Artículos de revistas sobre el tema "Firewall Model"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Firewall Model".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Terentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko y Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT". Management of Development of Complex Systems, n.º 45 (1 de marzo de 2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.
Texto completoKhummanee, Suchart, Phatthanaphong Chomphuwiset y Potchara Pruksasri. "DSSF: Decision Support System to Detect and Solve Firewall Rule Anomalies based on a Probability Approach". ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, n.º 1 (5 de marzo de 2022): 56–73. http://dx.doi.org/10.37936/ecti-cit.2022161.246996.
Texto completoXuan, Shichang, Dapeng Man, Jiangchuan Zhang, Wu Yang y Miao Yu. "Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing". Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/8130152.
Texto completoKailanya, Eunice, Mary Mwadulo y Amos Omamo. "Dynamic deep stateful firewall packet analysis model". African Journal of Science, Technology and Social Sciences 1, n.º 2 (23 de diciembre de 2022): 116–23. http://dx.doi.org/10.58506/ajstss.v1i2.20.
Texto completoFrantzen, Mike, Florian Kerschbaum, E. Eugene Schultz y Sonia Fahmy. "A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals". Computers & Security 20, n.º 3 (mayo de 2001): 263–70. http://dx.doi.org/10.1016/s0167-4048(01)00314-5.
Texto completoYasir Saleem, Usama Anwar, Muhammad Khawar Bashir, Sheraz Naseer y Nadia Tabassum. "Flow-Based Rules Generation for Intrusion Detection System using Machine Learning Approach". Lahore Garrison University Research Journal of Computer Science and Information Technology 4, n.º 3 (30 de septiembre de 2020): 54–70. http://dx.doi.org/10.54692/lgurjcsit.2020.0403100.
Texto completoJasi, Teba Ali y Muna M. Taher Jawhar. "Detecting network attacks Model based on a long short-term memory LSTM". Technium: Romanian Journal of Applied Sciences and Technology 4, n.º 8 (27 de agosto de 2022): 64–72. http://dx.doi.org/10.47577/technium.v4i8.7225.
Texto completoNguyen Kim, Tuan, Tam Nguyen Tri, Lam Tran Nguyen y Duy Thai Truong. "Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption)." International journal of Computer Networks & Communications 14, n.º 1 (31 de enero de 2022): 59–69. http://dx.doi.org/10.5121/ijcnc.2022.14104.
Texto completoKaur, Gurvinder, Dr S. N. Panda y Dr Dalvinder Singh Dhaliwal. "Model-Based Tool-Assistance for Packet-Filter Design and its Future". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, n.º 1 (16 de abril de 2014): 4053–57. http://dx.doi.org/10.24297/ijct.v13i1.2929.
Texto completoPozo, S., R. Ceballos y R. M. Gasca. "Model-Based Development of firewall rule sets: Diagnosing model inconsistencies". Information and Software Technology 51, n.º 5 (mayo de 2009): 894–915. http://dx.doi.org/10.1016/j.infsof.2008.05.001.
Texto completoDi, Xiao Qiang, Hua Min Yang y Jin Qing Li. "Intrusion Response Mobile Firewall Design in Ad Hoc Networks and Based on SMP Performance Analysis". Applied Mechanics and Materials 496-500 (enero de 2014): 1909–14. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.1909.
Texto completoGawanmeh, Amjad y Sofiène Tahar. "Domain Restriction Based Formal Model for Firewall Configurations". International Journal for Information Security Research 3, n.º 2 (1 de junio de 2013): 294–302. http://dx.doi.org/10.20533/ijisr.2042.4639.2013.0035.
Texto completoYudhana, Anton, Imam Riadi y Sri Suharti. "Network Forensics Against Volumetric-Based Distributed Denial of Service Attacks on Cloud and the Edge Computing". International Journal of Safety and Security Engineering 12, n.º 5 (30 de noviembre de 2022): 577–88. http://dx.doi.org/10.18280/ijsse.120505.
Texto completoQi, Bei y Yun Feng Dong. "A New Model of Intrusion Detection Based on Data Warehouse and Data Mining". Advanced Materials Research 383-390 (noviembre de 2011): 303–7. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.303.
Texto completoDu, Jia Wei, Xing Zhang, Ying Zhou y Yong Qiang Bai. "Active Defense Security Model in the Application of Network Deception System Design". Applied Mechanics and Materials 347-350 (agosto de 2013): 2860–64. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2860.
Texto completoDing, Shijie, Zhiwei Zhang y Jun Xie. "Network security defense model based on firewall and IPS". Journal of Intelligent & Fuzzy Systems 39, n.º 6 (4 de diciembre de 2020): 8961–69. http://dx.doi.org/10.3233/jifs-189294.
Texto completoLi, Dong, Huaqun Guo, Jianying Zhou, Luying Zhou y Jun Wen Wong. "SCADAWall: A CPI-enabled firewall model for SCADA security". Computers & Security 80 (enero de 2019): 134–54. http://dx.doi.org/10.1016/j.cose.2018.10.002.
