Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Pare feu (réseau)")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 226

  • Page / 10
Export

Selection :

  • and

Design and Implementation of Portable, Multi Mode of Operation Embedded FirewallALKHISHALI, Hassan H; EL FARAG, Ahmed Abou; EL BAITH MOHAMED, Abd et al.International Conference on Information Technology Interfaces. 2010, pp 129-134, isbn 978-953-7138-18-9, 1Vol, 6 p.Conference Paper

Mise en oeuvre d'un pare-feu gratuit à base d'IP Filter = Implementation of a free firewall based on IP filterLEVIER, Laurent.Techniques de l'ingénieur. Télécoms. 2007, Vol TEA3, Num TE7702, issn 1632-3823, TE7702.1-TE7702.13Article

Modeling and generating network traffic for stateful firewall performance evaluationXIAO HONG LIU; YUE FENG JI.Proceedings of SPIE, the International Society for Optical Engineering. 2005, pp 60223Y.1-60223Y.9, issn 0277-786X, isbn 0-8194-6053-2, 2VolConference Paper

INVUS : Intelligent VUInerability scannerAKYUZ, Turker; SOGUKPINAR, Ibrahim.Lecture notes in computer science. 2005, pp 264-265, issn 0302-9743, isbn 3-540-28791-4, 2 p.Conference Paper

Sécurité d'Internet = Security over the InternetLAURENT-MAKNAVICIUS, Maryline.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2001, Vol SI1, Num H2268, pp H2268.1-H2268.15Article

Trends in Firewall Configuration Errors: Measuring the Holes in wiss CheeseWOOL, Avishai.IEEE internet computing. 2010, Vol 14, Num 4, pp 58-65, issn 1089-7801, 8 p.Article

Implementation of an IPv6 multicast firewall testbedYOO, Kyeong; HUNT, Ray.Computer communications. 2006, Vol 29, Num 16, pp 3079-3091, issn 0140-3664, 13 p.Article

Complete redundancy detection in firewallsLIU, Alex X; GOUDA, Mohamed G.Lecture notes in computer science. 2005, pp 193-206, issn 0302-9743, isbn 3-540-28138-X, 14 p.Conference Paper

A development of intrusion detection and protection system using netfilter frameworkMIN WOOK KIL; SEUNG KYEOM KIM; LEE, Geuk et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28653-5, 2Vol, Part II, 520-529Conference Paper

Design and Implement of Pack Filter Module Base on Embedded FirewallLIBO TIAN; CHEN WANG; SHUNBO YANG et al.Proceedings of SPIE, the International Society for Optical Engineering. 2011, Vol 8205, issn 0277-786X, isbn 978-0-8194-8847-3, 820527.1-820527.6Conference Paper

New phishes in the pond : a wake-up call for China in the context of management of computer crimeKESAR, Shalini.International journal of technology transfer and commercialisation. 2008, Vol 7, Num 1, pp 1-14, issn 1470-6075, 14 p.Article

An example of communication between security tools : Iptables - snortHERRERIAS GUERRERO, Jorge; GOMEZ CARDENAS, Roberto.Operating systems review. 2005, Vol 39, Num 3, pp 34-43, issn 0163-5980, 10 p.Article

A fully abstract encoding of the π-calculus with data termsBALDAMUS, Michael; PARROW, Joachim; VICTOR, Björn et al.Lecture notes in computer science. 2005, pp 1202-1213, issn 0302-9743, isbn 3-540-27580-0, 12 p.Conference Paper

Modeling the performance of a NAT/Firewall network service for the IXP2400VERDICKT, Tom; VAN DE MEERSSCHE, Wim; VLAEMINCK, Koert et al.International Workshop on Software and Performance. 2005, pp 137-143, isbn 1-59593-087-6, 1Vol, 7 p.Conference Paper

Traversing middleboxes with the host identity protocolTSCHOFENIG, Hannes; GURTOV, Andrei; YLITALO, Jukka et al.Lecture notes in computer science. 2005, pp 17-28, issn 0302-9743, isbn 3-540-26547-3, 12 p.Conference Paper

Discovering last-matching rules in popular open-source and commercial firewalls : Recent Advances in Network Security Attacks and DefencesSALAH, K; SATTAR, K; BAIG, Z. A et al.International journal of Internet protocol technology (Print). 2009, Vol 5, Num 1-2, pp 23-31, issn 1743-8209, 9 p.Article

Mise en œuvre d'un proxy : Installation = Proxy implementation : InstallationLEVIER, Laurent.Techniques de l'ingénieur. Télécoms. 2008, Vol TEA3, Num TE7706, issn 1632-3823, TE7706.1-TE7706.8, docTE7706.1 [9 p.]Article

A tool for firewall administrationCLABAUT, Mathieu.Lecture notes in computer science. 2006, pp 255-256, issn 0302-9743, isbn 978-3-540-68760-3, 1Vol, 2 p.Conference Paper

Attaques des systèmes: Prendre le contrôle du bastion = Attacks on systems : Taking control of the bastionLEVIER, Laurent.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2006, Vol SI2, Num H5833, issn 1953-4663, H5833.1-H5833.14Article

An in-band easy-to-deploy mechanism for network-to-transport signalingSHARMA, Mayank; KATABI, Dina; RONG PAN et al.IEEE Global Telecommunications Conference. 2004, pp 1278-1283, isbn 0-7803-8794-5, 6 p.Conference Paper

Discovery of policy anomalies in distributed firewallsAL-SHAER, Ehab S; HAMED, Hazem H.IEEE INFOCOM. 2004, pp 2605-2616, isbn 0-7803-8355-9, 12 p.Conference Paper

Analysis of Policy Anomalies on Distributed Network Security SetupsALFARO, J. G; CUPPENS, F; CUPPENS-BOULAHIA, N et al.Lecture notes in computer science. 2006, pp 496-511, issn 0302-9743, isbn 3-540-44601-X, 1Vol, 16 p.Conference Paper

Towards Filtering and Alerting Rule Rewriting on Single-Component PoliciesGARCIA-ALFARO, Joaquin; CUPPENS, Frédéric; CUPPENS-BOULAHIA, Nora et al.Lecture notes in computer science. 2006, pp 182-194, issn 0302-9743, isbn 3-540-45762-3, 1Vol, 13 p.Conference Paper

The design of firewall based on intel IXP2350 and autopartitioning mode CZHANG KE; LIU NAIQI; CHEN YAN et al.Lecture notes in computer science. 2005, pp 726-731, issn 0302-9743, isbn 3-540-30881-4, 1Vol, 6 p.Conference Paper

Firmato: A novel firewall management toolkitBARTAL, Yair; MAYER, Alain; NISSIM, Kobbi et al.ACM transactions on computer systems. 2004, Vol 22, Num 4, pp 381-420, issn 0734-2071, 40 p.Article

  • Page / 10