Works matching DE "FIREWALLS (Computer security)"
Results: 300
Using mobile agents to encapsulate manufacturing resources over the Internet.
- Published in:
- International Journal of Advanced Manufacturing Technology, 2005, v. 25, n. 1/2, p. 189, doi. 10.1007/s00170-003-1813-9
- By:
- Publication type:
- Article
An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 4, p. 1475, doi. 10.1007/s11277-019-06155-x
- By:
- Publication type:
- Article
The Analysis of Firewall Policy Through Machine Learning and Data Mining.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 2, p. 2891, doi. 10.1007/s11277-017-4330-0
- By:
- Publication type:
- Article
Implementing SQL Injection Vulnerability Assessment of an E-commerce Web Application using Vega and Nikto Tools.
- Published in:
- African Journal of Computing & ICT, 2021, v. 14, n. 1, p. 1
- By:
- Publication type:
- Article
A Comparative Performance Analysis of Machine Learning Models for Intrusion Detection Classification.
- Published in:
- Journal of Cybersecurity (2579-0072), 2024, v. 6, p. 1, doi. 10.32604/jcs.2023.046915
- By:
- Publication type:
- Article
Discussion on Application of Virtual Firewall Technology to Network Security in Railway Communication Network Management.
- Published in:
- Railway Signalling & Communication Engineering, 2023, v. 20, n. 12, p. 61, doi. 10.3969/j.issn.1673-4440.2023.12.011
- By:
- Publication type:
- Article
An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets.
- Published in:
- Computers (2073-431X), 2023, v. 12, n. 10, p. 202, doi. 10.3390/computers12100202
- By:
- Publication type:
- Article
Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks †.
- Published in:
- Computers (2073-431X), 2019, v. 8, n. 4, p. 88, doi. 10.3390/computers8040088
- By:
- Publication type:
- Article
SM9 Key Encapsulation Mechanism for Power Monitoring Systems.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 1, p. 1269, doi. 10.14569/ijacsa.2025.01601121
- By:
- Publication type:
- Article
Secret Sharing as a Defense Mechanism for Ransomware in Cloud Storage Systems.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 10, p. 1008, doi. 10.14569/ijacsa.2024.01510102
- By:
- Publication type:
- Article
Mitigating Security Risks in Firewalls and Web Applications using Vulnerability Assessment and Penetration Testing (VAPT).
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 5, p. 1348, doi. 10.14569/ijacsa.2024.01505136
- By:
- Publication type:
- Article
Network Intrusion Detection in Cloud Environments: A Comparative Analysis of Approaches.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 1, doi. 10.14569/ijacsa.2024.0150301
- By:
- Publication type:
- Article
Analysis of ICS and SCADA Systems Attacks Using Honeypots.
- Published in:
- Future Internet, 2023, v. 15, n. 7, p. 241, doi. 10.3390/fi15070241
- By:
- Publication type:
- Article
Misconfiguration in Firewalls and Network Access Controls: Literature Review.
- Published in:
- Future Internet, 2021, v. 13, n. 11, p. 283, doi. 10.3390/fi13110283
- By:
- Publication type:
- Article
CYBER THREAT ASSESSMENT REPORT IN SELECTED ENVIRONMENT CONDUCTED BY CHOOSEN TECHNOLOGY OF FIREWALLS.
- Published in:
- Science & Military Journal, 2017, v. 12, n. 2, p. 37
- By:
- Publication type:
- Article
MEDICAL DATA RISK EXPOSURE.
- Published in:
- Journal of Applied Electromagnetism, 2009, v. 11, n. 2, p. 26
- By:
- Publication type:
- Article
Approach to Anomaly Traffic Detection in a Local Network.
- Published in:
- Journal of Donghua University (English Edition), 2009, v. 26, n. 6, p. 656
- By:
- Publication type:
- Article
A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic.
- Published in:
- Journal of Information System Security, 2011, v. 7, n. 3, p. 2
- By:
- Publication type:
- Article
Guest Editorial.
- Published in:
- Journal of Information System Security, 2011, v. 7, n. 3, p. 1
- Publication type:
- Article
Editorial.
- Published in:
- Journal of Information System Security, 2009, v. 5, n. 2, p. 1
- By:
- Publication type:
- Article
Addressing Internal Security Threats with Roaming User-Based Distributed Firewalls.
- Published in:
- Journal of Information System Security, 2009, v. 5, n. 2, p. 26
- By:
- Publication type:
- Article
Worm Attack Detection in Network-Based System.
- Published in:
- IUP Journal of Information Technology, 2013, v. 9, n. 3, p. 31
- By:
- Publication type:
- Article
TOWARDS AN ONTOLOGY MAPPING APPROACH FOR SECURITY MANAGEMENT.
- Published in:
- International Journal on Artificial Intelligence Tools, 2006, v. 15, n. 6, p. 1071, doi. 10.1142/S0218213006003120
- By:
- Publication type:
- Article
A Delay-Based Countermeasure Against the Discovery of Default Rules in Firewalls.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2017, v. 42, n. 2, p. 833, doi. 10.1007/s13369-016-2359-0
- By:
- Publication type:
- Article
Marketing Credibility: Chinese newspapers' responses to revenue losses from falling circulation and advertising decline.
