Works matching Firewalls (Computer security)
Results: 305
Security tech: fixed and mobile.
- Published in:
- ComputerWorld Hong Kong, 2009, v. 26, n. 10, p. 47
- By:
- Publication type:
- Article
YOUR MONEY OR YOUR DATA.
- Published in:
- Journal of the Missouri Bar, 2019, v. 75, n. 2, p. 82
- By:
- Publication type:
- Article
Many‐field packet classification with decomposition and reinforcement learning.
- Published in:
- IET Networks (Wiley-Blackwell), 2022, v. 11, n. 3, p. 112, doi. 10.1049/ntw2.12038
- By:
- Publication type:
- Article
The Quest for Visibility and Control in the Cloud.
- Published in:
- ISSA Journal, 2019, v. 17, n. 3, p. 17
- By:
- Publication type:
- Article
Evolving Security for Digital Transformation.
- Published in:
- ISSA Journal, 2018, v. 16, n. 4, p. 29
- By:
- Publication type:
- Article
Stopping the New Wave of DDoS Attacks.
- Published in:
- ISSA Journal, 2017, v. 15, n. 3, p. 8
- By:
- Publication type:
- Article
Secure Network Design: Micro Segmentation.
- Published in:
- ISSA Journal, 2016, v. 14, n. 12, p. 22
- By:
- Publication type:
- Article
The Security Architect and the Security Engineer.
- Published in:
- ISSA Journal, 2016, v. 14, n. 12, p. 7
- By:
- Publication type:
- Article
Evolving Ransomware.
- Published in:
- ISSA Journal, 2016, v. 14, n. 4, p. 39
- By:
- Publication type:
- Article
Retail E-Commerce Security Status Among Fortune 500 Corporations.
- Published in:
- Journal of Education for Business, 2012, v. 87, n. 3, p. 136, doi. 10.1080/08832323.2011.582191
- By:
- Publication type:
- Article
Optimal Control Strategy for SLBRS with Two Control Inputs.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 19, p. 4036, doi. 10.3390/math11194036
- By:
- Publication type:
- Article
OO-MA-KP-ABE-CRF: Online/Offline Multi-Authority Key-Policy Attribute-Based Encryption with Cryptographic Reverse Firewall for Physical Ability Data.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 15, p. 3333, doi. 10.3390/math11153333
- By:
- Publication type:
- Article
Software-based Internet Traffic Classification and Prioritization to Improve Network Performance in Multimedia Broadband Networks.
- Published in:
- Technical Journal of University of Engineering & Technology Taxila, 2015, v. 20, n. 4, p. 95
- By:
- Publication type:
- Article
TOMMANO—Virtualised Network Functions Management in Cloud Environment based on the TOSCA Standard.
- Published in:
- Doklady Mathematics, 2024, v. 109, n. 1, p. 84, doi. 10.1134/S1064562424701850
- By:
- Publication type:
- Article
Pockets of HIV Non-infection Within Highly-Infected Risk Networks in Athens, Greece.
- Published in:
- Frontiers in Microbiology, 2018, p. N.PAG, doi. 10.3389/fmicb.2018.01825
- By:
- Publication type:
- Article
Security Architecture for the Distributed Environments.
- Published in:
- Information Sciences & Technologies: Bulletin of the ACM Slovakia, 2018, v. 10, n. 1, p. 30
- By:
- Publication type:
- Article
Library Network Security Measures As Determinants of Archives Preservation in Public Libraries in Rivers State, Nigeria.
- Published in:
- Asian Journal of Information Science & Technology (AJIST), 2023, v. 13, n. 1, p. 41, doi. 10.51983/ajist-2023.13.1.3487
- By:
- Publication type:
- Article
Implementation and performance evaluation of pass-through PPTP relay system with authentication at each gateway.
- Published in:
- Electrical Engineering in Japan, 2006, v. 154, n. 2, p. 40, doi. 10.1002/eej.20183
- By:
- Publication type:
- Article
AUDITING THE SECURITY OF INFORMATION SYSTEMS WITHIN AN ORGANIZATION.
- Published in:
- Annals of 'Constantin Brancusi' University of Targu-Jiu. Economy Series / Analele Universităţii 'Constantin Brâncuşi' din Târgu-Jiu Seria Economie, 2013, n. 1, p. 315
- By:
- Publication type:
- Article
Burning money with firewalls.
- Published in:
- South African Computer Journal, 2015, v. 56, p. 165, doi. 10.18489/sacj.v56i1.322
- By:
- Publication type:
- Article
Analysis of ICS and SCADA Systems Attacks Using Honeypots.
- Published in:
- Future Internet, 2023, v. 15, n. 7, p. 241, doi. 10.3390/fi15070241
- By:
- Publication type:
- Article
Misconfiguration in Firewalls and Network Access Controls: Literature Review.
- Published in:
- Future Internet, 2021, v. 13, n. 11, p. 283, doi. 10.3390/fi13110283
- By:
- Publication type:
- Article
MEDICAL DATA RISK EXPOSURE.
- Published in:
- Journal of Applied Electromagnetism, 2009, v. 11, n. 2, p. 26
- By:
- Publication type:
- Article
A Quantified Trust-Risk Assessment Approach for Enhancing Firewalls-Filtering Services.
- Published in:
- Journal of Information Assurance & Security, 2019, v. 14, n. 2, p. 30
- By:
- Publication type:
- Article
Toward a Novel Web Application Firewalls Architecture.
- Published in:
- Journal of Information Assurance & Security, 2015, v. 10, n. 4, p. 164
- By:
- Publication type:
- Article
SECURE DATA TRANSMISSION BASED ON MULTI-INPUT MULTI-OUTPUT DELAYED CHAOTIC SYSTEM.