Texto completoTrabelsi, Zouheir, Liren Zhang, Safaa Zeidan y Kilani Ghoudi. "Dynamic traffic awareness statistical model for firewall performance enhancement". Computers & Security 39 (noviembre de 2013): 160–72. http://dx.doi.org/10.1016/j.cose.2013.07.001.
Texto completoBotvinko, Anatoly Y. y Konstantin E. Samouylov. "Evaluation of firewall performance when ranging a filtration rule set". Discrete and Continuous Models and Applied Computational Science 29, n.º 3 (30 de septiembre de 2021): 230–41. http://dx.doi.org/10.22363/2658-4670-2021-29-3-230-241.
Texto completoOzhiganova, Marina y Emil Kurtametov. "Using Neural Networks to Protect Web Applications". NBI Technologies, n.º 2 (diciembre de 2020): 16–20. http://dx.doi.org/10.15688/nbit.jvolsu.2020.2.3.
Texto completoYang, Simin, Bart Dewancker y Shuo Chen. "Study on Passive Heating Involving Firewalls with an Additional Sunlight Room in Rural Residential Buildings". International Journal of Environmental Research and Public Health 18, n.º 21 (23 de octubre de 2021): 11147. http://dx.doi.org/10.3390/ijerph182111147.
Texto completoRafamantanantsoa, Fontaine y Haja Louis Rabetafika. "Performance Comparison and Simulink Model of Firewall Free BSD and Linux". Communications and Network 10, n.º 04 (2018): 180–95. http://dx.doi.org/10.4236/cn.2018.104015.
Texto completoBarhoom, Tawfiq SM y Emad KH Elrayyes. "Model for Strengthening Accuracy through Detection of Anomalous Firewall Policy Rules". International Journal of Innovative Research in Computer and Communication Engineering 02, n.º 12 (30 de diciembre de 2014): 7116–24. http://dx.doi.org/10.15680/ijircce.2014.0212050.
Texto completoHuwaidi, Muhammad Zulfahmi y Senie Destya. "Mencegah Serangan Rekayasa Sosial dengan Human Firewall". Jurnal Sistem dan Teknologi Informasi (JustIN) 10, n.º 1 (31 de enero de 2022): 107. http://dx.doi.org/10.26418/justin.v10i1.44280.
Texto completoGulyamov, Sh y F. Sagatova. "Method of Risk Detection Model in Packet Filtering". Mathematical and computer modelling. Series: Technical sciences, n.º 22 (26 de noviembre de 2021): 58–66. http://dx.doi.org/10.32626/2308-5916.2021-22.58-66.
Texto completoSami Hasan, Amer y Zaid Hashim Jaber. "FPKIN: Firewall Public Key Infrastructure for NEMO". International Journal of Engineering & Technology 7, n.º 3.20 (1 de septiembre de 2018): 422. http://dx.doi.org/10.14419/ijet.v7i3.20.20585.
Texto completoGavrić, Nikola. "MODEL DDOS NAPADA APLIKACIONOG SLOJA GAMING SERVERA EKSPLOATACIJOM KLIJENTSKE APLIKACIJE". Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, n.º 11 (4 de noviembre de 2019): 2044–47. http://dx.doi.org/10.24867/05be28gavric.
Texto completoTang, Jian Gang, Shi Jun Zhang y Ji Jiang. "Research on Network Security Issues and Security Model". Applied Mechanics and Materials 519-520 (febrero de 2014): 128–31. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.128.
Texto completoAbu Al-Haija, Qasem y Abdelraouf Ishtaiwi. "Machine Learning Based Model to Identify Firewall Decisions to Improve Cyber-Defense". International Journal on Advanced Science, Engineering and Information Technology 11, n.º 4 (30 de agosto de 2021): 1688. http://dx.doi.org/10.18517/ijaseit.11.4.14608.
Texto completoTekerek, Adem y Omer Faruk Bay. "DESIGN AND IMPLEMENTATION OF AN ARTIFICIAL INTELLIGENCE-BASED WEB APPLICATION FIREWALL MODEL". Neural Network World 29, n.º 4 (2019): 189–206. http://dx.doi.org/10.14311/nnw.2019.29.013.
Texto completoKila, Kikelomo Oluwaseun. "Climate Change Regulations of Corporations in Tanzania: A Case for Dilute Interventionism and Veto Firewall Paradigm". Journal of Environmental Law & Policy 03, n.º 01 (28 de abril de 2023): 80–107. http://dx.doi.org/10.33002/jelp03.01.02.
Texto completoLin, Zhiming y Zhiqiang Yao. "Firewall Anomaly Detection Based on Double Decision Tree". Symmetry 14, n.º 12 (16 de diciembre de 2022): 2668. http://dx.doi.org/10.3390/sym14122668.
Texto completoGuo, Hui Ling. "Research on the Model of Database Intrusion Protection System Based on E-Commerce Platform". Applied Mechanics and Materials 336-338 (julio de 2013): 2559–62. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2559.
Texto completoHussain, Muhammad Iftikhar, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Fahad Razque, Saqib Hussain y Muhammad Salman Pathan. "An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls". Journal of Intelligent & Fuzzy Systems 41, n.º 1 (11 de agosto de 2021): 125–36. http://dx.doi.org/10.3233/jifs-200835.
