Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Firewall")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 273

  • Page / 11
Export

Selection :

  • and

Analysis of firewall policy rules using traffic mining techniques : Recent Advances in Network Security Attacks and DefencesABEDIN, Muhammad; NESSA, Syeda; KHAN, Latifur et al.International journal of Internet protocol technology (Print). 2009, Vol 5, Num 1-2, pp 3-22, issn 1743-8209, 20 p.Article

Structured firewall designGOUDA, Mohamed G; LIU, Alex X.Computer networks (1999). 2007, Vol 51, Num 4, pp 1106-1120, issn 1389-1286, 15 p.Article

Firewall policy verification and troubleshootingLIU, Alex X.Computer networks (1999). 2009, Vol 53, Num 16, pp 2800-2809, issn 1389-1286, 10 p.Article

Concert IP Secure - a managed firewall and VPN service : SecuritySHORROCK, G; AWDRY, C.BT technology journal. 2001, Vol 19, Num 3, pp 99-106, issn 1358-3948Article

Implementation of an IPv6 multicast firewall testbedYOO, Kyeong; HUNT, Ray.Computer communications. 2006, Vol 29, Num 16, pp 3079-3091, issn 0140-3664, 13 p.Article

Firmato: A novel firewall management toolkitBARTAL, Yair; MAYER, Alain; NISSIM, Kobbi et al.ACM transactions on computer systems. 2004, Vol 22, Num 4, pp 381-420, issn 0734-2071, 40 p.Article

Firewalls - evolve or die : SecurityGOOCH, D. J; HUBBARD, S. D; MOORE, M. W et al.BT technology journal. 2001, Vol 19, Num 3, pp 89-98, issn 1358-3948Article

Discovering last-matching rules in popular open-source and commercial firewalls : Recent Advances in Network Security Attacks and DefencesSALAH, K; SATTAR, K; BAIG, Z. A et al.International journal of Internet protocol technology (Print). 2009, Vol 5, Num 1-2, pp 23-31, issn 1743-8209, 9 p.Article

Firewall-Systeme: ein Mittel der Organisationskontrolle? Leistungsgrenzen von Firewalls für den Datenschutz = Firewall-System : a way to control organisation? Limits of firewalls for data protectionGROENEVELD, H; WÄCHTER, M.Computer und Recht (Köln). 1999, Vol 15, Num 6, pp 390-395, issn 0179-1990Article

Avoid disaster : Use firewalls for inter-Intranet securityCHARNETSKI, J. R.Computers in libraries. 1998, Vol 18, Num 9, pp 44-48, issn 1041-7915, 4 p.Article

Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices : Wired/wireless internet communicationsLANGENDOERFER, Peter; PIOTROWSKI, Krzysztof; PETER, Steffen et al.Computer communications. 2007, Vol 30, Num 7, pp 1487-1497, issn 0140-3664, 11 p.Article

Computer security; Guidelines on firewalls and firewall policy : recommendations of the National Institute of Standards and TechnologyWack, John; Cutler, Ken; Pole, Jamie et al.NIST special publication. 2002, issn 1048-776X, X, 43 pBook

Design and Implementation of Portable, Multi Mode of Operation Embedded FirewallALKHISHALI, Hassan H; EL FARAG, Ahmed Abou; EL BAITH MOHAMED, Abd et al.International Conference on Information Technology Interfaces. 2010, pp 129-134, isbn 978-953-7138-18-9, 1Vol, 6 p.Conference Paper

Mise en oeuvre d'un pare-feu gratuit à base d'IP Filter = Implementation of a free firewall based on IP filterLEVIER, Laurent.Techniques de l'ingénieur. Télécoms. 2007, Vol TEA3, Num TE7702, issn 1632-3823, TE7702.1-TE7702.13Article

Secure Web tunnelingABADI, M; BIRRELL, A; STATA, R et al.Computer networks and ISDN systems. 1998, Vol 30, Num 1-7, pp 531-539, issn 0169-7552Conference Paper

A survey of intrusion detection techniques in CloudMODI, Chirag; PATEL, Dhiren; BORISANIYA, Bhavesh et al.Journal of network and computer applications. 2013, Vol 36, Num 1, pp 42-57, issn 1084-8045, 16 p.Article

Firewall filtering rules analysis for anomalies detectionBOUHOULA, Adel; TRABELSI, Zouheir; BARKA, Ezedin et al.International journal of security and networks (Print). 2008, Vol 3, Num 3, pp 161-172, issn 1747-8405, 12 p.Article

Scalable packet classification with controlled cross-productingWANG, Pi-Chung.Computer networks (1999). 2009, Vol 53, Num 6, pp 821-834, issn 1389-1286, 14 p.Article

5 coupe-feu pour sécuriser votre réseau = 5 firewall to secure your netCLAPAUD, R. A.Internet professionnel (Mensuel). 1998, Num 25, pp 70-81, issn 1278-5113Article

INVUS : Intelligent VUInerability scannerAKYUZ, Turker; SOGUKPINAR, Ibrahim.Lecture notes in computer science. 2005, pp 264-265, issn 0302-9743, isbn 3-540-28791-4, 2 p.Conference Paper

Internet security : a case study of firewall selectionWEN, H. J; TARN, J.-H. M.Information management & computer security. 1998, Vol 6, Num 4, pp 178-184, issn 0968-5227Article

Firewalling the NetHUBBARD, S. D; SAGER, J. C.BT technology journal. 1997, Vol 15, Num 2, pp 94-106, issn 1358-3948Article

Validating firewalls in mobile ambientsNIELSON, F; NIELSON, H. R; HANSEN, R. R et al.Lecture notes in computer science. 1999, pp 463-477, issn 0302-9743, isbn 3-540-66425-4Conference Paper

Sécurité d'Internet = Security over the InternetLAURENT-MAKNAVICIUS, Maryline.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2001, Vol SI1, Num H2268, pp H2268.1-H2268.15Article

A unified methodology for verification and synthesis of firewall configurationsPERMPOONTANALARP, Yongyuth; RUJIMETHABHAS, Chaiwat.Lecture notes in computer science. 2001, pp 328-339, issn 0302-9743, isbn 3-540-42880-1Conference Paper

  • Page / 11