- Published in:
- Journalism Studies, 2019, v. 20, n. 9, p. 1301, doi. 10.1080/1461670X.2018.1513815
- By:
- Publication type:
- Article
A Simple Client-Server System Using a Personal Computer as the Server.
- Published in:
- Journal of Medical Systems, 2000, v. 24, n. 1, p. 39, doi. 10.1023/A:1005485129145
- By:
- Publication type:
- Article
Internet cops warn surfers in China off unapproved sites.
- Published in:
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2007, v. 42, n. 10, p. 33
- Publication type:
- Article
The Great Firewall of China barks more than bites.
- Published in:
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2007, v. 42, n. 10, p. 33
- Publication type:
- Article
Hackers Are Not Just Smokers Anymore.
- Published in:
- Oklahoma Dental Association Journal, 2011, v. 102, n. 7, p. 26
- By:
- Publication type:
- Article
The infernal business of contract cheating: understanding the business processes and models of academic custom writing sites.
- Published in:
- International Journal for Educational Integrity, 2018, v. 14, n. 1, p. 1, doi. 10.1007/s40979-017-0024-3
- By:
- Publication type:
- Article
A web services choreography scenario for interoperating bioinformatics applications.
- Published in:
- BMC Bioinformatics, 2004, v. 5, p. 25, doi. 10.1186/1471-2105-5-25
- By:
- Publication type:
- Article
An Efficient Stabbing Based Intrusion Detection Framework for Sensor Networks.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 43, n. 1, p. 141, doi. 10.32604/csse.2022.021851
- By:
- Publication type:
- Article
An extensive empirical evaluation of classifier ensembles for intrusion detection task.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 149
- By:
- Publication type:
- Article
A formal logic approach to firewall packet filtering analysis and generation.
- Published in:
- Artificial Intelligence Review, 2008, v. 29, n. 3/4, p. 223, doi. 10.1007/s10462-009-9147-0
- By:
- Publication type:
- Article
Old Monarchy in the New Cyberspace: Empirical Examination of Information Security Awareness among Austrian and Hungarian Enterprises.
- Published in:
- AARMS: Academic & Applied Research in Military & Public Management Science, 2015, p. 63, doi. 10.32565/aarms.2015.1.6
- By:
- Publication type:
- Article
Beginning at the Endpoint.
- Published in:
- Internal Auditor, 2010, v. 67, n. 3, p. 25
- By:
- Publication type:
- Article
A Model for Transaction Authentication In Internet Banking.
- Published in:
- Egyptian Computer Science Journal, 2015, v. 39, n. 4, p. 43
- By:
- Publication type:
- Article
Hybrid Spread-Spectrum TCP for Combating Fraudulent Cyber Activities against Reconnaissance Attacks.
- Published in:
- African Journal of Information Systems, 2013, v. 5, n. 2, p. 36
- By:
- Publication type:
- Article
H-LCFST: a hash lowest cost first search tree for flexible packet classification.
- Published in:
- International Journal of Network Management, 2016, v. 26, n. 4, p. 286, doi. 10.1002/nem.1938
- By:
- Publication type:
- Article
Cost-based placement of vDPI functions in NFV infrastructures.
- Published in:
- International Journal of Network Management, 2015, v. 25, n. 6, p. 490, doi. 10.1002/nem.1920
- By:
- Publication type:
- Article
Divided two-part adaptive intrusion detection system.
- Published in:
- Wireless Networks (10220038), 2013, v. 19, n. 3, p. 301, doi. 10.1007/s11276-012-0467-7
- By:
- Publication type:
- Article
Data Analysis of Network Parameters for Secure Implementations of SDN-Based Firewall.
- Published in:
- Computers, Materials & Continua, 2023, v. 77, n. 2, p. 1575, doi. 10.32604/cmc.2023.042432
- By:
- Publication type:
- Article
Investigating Brute Force Attack Patterns in IoT Network.
- Published in:
- Journal of Electrical & Computer Engineering, 2019, p. 1, doi. 10.1155/2019/4568368
- By:
- Publication type:
- Article
Basic computer security strategies and models.
- Published in:
- Health Information on the Internet, 2008, n. 63, p. 3, doi. 10.1258/rsmhii.63.1.3
- By:
- Publication type:
- Article
Firewalls: Basic Principles and Some Implications.
- Published in:
- Journal of Electronic Resources in Medical Libraries, 2009, v. 6, n. 3, p. 260, doi. 10.1080/15424060903167377
- By:
- Publication type:
- Article
Protecting Your Home Broadband Computer.
- Published in:
- Journal of Electronic Resources in Medical Libraries, 2006, v. 3, n. 4, p. 89, doi. 10.1300/J383v03n04_08
- By:
- Publication type:
- Article
SWIM: A Switch Manager for Datacenter Networks.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 4, p. 30, doi. 10.1109/MIC.2014.41
- By:
- Publication type:
- Article
Re-architecting your security strategy for the connected economy.
- Published in:
- ComputerWorld Hong Kong, 2018, p. 11
- Publication type:
- Article
Fortinet extends UTM reach across network borders.
- Published in:
- ComputerWorld Hong Kong, 2016, p. 40
- By:
- Publication type:
- Article
Keeping the firewall crown.
- Published in:
- ComputerWorld Hong Kong, 2016, p. 37
- By:
- Publication type:
- Article