Works matching Firewall
1
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2014, v. 29, n. 4, p. 707, doi. 10.17341/gummfd.18495
- ERDEM, O. Ayhan;
- KOCAOĞLU, Ramazan
- Article
2
- International Journal of Information Security Science, 2013, v. 2, n. 4, p. 119
- Article
3
- International Journal of Software Engineering & Knowledge Engineering, 2007, v. 17, n. 3, p. 359, doi. 10.1142/S0218194007003306
- SKOGLUND, MATS;
- RUNESON, PER
- Article
4
- Wireless Personal Communications, 2017, v. 96, n. 2, p. 2891, doi. 10.1007/s11277-017-4330-0
- Article
5
- International Journal of Intelligent Engineering & Systems, 2017, v. 10, n. 3, p. 299, doi. 10.22266/ijies2017.0630.34
- Muthukumaran, Nithya;
- Chinnappan, Jayakumar
- Article
6
- Future Internet, 2021, v. 13, n. 11, p. 283, doi. 10.3390/fi13110283
- Alicea, Michael;
- Alsmadi, Izzat
- Article
7
- International Journal of Information Security & Cybercrime, 2018, v. 7, n. 1, p. 37, doi. 10.19107/ijisc.2018.01.04
- Article
8
- Cogent Engineering, 2018, v. 5, n. 1, p. 1, doi. 10.1080/23311916.2018.1471974
- Yeasmin, Mahbuba;
- Akter, Nahida;
- Kabir, Mohammed Humayun;
- Hossain, Javed
- Article
9
- International Journal of Network Management, 2025, v. 35, n. 1, p. 1, doi. 10.1002/nem.2307
- Bringhenti, Daniele;
- Pizzato, Francesco;
- Sisto, Riccardo;
- Valenza, Fulvio
- Article
10
- International Journal of Technological Sciences / Uluslararasi Teknolojik Bilimler Dergisi, 2019, v. 11, n. 2, p. 118
- FAISAL, Mohammed Ridha;
- GÖKSU, Tuna
- Article
11
- Computers (2073-431X), 2023, v. 12, n. 10, p. 202, doi. 10.3390/computers12100202
- Madhloom, Jamal Khudair;
- Noori, Zainab Hammoodi;
- Ebis, Sif K.;
- Hassen, Oday A.;
- Darwish, Saad M.
- Article
12
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1979
- Sharma, Richa;
- Parekh, Chandresh
- Article
13
- Journal of Information System Security, 2011, v. 7, n. 3, p. 2
- Week, John;
- Ivanova, Polina;
- Week, Sandy;
- McLeod, Alexander
- Article
14
- Journal of Information System Security, 2009, v. 5, n. 2, p. 26
- Luse, Andy;
- Scheibe, Kevin P.;
- Townsend, Anthony M.
- Article
15
- Revista Ciência e Natura, 2016, v. 38, n. 2, p. 821, doi. 10.5902/2179460x21530
- Bateni, Shirin;
- Khavasi, Ali Asghar
- Article
16
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 5, p. 1348, doi. 10.14569/ijacsa.2024.01505136
- Alquwayzani, Alanoud;
- Aldossri, Rawabi;
- Frikha, Mounir
- Article
17
- Computers, Materials & Continua, 2023, v. 77, n. 2, p. 1575, doi. 10.32604/cmc.2023.042432
- Iqbal, Rizwan;
- Hussain, Rashid;
- Arif, Sheeraz;
- Ansari, Nadia Mustaqim;
- Shaikh, Tayyab Ahmed
- Article
18
- Journal of Information Assurance & Security, 2019, v. 14, n. 2, p. 30
- Article
19
- Journal of Information Assurance & Security, 2015, v. 10, n. 4, p. 164
- MAKIOU, Abdelhamid;
- SERHROUCHNI, Ahmed;
- BEGRICHE, Youcef
- Article
20
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 3, p. 318, doi. 10.1109/TDSC.2012.20
- Hu, Hongxin;
- Ahn, Gail-Joon;
- Kulkarni, Ketan
- Article
21
- Journal of Cyber Security Technology, 2018, v. 2, n. 1, p. 14, doi. 10.1080/23742917.2018.1476956
- Article
22
- Mathematics (2227-7390), 2023, v. 11, n. 15, p. 3333, doi. 10.3390/math11153333
- Zhao, You;
- Fan, Ye;
- Bian, Xuefen
- Article
23
- Software Testing: Verification & Reliability, 2015, v. 25, n. 1, p. 34, doi. 10.1002/stvr.1544
- Brucker, Achim D.;
- Brügger, Lukas;
- Wolff, Burkhart
- Article
24
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2017, v. 42, n. 2, p. 833, doi. 10.1007/s13369-016-2359-0
- Sattar, K.;
- Salah, K.;
- Sqalli, M.;
- Rafiq, R.;
- Rizwan, M.
