Academic literature on the topic 'Firewall Model'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Firewall Model.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Firewall Model"
Terentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko, and Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT." Management of Development of Complex Systems, no. 45 (March 1, 2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.
Full textKhummanee, Suchart, Phatthanaphong Chomphuwiset, and Potchara Pruksasri. "DSSF: Decision Support System to Detect and Solve Firewall Rule Anomalies based on a Probability Approach." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 1 (March 5, 2022): 56–73. http://dx.doi.org/10.37936/ecti-cit.2022161.246996.
Full textXuan, Shichang, Dapeng Man, Jiangchuan Zhang, Wu Yang, and Miao Yu. "Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/8130152.
Full textKailanya, Eunice, Mary Mwadulo, and Amos Omamo. "Dynamic deep stateful firewall packet analysis model." African Journal of Science, Technology and Social Sciences 1, no. 2 (December 23, 2022): 116–23. http://dx.doi.org/10.58506/ajstss.v1i2.20.
Full textFrantzen, Mike, Florian Kerschbaum, E. Eugene Schultz, and Sonia Fahmy. "A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals." Computers & Security 20, no. 3 (May 2001): 263–70. http://dx.doi.org/10.1016/s0167-4048(01)00314-5.
Full textYasir Saleem, Usama Anwar, Muhammad Khawar Bashir, Sheraz Naseer, and Nadia Tabassum. "Flow-Based Rules Generation for Intrusion Detection System using Machine Learning Approach." Lahore Garrison University Research Journal of Computer Science and Information Technology 4, no. 3 (September 30, 2020): 54–70. http://dx.doi.org/10.54692/lgurjcsit.2020.0403100.
Full textJasi, Teba Ali, and Muna M. Taher Jawhar. "Detecting network attacks Model based on a long short-term memory LSTM." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 8 (August 27, 2022): 64–72. http://dx.doi.org/10.47577/technium.v4i8.7225.
Full textNguyen Kim, Tuan, Tam Nguyen Tri, Lam Tran Nguyen, and Duy Thai Truong. "Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption)." International journal of Computer Networks & Communications 14, no. 1 (January 31, 2022): 59–69. http://dx.doi.org/10.5121/ijcnc.2022.14104.
Full textKaur, Gurvinder, Dr S. N. Panda, and Dr Dalvinder Singh Dhaliwal. "Model-Based Tool-Assistance for Packet-Filter Design and its Future." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (April 16, 2014): 4053–57. http://dx.doi.org/10.24297/ijct.v13i1.2929.
Full textPozo, S., R. Ceballos, and R. M. Gasca. "Model-Based Development of firewall rule sets: Diagnosing model inconsistencies." Information and Software Technology 51, no. 5 (May 2009): 894–915. http://dx.doi.org/10.1016/j.infsof.2008.05.001.
Full textDissertations / Theses on the topic "Firewall Model"
Robinson, Brian P. "A FIREWALL MODEL FOR TESTING USER-CONFIGURABLE SOFTWARE SYSTEMS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=case1206466905.
Full textAhmad, Salem Mohammed Ali Mohammed. "DoSTDM: A denial of service detection model using firewall data traffic pattern matching." Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1683.
Full textJanuš, Filip. "Pokročilá evaluace úrovně privátnosti v sociálních sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417203.
Full textNelson, Timothy. "Margrave: An Improved Analyzer for Access-Control and Configuration Policies." Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-theses/203.
Full textNelson, Tim. "First-Order Models for Configuration Analysis." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-dissertations/452.
Full textKonstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Full textIn today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.
However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security
within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.
By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies.
An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.
Uznanski, Przemyslaw. "Large scale platform : Instantiable models and algorithmic design of communication schemes." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2013. http://tel.archives-ouvertes.fr/tel-00878837.
Full textHsu, Chia-Jung, and 許家榮. "A knowledge-intensive model for inspecting the conflicts of firewall rules." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/45965352949013417563.
Full text中原大學
資訊管理研究所
101
Abstract In this paper, proposed to use Ontology and the semantic language tool for querying the conflicts and reasoning the anomalies among firewall rules, besides the knowledge modeling of firewall policy rules. Internet firewall has been recognized as one of the most effective way to deploy computer network security. Through controlling of network resources and traffic in using the network security policy, the firewall provides a different level of trust between the network demarcation points. In practice firewall configuration, usually to perform thousands of access control rules across multiple networks, this complexity may increase the possibility of configuration errors. However, if the network administrator does not have sufficient skills and expertise to configure them correctly, could lead to unauthorized access with threats to network resources or blocking the authorized access to network resources. Therefore, the correct and consistent rules for the firewall are essential. This proposed method, assists the network administrators to verify the accuracy and consistency at the design of new firewall rules and properly integrate those new rules into the existing rules prior to production deployment, to achieve the requirement of a high security firewall.
Tung, Chung-Hua, and 董重華. "A study on CNS15408-based Security Evaluation Model for Information Equipment - The Case of Firewall." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/52641628592720510632.
Full text中國文化大學
資訊管理學系
100
Nowadays, there are a lot of IT system and equipment products in the world. Each of their developer or vendor declare that their own prod-uct is the highest safety or most complete. But for the general users, they can’t accept those products just by the vendor's rhetoric. They need some fair, independent and trusted standard to assist the judgement. And the Common Criteria for Information Technology Security Evaluation is a quite worthy of the evaluation criteria of the reference of IT products security.
Felix, Reyes Alejandro. "Test case generation using symbolic grammars and quasirandom sequences." Master's thesis, 2010. http://hdl.handle.net/10048/1668.
