Works matching Firewalls (Computer security)
1
- ComputerWorld Hong Kong, 2009, v. 26, n. 10, p. 47
- Article
2
- Journal of the Missouri Bar, 2019, v. 75, n. 2, p. 82
- Article
3
- Government Technology, 2024, v. 37, n. 7, p. 14
- EDINGER, JULIA;
- DAVIDSON, NIKKI;
- PATTISON-GORDON, JULE;
- WESTROPE, ANDREW;
- SILVER, ASHLEY;
- RUETER, THAD
- Article
5
- Bio-IT World, 2007, v. 6, n. 5, p. 31
- Article
6
- Cogent Engineering, 2018, v. 5, n. 1, p. 1, doi. 10.1080/23311916.2018.1471974
- Yeasmin, Mahbuba;
- Akter, Nahida;
- Kabir, Mohammed Humayun;
- Hossain, Javed
- Article
7
- International Journal of Distributed & Cloud Computing, 2016, v. 4, n. 1, p. 23
- Guster, Dennis C.;
- Schmidt, Mark B.;
- Paidi, Karthik
- Article
8
- Doklady Mathematics, 2024, v. 109, n. 1, p. 84, doi. 10.1134/S1064562424701850
- Stolyarov, R. K.;
- Shvetcova, V. V.;
- Borisenko, O. D.
- Article
9
- Journal of Chongqing University of Posts & Telecommunications (Natural Science Edition) / Chongqing Youdian Daxue Xuebao (Ziran Kexue Ban), 2022, v. 34, n. 6, p. 1032, doi. 10.3979/j.issn.1673-825X.202108240305
- Article
10
- Educational Measurement: Issues & Practice, 2002, v. 21, n. 2, p. 20
- Shermis, Mark D.;
- Averitt, Jason
- Article
11
- Asian Journal of Information Science & Technology (AJIST), 2023, v. 13, n. 1, p. 41, doi. 10.51983/ajist-2023.13.1.3487
- Article
12
- International Journal of Network Management, 2025, v. 35, n. 1, p. 1, doi. 10.1002/nem.2307
- Bringhenti, Daniele;
- Pizzato, Francesco;
- Sisto, Riccardo;
- Valenza, Fulvio
- Article
13
- International Journal of Network Management, 2016, v. 26, n. 4, p. 286, doi. 10.1002/nem.1938
- Huang, Xiaohong;
- Sun, Qiong;
- Ma, Maode;
- Ma, Yan
- Article
14
- International Journal of Network Management, 2015, v. 25, n. 6, p. 490, doi. 10.1002/nem.1920
- Bouet, Mathieu;
- Leguay, Jérémie;
- Combe, Théo;
- Conan, Vania
- Article
15
- East Asian Science, Technology & Society, 2018, v. 12, n. 4, p. 479, doi. 10.1215/18752160-7218957
- Graham, Connor;
- Kerr, Eric;
- Pang, Natalie;
- Fischer, MichaelM. J.
