Journal articles on the topic 'Firewall Model'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Firewall Model.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Terentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko, and Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT." Management of Development of Complex Systems, no. 45 (March 1, 2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.
Full textKhummanee, Suchart, Phatthanaphong Chomphuwiset, and Potchara Pruksasri. "DSSF: Decision Support System to Detect and Solve Firewall Rule Anomalies based on a Probability Approach." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 1 (March 5, 2022): 56–73. http://dx.doi.org/10.37936/ecti-cit.2022161.246996.
Full textXuan, Shichang, Dapeng Man, Jiangchuan Zhang, Wu Yang, and Miao Yu. "Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/8130152.
Full textKailanya, Eunice, Mary Mwadulo, and Amos Omamo. "Dynamic deep stateful firewall packet analysis model." African Journal of Science, Technology and Social Sciences 1, no. 2 (December 23, 2022): 116–23. http://dx.doi.org/10.58506/ajstss.v1i2.20.
Full textFrantzen, Mike, Florian Kerschbaum, E. Eugene Schultz, and Sonia Fahmy. "A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals." Computers & Security 20, no. 3 (May 2001): 263–70. http://dx.doi.org/10.1016/s0167-4048(01)00314-5.
Full textYasir Saleem, Usama Anwar, Muhammad Khawar Bashir, Sheraz Naseer, and Nadia Tabassum. "Flow-Based Rules Generation for Intrusion Detection System using Machine Learning Approach." Lahore Garrison University Research Journal of Computer Science and Information Technology 4, no. 3 (September 30, 2020): 54–70. http://dx.doi.org/10.54692/lgurjcsit.2020.0403100.
Full textJasi, Teba Ali, and Muna M. Taher Jawhar. "Detecting network attacks Model based on a long short-term memory LSTM." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 8 (August 27, 2022): 64–72. http://dx.doi.org/10.47577/technium.v4i8.7225.
Full textNguyen Kim, Tuan, Tam Nguyen Tri, Lam Tran Nguyen, and Duy Thai Truong. "Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption)." International journal of Computer Networks & Communications 14, no. 1 (January 31, 2022): 59–69. http://dx.doi.org/10.5121/ijcnc.2022.14104.
Full textKaur, Gurvinder, Dr S. N. Panda, and Dr Dalvinder Singh Dhaliwal. "Model-Based Tool-Assistance for Packet-Filter Design and its Future." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (April 16, 2014): 4053–57. http://dx.doi.org/10.24297/ijct.v13i1.2929.
Full textPozo, S., R. Ceballos, and R. M. Gasca. "Model-Based Development of firewall rule sets: Diagnosing model inconsistencies." Information and Software Technology 51, no. 5 (May 2009): 894–915. http://dx.doi.org/10.1016/j.infsof.2008.05.001.
Full textDi, Xiao Qiang, Hua Min Yang, and Jin Qing Li. "Intrusion Response Mobile Firewall Design in Ad Hoc Networks and Based on SMP Performance Analysis." Applied Mechanics and Materials 496-500 (January 2014): 1909–14. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.1909.
Full textGawanmeh, Amjad, and Sofiène Tahar. "Domain Restriction Based Formal Model for Firewall Configurations." International Journal for Information Security Research 3, no. 2 (June 1, 2013): 294–302. http://dx.doi.org/10.20533/ijisr.2042.4639.2013.0035.
Full textYudhana, Anton, Imam Riadi, and Sri Suharti. "Network Forensics Against Volumetric-Based Distributed Denial of Service Attacks on Cloud and the Edge Computing." International Journal of Safety and Security Engineering 12, no. 5 (November 30, 2022): 577–88. http://dx.doi.org/10.18280/ijsse.120505.
Full textQi, Bei, and Yun Feng Dong. "A New Model of Intrusion Detection Based on Data Warehouse and Data Mining." Advanced Materials Research 383-390 (November 2011): 303–7. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.303.
Full textDu, Jia Wei, Xing Zhang, Ying Zhou, and Yong Qiang Bai. "Active Defense Security Model in the Application of Network Deception System Design." Applied Mechanics and Materials 347-350 (August 2013): 2860–64. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2860.
Full textDing, Shijie, Zhiwei Zhang, and Jun Xie. "Network security defense model based on firewall and IPS." Journal of Intelligent & Fuzzy Systems 39, no. 6 (December 4, 2020): 8961–69. http://dx.doi.org/10.3233/jifs-189294.
Full textLi, Dong, Huaqun Guo, Jianying Zhou, Luying Zhou, and Jun Wen Wong. "SCADAWall: A CPI-enabled firewall model for SCADA security." Computers & Security 80 (January 2019): 134–54. http://dx.doi.org/10.1016/j.cose.2018.10.002.