Full textSoftware Engineering and Intelligent Systems
Books on the topic "Firewall Model"
Brisighella, Dario. From the firewall forward. Colorado Springs, Colo., U.S.A: Vip Aero Publishers, 1986.
Find full textForouzan, Behrouz A. Data Communications Networking (McGraw-Hill Forouzan Networking). 4th ed. McGraw-Hill Science/Engineering/Math, 2006.
Find full textData Communications Networking (McGraw-Hill Forouzan Networking). McGraw-Hill Science/Engineering/Math, 2006.
Find full textData Communications and Networking (McGraw-Hill Forouzan Networking). McGraw-Hill Higher Education, 2007.
Find full textBook chapters on the topic "Firewall Model"
Brucker, Achim D., Lukas Brügger, and Burkhart Wolff. "Model-Based Firewall Conformance Testing." In Testing of Software and Communicating Systems, 103–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-68524-1_9.
Full textBotvinko, Anatoly, and Konstantin Samouylov. "Firewall Simulation Model with Filtering Rules Ranking." In Communications in Computer and Information Science, 533–45. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66242-4_42.
Full textWang, Weiping, Wenhui Chen, Zhepeng Li, and Huaping Chen. "Comparison Model and Algorithm for Distributed Firewall Policy." In Lecture Notes in Computer Science, 545–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-37275-2_67.
Full textAkram, Raja Naeem, Konstantinos Markantonakis, and Keith Mayes. "Firewall Mechanism in a User Centric Smart Card Ownership Model." In Lecture Notes in Computer Science, 118–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12510-2_9.
Full textHachana, Safaà, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, and Stephane Morucci. "Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management." In Information Systems Security, 133–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8_10.
Full textCubukcu, Ceren, and Cem Cantekin. "Using a Fuzzy-AHP Decision Model for Selecting the Best Firewall Alternative." In Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation, 426–33. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85626-7_50.
Full textChoudhury, Madhab Paul, and J. Paul Choudhury. "Machine Learning Based Model to Find Out Firewall Decisions Towards Improving Cyber Defence." In Lecture Notes in Networks and Systems, 179–95. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-9719-8_15.
Full textYuan, Hui, Lei Zheng, Liang Dong, Xiangli Peng, Yan Zhuang, and Guoru Deng. "Research and Implementation of WEB Application Firewall Based on Feature Matching." In Application of Intelligent Systems in Multi-modal Information Analytics, 1223–31. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15740-1_154.
Full textPiprani, Baba. "Using ORM-Based Models as a Foundation for a Data Quality Firewall in an Advanced Generation Data Warehouse." In On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 1148–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11915072_18.
Full textPiprani, Baba. "Using ORM-Based Models as a Foundation for a Data Quality Firewall in an Advanced Generation Data Warehouse (Extended Version)." In Journal on Data Semantics XI, 94–125. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-92148-6_4.
Full textConference papers on the topic "Firewall Model"
Liyanage, Geethapriya, and Shantha Fernando. "Firewall model for cloud computing." In 2013 IEEE 8th International Conference on Industrial and Information Systems (ICIIS). IEEE, 2013. http://dx.doi.org/10.1109/iciinfs.2013.6731960.
Full textJeffrey, Alan, and Taghrid Samak. "Model Checking Firewall Policy Configurations." In 2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2009. http://dx.doi.org/10.1109/policy.2009.32.
Full textBasumatary, Nayan, and Shyamanta M. Hazarika. "Model checking a firewall for anomalies." In 2013 1st International Conference on Emerging Trends and Applications in Computer Science (ICETACS). IEEE, 2013. http://dx.doi.org/10.1109/icetacs.2013.6691402.
Full textPereira, Fabio Dacencio, and Edward David Moreno Ordonez. "SSDR - Reconfigurable Firewall: Reconfiguration Model Impact." In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.51.
Full textPereira, Fabio Dacencio, and Edward David Moreno Ordonez. "SSDR - Reconfigurable Firewall: Reconfiguration Model Performance." In 2008 4th Southern Conference on Programmable Logic (SPL). IEEE, 2008. http://dx.doi.org/10.1109/spl.2008.4547770.
Full textWang, Weiping, Heran Chen, Jiayao Chen, and Bowen Liu. "Firewall Rule Ordering Based on Statistical Model." In 2009 International Conference on Computer Engineering and Technology (ICCET). IEEE, 2009. http://dx.doi.org/10.1109/iccet.2009.62.
Full textInSeon Yoo. "Adaptive firewall model to detect email viruses." In Proceedings. IEEE 38th Annual 2004 International Carnahan Conference on Security Technology. IEEE, 2004. http://dx.doi.org/10.1109/ccst.2004.1405392.
Full textHorowitz, Eduardo, and Luis C. Lamb. "A Hierarchical Model for Firewall Policy Extraction." In 2009 International Conference on Advanced Information Networking and Applications. IEEE, 2009. http://dx.doi.org/10.1109/aina.2009.116.
Full textWang, Weiping, Rong Ji, Wenhui Chen, Bo Chen, and Zhepeng Li. "Firewall Rules Sorting Based on Markov Model." In The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007). IEEE, 2007. http://dx.doi.org/10.1109/isdpe.2007.40.
Full textGheorghica, Daniel, and Victor Croitoru. "Secure and flexible model for firewall policy management." In 2010 9th International Symposium on Electronics and Telecommunications (ISETC 2010). IEEE, 2010. http://dx.doi.org/10.1109/isetc.2010.5679366.
Full text