- Article
16
- LESIJ - Lex ET Scientia International Journal, 2010, v. 17, n. 2, p. 281
- Păun, Cristian Teodor;
- Simion, Emil
- Article
17
- PLoS ONE, 2018, v. 13, n. 12, p. 1, doi. 10.1371/journal.pone.0208857
- Article
18
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 1, p. 16, doi. 10.1007/s12083-012-0145-7
- Chen, Wei-Ming;
- Chiang, Hsin-Hung;
- Chang, Kai-Di;
- Chao, Han-Chieh;
- Chen, Jiann-Liang
- Article
19
- IEEE Internet Computing, 2014, v. 18, n. 4, p. 30, doi. 10.1109/MIC.2014.41
- Chen, Chao-Chih;
- Sun, Peng;
- Yuan, Lihua;
- Maltz, David A.;
- Chuah, Chen-Nee;
- Mohapatra, Prasant
- Article
20
- IEEE Internet Computing, 2010, v. 14, n. 4, p. 58, doi. 10.1109/MIC.2010.29
- Article
21
- IEEE Internet Computing, 2009, v. 13, n. 6, p. 31, doi. 10.1109/MIC.2009.128
- Ayuso, Pablo Neira;
- Gasca, Rafael M.;
- Lefèvre, Laurent
- Article
22
- IEEE Internet Computing, 2009, v. 13, n. 6, p. 37
- Article
23
- ComputerWorld Hong Kong, 2018, p. 11
- Article
24
- ComputerWorld Hong Kong, 2016, p. 40
- Article
25
- ComputerWorld Hong Kong, 2016, p. 37
- Article
26
- ComputerWorld Hong Kong, 2015, p. 22
- Article
27
- ComputerWorld Hong Kong, 2014, p. 42
- Article
29
- ComputerWorld Hong Kong, 2010, v. 27, n. 9, p. 43
- Article
30
- ComputerWorld Hong Kong, 2010, v. 26, n. 4, p. 18
- Article
31
- ComputerWorld Hong Kong, 2009, v. 26, n. 10, p. 8
- Article
32
- ComputerWorld Hong Kong, 2009, v. 26, n. 5, p. 58
- Article
33
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2007, v. 42, n. 10, p. 33
- Article
34
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2007, v. 42, n. 10, p. 33
- Article
35
- Journal of Financial Planning, 2002, v. 15, n. 5, p. 46
- Article
37
- Optical & Quantum Electronics, 2023, v. 55, n. 8, p. 1, doi. 10.1007/s11082-023-04915-5
- Liu, Yu;
- Li, Xin;
- Shi, Hao;
- Guo, Ke;
- Shi, Zicheng;
- Huang, Shanguo
- Article
38
- International Journal of Technological Sciences / Uluslararasi Teknolojik Bilimler Dergisi, 2019, v. 11, n. 2, p. 118
- FAISAL, Mohammed Ridha;
- GÖKSU, Tuna
- Article
39
- Journal of Library Administration, 2006, v. 45, n. 3-4, p. 511, doi. 10.1300/J111v45n03_12
- Article
40
- Journal of Social Issues, 2002, v. 58, n. 1, p. 143, doi. 10.1111/1540-4560.00253
- Article
41
- Information Services & Use, 2018, v. 38, n. 1/2, p. 33, doi. 10.3233/ISU-180009
- Joseph, Regina;
- Lawlor, Bonnie
- Article
42
- Computers (2073-431X), 2023, v. 12, n. 10, p. 202, doi. 10.3390/computers12100202
- Madhloom, Jamal Khudair;
- Noori, Zainab Hammoodi;
- Ebis, Sif K.;
- Hassen, Oday A.;
- Darwish, Saad M.
- Article
43
- Computers (2073-431X), 2019, v. 8, n. 4, p. 88, doi. 10.3390/computers8040088
- Lin, Hsiao-Chung;
- Wang, Ping;
- Lin, Wen-Hui
- Article
44
- International Journal of Serious Games, 2022, v. 9, n. 2, p. 27, doi. 10.17083/ijsg.v9i2.486
- Gaurav, Devottam;
- Kaushik, Yash;
- Supraja, Santhoshi;
- Yadav, Manav;
- Gupta, M. P.;
- Chaturvedi, Manmohan
- Article
45
- Journal of the Korea Institute of Information & Communication Engineering, 2023, v. 27, n. 6, p. 745, doi. 10.6109/jkiice.2023.27.6.745
- Article
46
- International Journal of Information Security Science, 2013, v. 2, n. 4, p. 119
- Article
47
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 1, p. 544, doi. 10.26483/ijarcs.v9i1.5373
- Tak, Varsha;
- Kachhwaha, Rajendra;
- Mahia, Ram Niwash
- Article
48
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1979
- Sharma, Richa;
- Parekh, Chandresh
- Article
49
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 3, p. 292
- Aggarwal, Vivek;
- Bhatia, Abhimanyu
- Article
50
- Journal of Konbin, 2015, v. 33, n. 1, p. 41, doi. 10.1515/jok-2015-0004
- Kabala, Piotr;
- Laskowski, Dariusz
- Article