Texto completoSM. Barhoom, Tawfiq y Emad KH. Elrayyes. "A Model for Enhancing the Accuracy Factor in Detecting the Anomalous Firewall Rules". International Journal of Engineering Trends and Technology 26, n.º 1 (25 de agosto de 2015): 31–36. http://dx.doi.org/10.14445/22315381/ijett-v26p207.
Texto completoDawadi, Babu R., Bibek Adhikari y Devesh K. Srivastava. "Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks". Sensors 23, n.º 4 (12 de febrero de 2023): 2073. http://dx.doi.org/10.3390/s23042073.
Texto completoP., Senthil, Balasubramanian Prabhu Kavin, S. R. Srividhya, Ramachandran V., Kavitha C. y Wen-Cheng Lai. "Performance Evaluation of Stateful Firewall-Enabled SDN with Flow-Based Scheduling for Distributed Controllers". Electronics 11, n.º 19 (22 de septiembre de 2022): 3000. http://dx.doi.org/10.3390/electronics11193000.
Texto completoYao, Jian. "Model Design of Big Data Information Security Management Based on the Internet of Things". Security and Communication Networks 2022 (10 de octubre de 2022): 1–10. http://dx.doi.org/10.1155/2022/4380037.
Texto completoTiejun Jia y Xiaogang Wang. "The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage". International Journal of Digital Content Technology and its Applications 5, n.º 3 (31 de marzo de 2011): 304–9. http://dx.doi.org/10.4156/jdcta.vol5.issue3.30.
Texto completoKila, Kikelomo Oluwaseun. "Climate Change and Corporate Regulation: A Critical Analysis of Egypt’s Legal and Regulatory Regime". Journal of Environmental Law & Policy 03, n.º 01 (28 de abril de 2023): 189–223. http://dx.doi.org/10.33002/jelp03.01.06.
Texto completoHooft, Gerard ’t. "Local conformal symmetry in black holes, standard model, and quantum gravity". International Journal of Modern Physics D 26, n.º 03 (3 de febrero de 2017): 1730006. http://dx.doi.org/10.1142/s0218271817300063.
Texto completoShaheed, Aref y Haisam Al-radwan. "DASH Framework Using Machine Learning Techniques and Security Controls". International Journal of Digital Multimedia Broadcasting 2022 (13 de junio de 2022): 1–11. http://dx.doi.org/10.1155/2022/6214830.
Texto completoBabu Renga Rajan, S., D. Pushpa Ranjini, B. Shanmuga Sundari, A. Haseena Beevi y R. Meenakshiammal. "Managing Cloud Security Using Energetic Information Flow Control". Asian Journal of Engineering and Applied Technology 4, n.º 2 (5 de noviembre de 2015): 27–33. http://dx.doi.org/10.51983/ajeat-2015.4.2.2877.
Texto completoBizzo, Bernardo C., Shadi Ebrahimian, Mark E. Walters, Mark H. Michalski, Katherine P. Andriole, Keith J. Dreyer, Mannudeep K. Kalra, Tarik Alkasab y Subba R. Digumarthy. "Validation pipeline for machine learning algorithm assessment for multiple vendors". PLOS ONE 17, n.º 4 (29 de abril de 2022): e0267213. http://dx.doi.org/10.1371/journal.pone.0267213.
Texto completoDurante, Luca, Lucia Seno y Adriano Valenzano. "A Formal Model and Technique to Redistribute the Packet Filtering Load in Multiple Firewall Networks". IEEE Transactions on Information Forensics and Security 16 (2021): 2637–51. http://dx.doi.org/10.1109/tifs.2021.3057552.
Texto completoShang, Wen Li, Sheng Shan Zhang y Ming Wan. "Modbus/TCP Communication Anomaly Detection Based on PSO-SVM". Applied Mechanics and Materials 490-491 (enero de 2014): 1745–53. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1745.
Texto completoHuang, Yi, Shah Nazir, Xinqiang Ma, Shiming Kong y Youyuan Liu. "Acquiring Data Traffic for Sustainable IoT and Smart Devices Using Machine Learning Algorithm". Security and Communication Networks 2021 (19 de junio de 2021): 1–11. http://dx.doi.org/10.1155/2021/1852466.
Texto completoDr. Vivekananth.P. "Cybersecurity Risks in Remote Working Environment and Strategies to Mitigate Them". International Journal of Engineering and Management Research 12, n.º 1 (28 de febrero de 2022): 108–11. http://dx.doi.org/10.31033/ijemr.12.1.13.
Texto completoVaz, Cenalo. "Black holes as gravitational atoms". International Journal of Modern Physics D 23, n.º 12 (octubre de 2014): 1441002. http://dx.doi.org/10.1142/s0218271814410028.
Texto completoM. R., Amal y Venkadesh P. "Hybrid H-DOC: A bait for analyzing cyber attacker behavior". International journal of electrical and computer engineering systems 14, n.º 1 (26 de enero de 2023): 37–44. http://dx.doi.org/10.32985/ijeces.14.1.5.
Texto completo