Gotowa bibliografia na temat „Firewall Model”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Firewall Model”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Firewall Model"
Terentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko i Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT". Management of Development of Complex Systems, nr 45 (1.03.2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.
Pełny tekst źródłaKhummanee, Suchart, Phatthanaphong Chomphuwiset i Potchara Pruksasri. "DSSF: Decision Support System to Detect and Solve Firewall Rule Anomalies based on a Probability Approach". ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, nr 1 (5.03.2022): 56–73. http://dx.doi.org/10.37936/ecti-cit.2022161.246996.
Pełny tekst źródłaXuan, Shichang, Dapeng Man, Jiangchuan Zhang, Wu Yang i Miao Yu. "Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing". Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/8130152.
Pełny tekst źródłaKailanya, Eunice, Mary Mwadulo i Amos Omamo. "Dynamic deep stateful firewall packet analysis model". African Journal of Science, Technology and Social Sciences 1, nr 2 (23.12.2022): 116–23. http://dx.doi.org/10.58506/ajstss.v1i2.20.
Pełny tekst źródłaFrantzen, Mike, Florian Kerschbaum, E. Eugene Schultz i Sonia Fahmy. "A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals". Computers & Security 20, nr 3 (maj 2001): 263–70. http://dx.doi.org/10.1016/s0167-4048(01)00314-5.
Pełny tekst źródłaYasir Saleem, Usama Anwar, Muhammad Khawar Bashir, Sheraz Naseer i Nadia Tabassum. "Flow-Based Rules Generation for Intrusion Detection System using Machine Learning Approach". Lahore Garrison University Research Journal of Computer Science and Information Technology 4, nr 3 (30.09.2020): 54–70. http://dx.doi.org/10.54692/lgurjcsit.2020.0403100.
Pełny tekst źródłaJasi, Teba Ali, i Muna M. Taher Jawhar. "Detecting network attacks Model based on a long short-term memory LSTM". Technium: Romanian Journal of Applied Sciences and Technology 4, nr 8 (27.08.2022): 64–72. http://dx.doi.org/10.47577/technium.v4i8.7225.
Pełny tekst źródłaNguyen Kim, Tuan, Tam Nguyen Tri, Lam Tran Nguyen i Duy Thai Truong. "Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption)." International journal of Computer Networks & Communications 14, nr 1 (31.01.2022): 59–69. http://dx.doi.org/10.5121/ijcnc.2022.14104.
Pełny tekst źródłaKaur, Gurvinder, Dr S. N. Panda i Dr Dalvinder Singh Dhaliwal. "Model-Based Tool-Assistance for Packet-Filter Design and its Future". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, nr 1 (16.04.2014): 4053–57. http://dx.doi.org/10.24297/ijct.v13i1.2929.
Pełny tekst źródłaPozo, S., R. Ceballos i R. M. Gasca. "Model-Based Development of firewall rule sets: Diagnosing model inconsistencies". Information and Software Technology 51, nr 5 (maj 2009): 894–915. http://dx.doi.org/10.1016/j.infsof.2008.05.001.
Pełny tekst źródłaRozprawy doktorskie na temat "Firewall Model"
Robinson, Brian P. "A FIREWALL MODEL FOR TESTING USER-CONFIGURABLE SOFTWARE SYSTEMS". Case Western Reserve University School of Graduate Studies / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=case1206466905.
Pełny tekst źródłaAhmad, Salem Mohammed Ali Mohammed. "DoSTDM: A denial of service detection model using firewall data traffic pattern matching". Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1683.
Pełny tekst źródłaJanuš, Filip. "Pokročilá evaluace úrovně privátnosti v sociálních sítích". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417203.
Pełny tekst źródłaNelson, Timothy. "Margrave: An Improved Analyzer for Access-Control and Configuration Policies". Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-theses/203.
Pełny tekst źródłaNelson, Tim. "First-Order Models for Configuration Analysis". Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-dissertations/452.
Pełny tekst źródłaKonstantaras, Dimitrios, i Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models". Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Pełny tekst źródłaIn today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.
However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security
within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.
By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies.
An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.
