Artykuły w czasopismach na temat „Firewall Model”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Firewall Model”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Terentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko i Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT". Management of Development of Complex Systems, nr 45 (1.03.2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.
Pełny tekst źródłaKhummanee, Suchart, Phatthanaphong Chomphuwiset i Potchara Pruksasri. "DSSF: Decision Support System to Detect and Solve Firewall Rule Anomalies based on a Probability Approach". ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, nr 1 (5.03.2022): 56–73. http://dx.doi.org/10.37936/ecti-cit.2022161.246996.
Pełny tekst źródłaXuan, Shichang, Dapeng Man, Jiangchuan Zhang, Wu Yang i Miao Yu. "Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing". Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/8130152.
Pełny tekst źródłaKailanya, Eunice, Mary Mwadulo i Amos Omamo. "Dynamic deep stateful firewall packet analysis model". African Journal of Science, Technology and Social Sciences 1, nr 2 (23.12.2022): 116–23. http://dx.doi.org/10.58506/ajstss.v1i2.20.
Pełny tekst źródłaFrantzen, Mike, Florian Kerschbaum, E. Eugene Schultz i Sonia Fahmy. "A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals". Computers & Security 20, nr 3 (maj 2001): 263–70. http://dx.doi.org/10.1016/s0167-4048(01)00314-5.
Pełny tekst źródłaYasir Saleem, Usama Anwar, Muhammad Khawar Bashir, Sheraz Naseer i Nadia Tabassum. "Flow-Based Rules Generation for Intrusion Detection System using Machine Learning Approach". Lahore Garrison University Research Journal of Computer Science and Information Technology 4, nr 3 (30.09.2020): 54–70. http://dx.doi.org/10.54692/lgurjcsit.2020.0403100.
Pełny tekst źródłaJasi, Teba Ali, i Muna M. Taher Jawhar. "Detecting network attacks Model based on a long short-term memory LSTM". Technium: Romanian Journal of Applied Sciences and Technology 4, nr 8 (27.08.2022): 64–72. http://dx.doi.org/10.47577/technium.v4i8.7225.
Pełny tekst źródłaNguyen Kim, Tuan, Tam Nguyen Tri, Lam Tran Nguyen i Duy Thai Truong. "Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption)." International journal of Computer Networks & Communications 14, nr 1 (31.01.2022): 59–69. http://dx.doi.org/10.5121/ijcnc.2022.14104.
Pełny tekst źródłaKaur, Gurvinder, Dr S. N. Panda i Dr Dalvinder Singh Dhaliwal. "Model-Based Tool-Assistance for Packet-Filter Design and its Future". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, nr 1 (16.04.2014): 4053–57. http://dx.doi.org/10.24297/ijct.v13i1.2929.
Pełny tekst źródłaPozo, S., R. Ceballos i R. M. Gasca. "Model-Based Development of firewall rule sets: Diagnosing model inconsistencies". Information and Software Technology 51, nr 5 (maj 2009): 894–915. http://dx.doi.org/10.1016/j.infsof.2008.05.001.
Pełny tekst źródłaDi, Xiao Qiang, Hua Min Yang i Jin Qing Li. "Intrusion Response Mobile Firewall Design in Ad Hoc Networks and Based on SMP Performance Analysis". Applied Mechanics and Materials 496-500 (styczeń 2014): 1909–14. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.1909.
Pełny tekst źródłaGawanmeh, Amjad, i Sofiène Tahar. "Domain Restriction Based Formal Model for Firewall Configurations". International Journal for Information Security Research 3, nr 2 (1.06.2013): 294–302. http://dx.doi.org/10.20533/ijisr.2042.4639.2013.0035.
Pełny tekst źródłaYudhana, Anton, Imam Riadi i Sri Suharti. "Network Forensics Against Volumetric-Based Distributed Denial of Service Attacks on Cloud and the Edge Computing". International Journal of Safety and Security Engineering 12, nr 5 (30.11.2022): 577–88. http://dx.doi.org/10.18280/ijsse.120505.
Pełny tekst źródłaQi, Bei, i Yun Feng Dong. "A New Model of Intrusion Detection Based on Data Warehouse and Data Mining". Advanced Materials Research 383-390 (listopad 2011): 303–7. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.303.
Pełny tekst źródłaDu, Jia Wei, Xing Zhang, Ying Zhou i Yong Qiang Bai. "Active Defense Security Model in the Application of Network Deception System Design". Applied Mechanics and Materials 347-350 (sierpień 2013): 2860–64. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2860.