Full textTrabelsi, Zouheir, Liren Zhang, Safaa Zeidan, and Kilani Ghoudi. "Dynamic traffic awareness statistical model for firewall performance enhancement." Computers & Security 39 (November 2013): 160–72. http://dx.doi.org/10.1016/j.cose.2013.07.001.
Full textBotvinko, Anatoly Y., and Konstantin E. Samouylov. "Evaluation of firewall performance when ranging a filtration rule set." Discrete and Continuous Models and Applied Computational Science 29, no. 3 (September 30, 2021): 230–41. http://dx.doi.org/10.22363/2658-4670-2021-29-3-230-241.
Full textOzhiganova, Marina, and Emil Kurtametov. "Using Neural Networks to Protect Web Applications." NBI Technologies, no. 2 (December 2020): 16–20. http://dx.doi.org/10.15688/nbit.jvolsu.2020.2.3.
Full textYang, Simin, Bart Dewancker, and Shuo Chen. "Study on Passive Heating Involving Firewalls with an Additional Sunlight Room in Rural Residential Buildings." International Journal of Environmental Research and Public Health 18, no. 21 (October 23, 2021): 11147. http://dx.doi.org/10.3390/ijerph182111147.
Full textRafamantanantsoa, Fontaine, and Haja Louis Rabetafika. "Performance Comparison and Simulink Model of Firewall Free BSD and Linux." Communications and Network 10, no. 04 (2018): 180–95. http://dx.doi.org/10.4236/cn.2018.104015.
Full textBarhoom, Tawfiq SM, and Emad KH Elrayyes. "Model for Strengthening Accuracy through Detection of Anomalous Firewall Policy Rules." International Journal of Innovative Research in Computer and Communication Engineering 02, no. 12 (December 30, 2014): 7116–24. http://dx.doi.org/10.15680/ijircce.2014.0212050.
Full textHuwaidi, Muhammad Zulfahmi, and Senie Destya. "Mencegah Serangan Rekayasa Sosial dengan Human Firewall." Jurnal Sistem dan Teknologi Informasi (JustIN) 10, no. 1 (January 31, 2022): 107. http://dx.doi.org/10.26418/justin.v10i1.44280.
Full textGulyamov, Sh, and F. Sagatova. "Method of Risk Detection Model in Packet Filtering." Mathematical and computer modelling. Series: Technical sciences, no. 22 (November 26, 2021): 58–66. http://dx.doi.org/10.32626/2308-5916.2021-22.58-66.
Full textSami Hasan, Amer, and Zaid Hashim Jaber. "FPKIN: Firewall Public Key Infrastructure for NEMO." International Journal of Engineering & Technology 7, no. 3.20 (September 1, 2018): 422. http://dx.doi.org/10.14419/ijet.v7i3.20.20585.
Full textGavrić, Nikola. "MODEL DDOS NAPADA APLIKACIONOG SLOJA GAMING SERVERA EKSPLOATACIJOM KLIJENTSKE APLIKACIJE." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, no. 11 (November 4, 2019): 2044–47. http://dx.doi.org/10.24867/05be28gavric.
Full textTang, Jian Gang, Shi Jun Zhang, and Ji Jiang. "Research on Network Security Issues and Security Model." Applied Mechanics and Materials 519-520 (February 2014): 128–31. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.128.
Full textAbu Al-Haija, Qasem, and Abdelraouf Ishtaiwi. "Machine Learning Based Model to Identify Firewall Decisions to Improve Cyber-Defense." International Journal on Advanced Science, Engineering and Information Technology 11, no. 4 (August 30, 2021): 1688. http://dx.doi.org/10.18517/ijaseit.11.4.14608.
Full textTekerek, Adem, and Omer Faruk Bay. "DESIGN AND IMPLEMENTATION OF AN ARTIFICIAL INTELLIGENCE-BASED WEB APPLICATION FIREWALL MODEL." Neural Network World 29, no. 4 (2019): 189–206. http://dx.doi.org/10.14311/nnw.2019.29.013.
Full textKila, Kikelomo Oluwaseun. "Climate Change Regulations of Corporations in Tanzania: A Case for Dilute Interventionism and Veto Firewall Paradigm." Journal of Environmental Law & Policy 03, no. 01 (April 28, 2023): 80–107. http://dx.doi.org/10.33002/jelp03.01.02.
Full textLin, Zhiming, and Zhiqiang Yao. "Firewall Anomaly Detection Based on Double Decision Tree." Symmetry 14, no. 12 (December 16, 2022): 2668. http://dx.doi.org/10.3390/sym14122668.
Full textGuo, Hui Ling. "Research on the Model of Database Intrusion Protection System Based on E-Commerce Platform." Applied Mechanics and Materials 336-338 (July 2013): 2559–62. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2559.
Full textHussain, Muhammad Iftikhar, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Fahad Razque, Saqib Hussain, and Muhammad Salman Pathan. "An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls." Journal of Intelligent & Fuzzy Systems 41, no. 1 (August 11, 2021): 125–36. http://dx.doi.org/10.3233/jifs-200835.