- Article
25
- Multimedia Tools & Applications, 2014, v. 71, n. 2, p. 627, doi. 10.1007/s11042-013-1673-8
- Kim, Ui-Hyong;
- Kang, Jung-Min;
- Lee, Jae-Sung;
- Kim, Hyong-Shik;
- Jung, Soon-Young
- Article
26
- Journal of Supercomputing, 2023, v. 79, n. 17, p. 19473, doi. 10.1007/s11227-023-05417-7
- Andalib, Azam;
- Babamir, Seyed Morteza
- Article
27
- Journal of Supercomputing, 2018, v. 74, n. 7, p. 3329, doi. 10.1007/s11227-018-2387-5
- Dezhabad, Naghmeh;
- Sharifian, Saeed
- Article
28
- Electronics (2079-9292), 2022, v. 11, n. 19, p. 3000, doi. 10.3390/electronics11193000
- P., Senthil;
- Kavin, Balasubramanian Prabhu;
- Srividhya, S. R.;
- V., Ramachandran;
- C., Kavitha;
- Lai, Wen-Cheng
- Article
29
- Advances in Electrical & Computer Engineering, 2023, v. 23, n. 3, p. 29, doi. 10.4316/AECE.2023.03004
- TUDOSI, Andrei-Daniel;
- GRAUR, Adrian;
- BALAN, Doru Gabriel;
- POTORAC, Alin Dan;
- TARABUTA, Radu-Cezar
- Article
30
- Computing & Informatics, 2013, v. 32, n. 6, p. 1312
- VALENTíN, Kristián;
- MALY, Michal
- Article
31
- Sensors (14248220), 2024, v. 24, n. 8, p. 2636, doi. 10.3390/s24082636
- Komadina, Adrian;
- Kovačević, Ivan;
- Štengl, Bruno;
- Groš, Stjepan
- Article
32
- Quantum Information Processing, 2015, v. 14, n. 7, p. 2617, doi. 10.1007/s11128-015-1002-4
- Amellal, H.;
- Meslouhi, A.;
- Hassouni, Y.;
- El Baz, M.
- Article
33
- Journal of Fuzzy Extension & Applications (JFEA), 2022, v. 3, n. 3, p. 192, doi. 10.22105/jfea.2021.313606.1167
- Cubukcu, Ceren;
- Cantekin, Cem
- Article
34
- Journal of Electronic Resources in Medical Libraries, 2009, v. 6, n. 3, p. 260, doi. 10.1080/15424060903167377
- Article
35
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 83, doi. 10.1080/19393555.2016.1172283
- Article
36
- Railway Signalling & Communication Engineering, 2023, v. 20, n. 12, p. 61, doi. 10.3969/j.issn.1673-4440.2023.12.011
- Article
37
- Journal of Internet Services & Applications, 2018, v. 9, n. 1, p. 1, doi. 10.1186/s13174-018-0083-6
- da Costa Júnior, Edmilson P.;
- da Silva, Carlos Eduardo;
- Pinheiro, Marcos;
- Sampaio, Silvio
- Article
38
- International Journal of Information Security, 2016, v. 15, n. 3, p. 301, doi. 10.1007/s10207-015-0290-0
- Abbes, Tarek;
- Bouhoula, Adel;
- Rusinowitch, Michaël
- Article
39
- International Journal of Information Security, 2016, v. 15, n. 3, p. 235, doi. 10.1007/s10207-015-0292-y
- Kurek, Tytus;
- Niemiec, Marcin;
- Lason, Artur
- Article
40
- International Review on Computers & Software, 2013, v. 8, n. 3, p. 680
- M., Janani;
- V., Subramaniyaswamy;
- B., Lakshmi R.
- Article
41
- Information Systems Research, 2009, v. 20, n. 2, p. 198, doi. 10.1287/isre.1080.0180
- Cavusoglu, Huseyin;
- Raghunathan, Srinivasan;
- Cavusoglu, Hasan
- Article
42
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 5, p. 1491, doi. 10.3969/j.issn.1001-3695.2014.05.050
- Article
43
- Applied Sciences (2076-3417), 2024, v. 14, n. 16, p. 7426, doi. 10.3390/app14167426
- Korkmaz, Adem;
- Bulut, Selma;
- Talan, Tarık;
- Kosunalp, Selahattin;
- Iliev, Teodor
- Article
44
- Applied Sciences (2076-3417), 2024, v. 14, n. 11, p. 4373, doi. 10.3390/app14114373
- Lee, Jae-Kook;
- Hong, Taeyoung;
- Lee, Gukhua
- Article
45
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 560, doi. 10.1093/jigpal/jzs033
- Nguyen, Hai Thanh;
- Torrano-Gimenez, Carmen;
- Alvarez, Gonzalo;
- Franke, Katrin;
- Petrović, Slobodan
- Article
46
- International Journal of Design, Analysis & Tools for Integrated Circuits & Systems, 2021, v. 10, n. 1, p. 70
- Custance, Rory;
- Gabriela;
- Mogos
- Article
47
- Issues in Informing Science & Information Technology, 2007, v. 4, p. 739, doi. 10.28945/984
- Al-Rawi, Akram;
- Lansari, Azzedine
- Article
48
- Journal of Hospital Librarianship, 2001, v. 1, n. 4, p. 1, doi. 10.1300/J186v01n04_01
- Article
49
- Journal of Hospital Librarianship, 2001, v. 1, n. 1, p. 41, doi. 10.1300/J186v01n01_04
- Article
50
- Computing & Informatics, 2013, v. 32, n. 6, p. 1192
- Eun-Ae CHO;
- Chang-Joo MOON;
- Dae-Ha PARK;
- Kang-Bin YIM
- Article