Pełny tekst źródłaDing, Shijie, Zhiwei Zhang i Jun Xie. "Network security defense model based on firewall and IPS". Journal of Intelligent & Fuzzy Systems 39, nr 6 (4.12.2020): 8961–69. http://dx.doi.org/10.3233/jifs-189294.
Pełny tekst źródłaLi, Dong, Huaqun Guo, Jianying Zhou, Luying Zhou i Jun Wen Wong. "SCADAWall: A CPI-enabled firewall model for SCADA security". Computers & Security 80 (styczeń 2019): 134–54. http://dx.doi.org/10.1016/j.cose.2018.10.002.
Pełny tekst źródłaTrabelsi, Zouheir, Liren Zhang, Safaa Zeidan i Kilani Ghoudi. "Dynamic traffic awareness statistical model for firewall performance enhancement". Computers & Security 39 (listopad 2013): 160–72. http://dx.doi.org/10.1016/j.cose.2013.07.001.
Pełny tekst źródłaBotvinko, Anatoly Y., i Konstantin E. Samouylov. "Evaluation of firewall performance when ranging a filtration rule set". Discrete and Continuous Models and Applied Computational Science 29, nr 3 (30.09.2021): 230–41. http://dx.doi.org/10.22363/2658-4670-2021-29-3-230-241.
Pełny tekst źródłaOzhiganova, Marina, i Emil Kurtametov. "Using Neural Networks to Protect Web Applications". NBI Technologies, nr 2 (grudzień 2020): 16–20. http://dx.doi.org/10.15688/nbit.jvolsu.2020.2.3.
Pełny tekst źródłaYang, Simin, Bart Dewancker i Shuo Chen. "Study on Passive Heating Involving Firewalls with an Additional Sunlight Room in Rural Residential Buildings". International Journal of Environmental Research and Public Health 18, nr 21 (23.10.2021): 11147. http://dx.doi.org/10.3390/ijerph182111147.
Pełny tekst źródłaRafamantanantsoa, Fontaine, i Haja Louis Rabetafika. "Performance Comparison and Simulink Model of Firewall Free BSD and Linux". Communications and Network 10, nr 04 (2018): 180–95. http://dx.doi.org/10.4236/cn.2018.104015.
Pełny tekst źródłaBarhoom, Tawfiq SM, i Emad KH Elrayyes. "Model for Strengthening Accuracy through Detection of Anomalous Firewall Policy Rules". International Journal of Innovative Research in Computer and Communication Engineering 02, nr 12 (30.12.2014): 7116–24. http://dx.doi.org/10.15680/ijircce.2014.0212050.
Pełny tekst źródłaHuwaidi, Muhammad Zulfahmi, i Senie Destya. "Mencegah Serangan Rekayasa Sosial dengan Human Firewall". Jurnal Sistem dan Teknologi Informasi (JustIN) 10, nr 1 (31.01.2022): 107. http://dx.doi.org/10.26418/justin.v10i1.44280.
Pełny tekst źródłaGulyamov, Sh, i F. Sagatova. "Method of Risk Detection Model in Packet Filtering". Mathematical and computer modelling. Series: Technical sciences, nr 22 (26.11.2021): 58–66. http://dx.doi.org/10.32626/2308-5916.2021-22.58-66.
Pełny tekst źródłaSami Hasan, Amer, i Zaid Hashim Jaber. "FPKIN: Firewall Public Key Infrastructure for NEMO". International Journal of Engineering & Technology 7, nr 3.20 (1.09.2018): 422. http://dx.doi.org/10.14419/ijet.v7i3.20.20585.
Pełny tekst źródłaGavrić, Nikola. "MODEL DDOS NAPADA APLIKACIONOG SLOJA GAMING SERVERA EKSPLOATACIJOM KLIJENTSKE APLIKACIJE". Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, nr 11 (4.11.2019): 2044–47. http://dx.doi.org/10.24867/05be28gavric.
Pełny tekst źródłaTang, Jian Gang, Shi Jun Zhang i Ji Jiang. "Research on Network Security Issues and Security Model". Applied Mechanics and Materials 519-520 (luty 2014): 128–31. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.128.