Full textSM. Barhoom, Tawfiq, and Emad KH. Elrayyes. "A Model for Enhancing the Accuracy Factor in Detecting the Anomalous Firewall Rules." International Journal of Engineering Trends and Technology 26, no. 1 (August 25, 2015): 31–36. http://dx.doi.org/10.14445/22315381/ijett-v26p207.
Full textDawadi, Babu R., Bibek Adhikari, and Devesh K. Srivastava. "Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks." Sensors 23, no. 4 (February 12, 2023): 2073. http://dx.doi.org/10.3390/s23042073.
Full textP., Senthil, Balasubramanian Prabhu Kavin, S. R. Srividhya, Ramachandran V., Kavitha C., and Wen-Cheng Lai. "Performance Evaluation of Stateful Firewall-Enabled SDN with Flow-Based Scheduling for Distributed Controllers." Electronics 11, no. 19 (September 22, 2022): 3000. http://dx.doi.org/10.3390/electronics11193000.
Full textYao, Jian. "Model Design of Big Data Information Security Management Based on the Internet of Things." Security and Communication Networks 2022 (October 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/4380037.
Full textTiejun Jia, and Xiaogang Wang. "The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage." International Journal of Digital Content Technology and its Applications 5, no. 3 (March 31, 2011): 304–9. http://dx.doi.org/10.4156/jdcta.vol5.issue3.30.
Full textKila, Kikelomo Oluwaseun. "Climate Change and Corporate Regulation: A Critical Analysis of Egypt’s Legal and Regulatory Regime." Journal of Environmental Law & Policy 03, no. 01 (April 28, 2023): 189–223. http://dx.doi.org/10.33002/jelp03.01.06.
Full textHooft, Gerard ’t. "Local conformal symmetry in black holes, standard model, and quantum gravity." International Journal of Modern Physics D 26, no. 03 (February 3, 2017): 1730006. http://dx.doi.org/10.1142/s0218271817300063.
Full textShaheed, Aref, and Haisam Al-radwan. "DASH Framework Using Machine Learning Techniques and Security Controls." International Journal of Digital Multimedia Broadcasting 2022 (June 13, 2022): 1–11. http://dx.doi.org/10.1155/2022/6214830.
Full textBabu Renga Rajan, S., D. Pushpa Ranjini, B. Shanmuga Sundari, A. Haseena Beevi, and R. Meenakshiammal. "Managing Cloud Security Using Energetic Information Flow Control." Asian Journal of Engineering and Applied Technology 4, no. 2 (November 5, 2015): 27–33. http://dx.doi.org/10.51983/ajeat-2015.4.2.2877.
Full textBizzo, Bernardo C., Shadi Ebrahimian, Mark E. Walters, Mark H. Michalski, Katherine P. Andriole, Keith J. Dreyer, Mannudeep K. Kalra, Tarik Alkasab, and Subba R. Digumarthy. "Validation pipeline for machine learning algorithm assessment for multiple vendors." PLOS ONE 17, no. 4 (April 29, 2022): e0267213. http://dx.doi.org/10.1371/journal.pone.0267213.
Full textDurante, Luca, Lucia Seno, and Adriano Valenzano. "A Formal Model and Technique to Redistribute the Packet Filtering Load in Multiple Firewall Networks." IEEE Transactions on Information Forensics and Security 16 (2021): 2637–51. http://dx.doi.org/10.1109/tifs.2021.3057552.
Full textShang, Wen Li, Sheng Shan Zhang, and Ming Wan. "Modbus/TCP Communication Anomaly Detection Based on PSO-SVM." Applied Mechanics and Materials 490-491 (January 2014): 1745–53. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1745.
Full textHuang, Yi, Shah Nazir, Xinqiang Ma, Shiming Kong, and Youyuan Liu. "Acquiring Data Traffic for Sustainable IoT and Smart Devices Using Machine Learning Algorithm." Security and Communication Networks 2021 (June 19, 2021): 1–11. http://dx.doi.org/10.1155/2021/1852466.
Full textDr. Vivekananth.P. "Cybersecurity Risks in Remote Working Environment and Strategies to Mitigate Them." International Journal of Engineering and Management Research 12, no. 1 (February 28, 2022): 108–11. http://dx.doi.org/10.31033/ijemr.12.1.13.
Full textVaz, Cenalo. "Black holes as gravitational atoms." International Journal of Modern Physics D 23, no. 12 (October 2014): 1441002. http://dx.doi.org/10.1142/s0218271814410028.
Full textM. R., Amal, and Venkadesh P. "Hybrid H-DOC: A bait for analyzing cyber attacker behavior." International journal of electrical and computer engineering systems 14, no. 1 (January 26, 2023): 37–44. http://dx.doi.org/10.32985/ijeces.14.1.5.
Full text