Uznanski, Przemyslaw. "Large scale platform : Instantiable models and algorithmic design of communication schemes". Phd thesis, Université Sciences et Technologies - Bordeaux I, 2013. http://tel.archives-ouvertes.fr/tel-00878837.
Pełny tekst źródłaHsu, Chia-Jung, i 許家榮. "A knowledge-intensive model for inspecting the conflicts of firewall rules". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/45965352949013417563.
Pełny tekst źródła中原大學
資訊管理研究所
101
Abstract In this paper, proposed to use Ontology and the semantic language tool for querying the conflicts and reasoning the anomalies among firewall rules, besides the knowledge modeling of firewall policy rules. Internet firewall has been recognized as one of the most effective way to deploy computer network security. Through controlling of network resources and traffic in using the network security policy, the firewall provides a different level of trust between the network demarcation points. In practice firewall configuration, usually to perform thousands of access control rules across multiple networks, this complexity may increase the possibility of configuration errors. However, if the network administrator does not have sufficient skills and expertise to configure them correctly, could lead to unauthorized access with threats to network resources or blocking the authorized access to network resources. Therefore, the correct and consistent rules for the firewall are essential. This proposed method, assists the network administrators to verify the accuracy and consistency at the design of new firewall rules and properly integrate those new rules into the existing rules prior to production deployment, to achieve the requirement of a high security firewall.
Tung, Chung-Hua, i 董重華. "A study on CNS15408-based Security Evaluation Model for Information Equipment - The Case of Firewall". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/52641628592720510632.
Pełny tekst źródła中國文化大學
資訊管理學系
100
Nowadays, there are a lot of IT system and equipment products in the world. Each of their developer or vendor declare that their own prod-uct is the highest safety or most complete. But for the general users, they can’t accept those products just by the vendor's rhetoric. They need some fair, independent and trusted standard to assist the judgement. And the Common Criteria for Information Technology Security Evaluation is a quite worthy of the evaluation criteria of the reference of IT products security.
Felix, Reyes Alejandro. "Test case generation using symbolic grammars and quasirandom sequences". Master's thesis, 2010. http://hdl.handle.net/10048/1668.
Pełny tekst źródłaSoftware Engineering and Intelligent Systems
Książki na temat "Firewall Model"
Brisighella, Dario. From the firewall forward. Colorado Springs, Colo., U.S.A: Vip Aero Publishers, 1986.
Znajdź pełny tekst źródłaForouzan, Behrouz A. Data Communications Networking (McGraw-Hill Forouzan Networking). Wyd. 4. McGraw-Hill Science/Engineering/Math, 2006.
Znajdź pełny tekst źródłaData Communications Networking (McGraw-Hill Forouzan Networking). McGraw-Hill Science/Engineering/Math, 2006.
Znajdź pełny tekst źródłaData Communications and Networking (McGraw-Hill Forouzan Networking). McGraw-Hill Higher Education, 2007.
Znajdź pełny tekst źródłaCzęści książek na temat "Firewall Model"
Brucker, Achim D., Lukas Brügger i Burkhart Wolff. "Model-Based Firewall Conformance Testing". W Testing of Software and Communicating Systems, 103–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-68524-1_9.
Pełny tekst źródłaBotvinko, Anatoly, i Konstantin Samouylov. "Firewall Simulation Model with Filtering Rules Ranking". W Communications in Computer and Information Science, 533–45. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66242-4_42.
Pełny tekst źródłaWang, Weiping, Wenhui Chen, Zhepeng Li i Huaping Chen. "Comparison Model and Algorithm for Distributed Firewall Policy". W Lecture Notes in Computer Science, 545–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-37275-2_67.
Pełny tekst źródłaAkram, Raja Naeem, Konstantinos Markantonakis i Keith Mayes. "Firewall Mechanism in a User Centric Smart Card Ownership Model". W Lecture Notes in Computer Science, 118–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12510-2_9.
Pełny tekst źródłaHachana, Safaà, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri i Stephane Morucci. "Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management". W Information Systems Security, 133–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8_10.
