. "When firewalls fail: Lessons learned from firewall testing." Network Security 1997, no. 2 (1997): 8–11. http://dx.doi.org/10.1016/s1353-4858(97)86649-4.
Full textPeriyasamy, A. R. Pon. "Security Issues of Firewall." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 455. http://dx.doi.org/10.23956/ijarcsse/v7i4/0208.
Full textKhummanee, Suchart, Phatthanaphong Chomphuwiset, and Potchara Pruksasri. "DSSF: Decision Support System to Detect and Solve Firewall Rule Anomalies based on a Probability Approach." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 1 (2022): 56–73. http://dx.doi.org/10.37936/ecti-cit.2022161.246996.
Full textSingleton, Douglas. "Non-Abelian firewall." International Journal of Modern Physics D 29, no. 14 (2020): 2043003. http://dx.doi.org/10.1142/s0218271820430038.
Full textSadykov, A. M., R. R. Yamaletdinov, and D. I. Sabirova. "Russian firewall screening tools for secured systems." Herald of Dagestan State Technical University. Technical Sciences 51, no. 4 (2025): 154–63. https://doi.org/10.21822/2073-6185-2024-51-4-154-163.
Full textDr., A.SHAJI GEORGE, and GEORGE A.S.HOVAN. "A Brief Study on The Evolution of Next Generation Firewall and Web Application Firewall." IJARCCE:International Journal of Advanced Research in Computer and Communication Engineering 10, no. 5 (2021): 31–37. https://doi.org/10.5281/zenodo.7027397.
Full textOzhiganova, Marina, and Emil Kurtametov. "Using Neural Networks to Protect Web Applications." NBI Technologies, no. 2 (December 2020): 16–20. http://dx.doi.org/10.15688/nbit.jvolsu.2020.2.3.
Full textCho, Hye Rim, Jeong Hwa Yoo, and Jung Kwan Seo. "Fire Resistance Characteristics of Firewall Structure Associated with Impact Damage Induced by Explosion." Journal of Ocean Engineering and Technology 37, no. 3 (2023): 99–110. http://dx.doi.org/10.26748/ksoe.2023.002.
Full textTelkar, Prajwal S., and Dr Kiran V. "Implementation of Threat policies and Routing process in Firepower Threat Defense." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 833–39. http://dx.doi.org/10.51201/jusst/21/05344.
Full textScott, Ralph L. "Wired to the World: Firewalls." North Carolina Libraries 61, no. 3 (2009): 109. http://dx.doi.org/10.3776/ncl.v61i3.168.
Full textBotvinko, Anatoly Y., and Konstantin E. Samouylov. "Evaluation of the firewall influence on the session initiation by the SIP multimedia protocol." Discrete and Continuous Models and Applied Computational Science 29, no. 3 (2021): 221–29. http://dx.doi.org/10.22363/2658-4670-2021-29-3-221-229.
Full textSichkar, Mykhailo, and Larysa Pavlova. "A short survey of the capabilities of Next Generation firewalls." Computer Science and Cybersecurity, no. 1 (December 25, 2023): 28–33. http://dx.doi.org/10.26565/2519-2310-2023-1-02.
Full textSobol, Michael I. "Firewalls." Information Systems Security 6, no. 1 (1997): 20–28. http://dx.doi.org/10.1080/10658989709342525.
Full textCheswick, William. "Firewalls." Scientific American 279, no. 4 (1998): 106–7. http://dx.doi.org/10.1038/scientificamerican1098-106.
Full textMeyer, Helen. "Firewalls." Computers & Security 15, no. 3 (1996): 225–26. http://dx.doi.org/10.1016/s0167-4048(96)90312-0.
Full textManaseer, Saher, Ahmad K. Al Hwaitat, and Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment." Modern Applied Science 12, no. 10 (2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Full textGamilla, Anazel P., and Marlon A. Naagas. "Header of death: security implications of IPv6 extension headers to the open-source firewall." Bulletin of Electrical Engineering and Informatics 11, no. 1 (2022): 319–26. http://dx.doi.org/10.11591/eei.v11i1.3446.
Full textAnazel, P. Gamilla, and A. Naagas Marlon. "Header of death: security implications of IPv6 extension headers to the open-source firewall." Bulletin of Electrical Engineering and Informatics 11, no. 1 (2022): 319–26. https://doi.org/10.11591/eei.v11i1.3446.
Full textTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Full textCrépeau, François, and Bethany Hastie. "The Case for ‘Firewall’ Protections for Irregular Migrants." European Journal of Migration and Law 17, no. 2-3 (2015): 157–83. http://dx.doi.org/10.1163/15718166-12342076.
Full textAltamezvi, Alnuman Mohammed Abubaker, Abdulwahed Omran E. Alalwani, and Ashour Alsllami. "Comparing Context Based Access Control to Zone-based Policy Firewalls." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 1215–22. http://dx.doi.org/10.22214/ijraset.2022.44006.
Full textDas, Sumit Kumar, and Payal Panda. "Implementation of Generative AI in Enhancing Cyber Threat Intelligence and Next Generation Firewalls." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 1169–89. https://doi.org/10.22214/ijraset.2025.66536.
Full textYasir Saleem, Usama Anwar, Muhammad Khawar Bashir, Sheraz Naseer, and Nadia Tabassum. "Flow-Based Rules Generation for Intrusion Detection System using Machine Learning Approach." Lahore Garrison University Research Journal of Computer Science and Information Technology 4, no. 3 (2020): 54–70. http://dx.doi.org/10.54692/lgurjcsit.2020.0403100.
Full text