- Published in:
- International Journal of Bifurcation & Chaos in Applied Sciences & Engineering, 2008, v. 18, n. 7, p. 2063, doi. 10.1142/S0218127408021567
- By:
- Publication type:
- Article
The Price Effects of Using Firewalls as an Antitrust Remedy.
- Published in:
- Review of Industrial Organization, 2011, v. 38, n. 2, p. 209, doi. 10.1007/s11151-011-9282-z
- By:
- Publication type:
- Article
Achieving Optimal Firewall Filtering Through Dynamic Rule Reordering.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 3, p. 680
- By:
- Publication type:
- Article
Increasing Global Demand for an Uncensored Internet--How the U.S. Can Help Defeat Online Censorship by Facilitating Private Action.
- Published in:
- Vanderbilt Journal of Transnational Law, 2008, v. 41, n. 1, p. 299
- By:
- Publication type:
- Article
Acceptable Surveillance-Orientated Security Technologies: Insights from the SurPRISE Project.
- Published in:
- Surveillance & Society, 2015, v. 13, n. 3/4, p. 437, doi. 10.24908/ss.v13i3/4.5400
- By:
- Publication type:
- Article
A web services choreography scenario for interoperating bioinformatics applications.
- Published in:
- BMC Bioinformatics, 2004, v. 5, p. 25, doi. 10.1186/1471-2105-5-25
- By:
- Publication type:
- Article
Pay-Per-Use Computing.
- Published in:
- Bio-IT World, 2007, v. 6, n. 5, p. 31
- By:
- Publication type:
- Article
Implementing SQL Injection Vulnerability Assessment of an E-commerce Web Application using Vega and Nikto Tools.
- Published in:
- African Journal of Computing & ICT, 2021, v. 14, n. 1, p. 1
- By:
- Publication type:
- Article
Detecting network attacks Model based on a long short-term memory (LSTM).
- Published in:
- Technium, 2022, v. 4, n. 8, p. 64, doi. 10.47577/technium.v4i8.7225
- By:
- Publication type:
- Article
Computer firewalls: security and privacy protection for Mac--review.
- Published in:
- Big Data & Information Analytics, 2021, v. 6, n. 1, p. 1, doi. 10.3934/bdia.2021001
- By:
- Publication type:
- Article
Structuring Job Related Information on the Intranet: An Experimental Comparison of Task vs. an Organization-based Approach.
- Published in:
- Journal of Technical Writing & Communication, 2007, v. 37, n. 2, p. 203, doi. 10.2190/382G-91T8-T06R-2L52
- By:
- Publication type:
- Article
Empirical Study of Adaptive Serious Games in Enhancing Learning Outcome.
- Published in:
- International Journal of Serious Games, 2022, v. 9, n. 2, p. 27, doi. 10.17083/ijsg.v9i2.486
- By:
- Publication type:
- Article
Real-World Cyberthreats.
- Published in:
- Financial Executive, 2013, v. 29, n. 6, p. 65
- By:
- Publication type:
- Article
Before Circling the Wagons, Know Your Needs.
- Published in:
- Financial Executive, 2005, v. 21, n. 10, p. 41
- By:
- Publication type:
- Article
Hybrid Spread-Spectrum TCP for Combating Fraudulent Cyber Activities against Reconnaissance Attacks.
- Published in:
- African Journal of Information Systems, 2013, v. 5, n. 2, p. 36
- By:
- Publication type:
- Article
Design Network Model for Information Security Management Standard depend on ISO 27001.
- Published in:
- GSTF Journal on Computing, 2018, v. 5, n. 4, p. 1, doi. 10.5176/2251-3043_5.3.379
- By:
- Publication type:
- Article
Some Further Theoretical Results about Computer Viruses.
- Published in:
- Computer Journal, 2004, v. 47, n. 6, p. 627, doi. 10.1093/comjnl/47.6.627
- By:
- Publication type:
- Article
Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments.
- Published in:
- Computer Journal, 1998, v. 41, n. 2, p. 125, doi. 10.1093/comjnl/41.2.125
- By:
- Publication type:
- Article
System Security Threats and Controls.
- Published in:
- CPA Journal, 2006, v. 76, n. 7, p. 58
- By:
- Publication type:
- Article
E-mail Security for Small Businesses.
- Published in:
- CPA Journal, 2006, v. 76, n. 7, p. 51
- By:
- Publication type:
- Article
Controlling Internet Use in the Workplace.
- Published in:
- CPA Journal, 2004, v. 74, n. 7, p. 16
- By:
- Publication type:
- Article
VERIFICATION OF DISTRIBUTED FIREWALLS CONFIGURATION VS. SECURITY POLICIES USING ALCQI(D).
- Published in:
- Applied Artificial Intelligence, 2009, v. 23, n. 10, p. 945, doi. 10.1080/08839510903208088
- By:
- Publication type:
- Article
e-Voting Security.
- Published in:
- Petroleum - Gas University of Ploiesti Bulletin, Mathematics - Informatics - Physics Series, 2008, v. 60, n. 2, p. 93
- By:
- Publication type:
- Article
Adaptation Architecture for Self-Healing Computer Systems.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2017, v. 27, n. 5, p. 791, doi. 10.1142/S0218194017500292
- By:
- Publication type:
- Article
UML-BASED MODELING AND ANALYSIS OF SECURITY THREATS.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2010, v. 20, n. 6, p. 875, doi. 10.1142/S0218194010004980
- By:
- Publication type:
- Article