Pełny tekst źródłaCubukcu, Ceren, i Cem Cantekin. "Using a Fuzzy-AHP Decision Model for Selecting the Best Firewall Alternative". W Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation, 426–33. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85626-7_50.
Pełny tekst źródłaChoudhury, Madhab Paul, i J. Paul Choudhury. "Machine Learning Based Model to Find Out Firewall Decisions Towards Improving Cyber Defence". W Lecture Notes in Networks and Systems, 179–95. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-9719-8_15.
Pełny tekst źródłaYuan, Hui, Lei Zheng, Liang Dong, Xiangli Peng, Yan Zhuang i Guoru Deng. "Research and Implementation of WEB Application Firewall Based on Feature Matching". W Application of Intelligent Systems in Multi-modal Information Analytics, 1223–31. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15740-1_154.
Pełny tekst źródłaPiprani, Baba. "Using ORM-Based Models as a Foundation for a Data Quality Firewall in an Advanced Generation Data Warehouse". W On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 1148–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11915072_18.
Pełny tekst źródłaPiprani, Baba. "Using ORM-Based Models as a Foundation for a Data Quality Firewall in an Advanced Generation Data Warehouse (Extended Version)". W Journal on Data Semantics XI, 94–125. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-92148-6_4.
Pełny tekst źródłaStreszczenia konferencji na temat "Firewall Model"
Liyanage, Geethapriya, i Shantha Fernando. "Firewall model for cloud computing". W 2013 IEEE 8th International Conference on Industrial and Information Systems (ICIIS). IEEE, 2013. http://dx.doi.org/10.1109/iciinfs.2013.6731960.
Pełny tekst źródłaJeffrey, Alan, i Taghrid Samak. "Model Checking Firewall Policy Configurations". W 2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2009. http://dx.doi.org/10.1109/policy.2009.32.
Pełny tekst źródłaBasumatary, Nayan, i Shyamanta M. Hazarika. "Model checking a firewall for anomalies". W 2013 1st International Conference on Emerging Trends and Applications in Computer Science (ICETACS). IEEE, 2013. http://dx.doi.org/10.1109/icetacs.2013.6691402.
Pełny tekst źródłaPereira, Fabio Dacencio, i Edward David Moreno Ordonez. "SSDR - Reconfigurable Firewall: Reconfiguration Model Impact". W 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.51.
Pełny tekst źródłaPereira, Fabio Dacencio, i Edward David Moreno Ordonez. "SSDR - Reconfigurable Firewall: Reconfiguration Model Performance". W 2008 4th Southern Conference on Programmable Logic (SPL). IEEE, 2008. http://dx.doi.org/10.1109/spl.2008.4547770.
Pełny tekst źródłaWang, Weiping, Heran Chen, Jiayao Chen i Bowen Liu. "Firewall Rule Ordering Based on Statistical Model". W 2009 International Conference on Computer Engineering and Technology (ICCET). IEEE, 2009. http://dx.doi.org/10.1109/iccet.2009.62.
Pełny tekst źródłaInSeon Yoo. "Adaptive firewall model to detect email viruses". W Proceedings. IEEE 38th Annual 2004 International Carnahan Conference on Security Technology. IEEE, 2004. http://dx.doi.org/10.1109/ccst.2004.1405392.
Pełny tekst źródłaHorowitz, Eduardo, i Luis C. Lamb. "A Hierarchical Model for Firewall Policy Extraction". W 2009 International Conference on Advanced Information Networking and Applications. IEEE, 2009. http://dx.doi.org/10.1109/aina.2009.116.
Pełny tekst źródłaWang, Weiping, Rong Ji, Wenhui Chen, Bo Chen i Zhepeng Li. "Firewall Rules Sorting Based on Markov Model". W The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007). IEEE, 2007. http://dx.doi.org/10.1109/isdpe.2007.40.
Pełny tekst źródłaGheorghica, Daniel, i Victor Croitoru. "Secure and flexible model for firewall policy management". W 2010 9th International Symposium on Electronics and Telecommunications (ISETC 2010). IEEE, 2010. http://dx.doi.org/10.1109/isetc.2010.5679366.
Pełny tekst źródła