Pełny tekst źródłaAbu Al-Haija, Qasem, i Abdelraouf Ishtaiwi. "Machine Learning Based Model to Identify Firewall Decisions to Improve Cyber-Defense". International Journal on Advanced Science, Engineering and Information Technology 11, nr 4 (30.08.2021): 1688. http://dx.doi.org/10.18517/ijaseit.11.4.14608.
Pełny tekst źródłaTekerek, Adem, i Omer Faruk Bay. "DESIGN AND IMPLEMENTATION OF AN ARTIFICIAL INTELLIGENCE-BASED WEB APPLICATION FIREWALL MODEL". Neural Network World 29, nr 4 (2019): 189–206. http://dx.doi.org/10.14311/nnw.2019.29.013.
Pełny tekst źródłaKila, Kikelomo Oluwaseun. "Climate Change Regulations of Corporations in Tanzania: A Case for Dilute Interventionism and Veto Firewall Paradigm". Journal of Environmental Law & Policy 03, nr 01 (28.04.2023): 80–107. http://dx.doi.org/10.33002/jelp03.01.02.
Pełny tekst źródłaLin, Zhiming, i Zhiqiang Yao. "Firewall Anomaly Detection Based on Double Decision Tree". Symmetry 14, nr 12 (16.12.2022): 2668. http://dx.doi.org/10.3390/sym14122668.
Pełny tekst źródłaGuo, Hui Ling. "Research on the Model of Database Intrusion Protection System Based on E-Commerce Platform". Applied Mechanics and Materials 336-338 (lipiec 2013): 2559–62. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2559.
Pełny tekst źródłaHussain, Muhammad Iftikhar, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Fahad Razque, Saqib Hussain i Muhammad Salman Pathan. "An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls". Journal of Intelligent & Fuzzy Systems 41, nr 1 (11.08.2021): 125–36. http://dx.doi.org/10.3233/jifs-200835.
Pełny tekst źródłaSM. Barhoom, Tawfiq, i Emad KH. Elrayyes. "A Model for Enhancing the Accuracy Factor in Detecting the Anomalous Firewall Rules". International Journal of Engineering Trends and Technology 26, nr 1 (25.08.2015): 31–36. http://dx.doi.org/10.14445/22315381/ijett-v26p207.
Pełny tekst źródłaDawadi, Babu R., Bibek Adhikari i Devesh K. Srivastava. "Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks". Sensors 23, nr 4 (12.02.2023): 2073. http://dx.doi.org/10.3390/s23042073.
Pełny tekst źródłaP., Senthil, Balasubramanian Prabhu Kavin, S. R. Srividhya, Ramachandran V., Kavitha C. i Wen-Cheng Lai. "Performance Evaluation of Stateful Firewall-Enabled SDN with Flow-Based Scheduling for Distributed Controllers". Electronics 11, nr 19 (22.09.2022): 3000. http://dx.doi.org/10.3390/electronics11193000.
Pełny tekst źródłaYao, Jian. "Model Design of Big Data Information Security Management Based on the Internet of Things". Security and Communication Networks 2022 (10.10.2022): 1–10. http://dx.doi.org/10.1155/2022/4380037.
Pełny tekst źródłaTiejun Jia, i Xiaogang Wang. "The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage". International Journal of Digital Content Technology and its Applications 5, nr 3 (31.03.2011): 304–9. http://dx.doi.org/10.4156/jdcta.vol5.issue3.30.
Pełny tekst źródłaKila, Kikelomo Oluwaseun. "Climate Change and Corporate Regulation: A Critical Analysis of Egypt’s Legal and Regulatory Regime". Journal of Environmental Law & Policy 03, nr 01 (28.04.2023): 189–223. http://dx.doi.org/10.33002/jelp03.01.06.
Pełny tekst źródłaHooft, Gerard ’t. "Local conformal symmetry in black holes, standard model, and quantum gravity". International Journal of Modern Physics D 26, nr 03 (3.02.2017): 1730006. http://dx.doi.org/10.1142/s0218271817300063.
Pełny tekst źródłaShaheed, Aref, i Haisam Al-radwan. "DASH Framework Using Machine Learning Techniques and Security Controls". International Journal of Digital Multimedia Broadcasting 2022 (13.06.2022): 1–11. http://dx.doi.org/10.1155/2022/6214830.
Pełny tekst źródłaBabu Renga Rajan, S., D. Pushpa Ranjini, B. Shanmuga Sundari, A. Haseena Beevi i R. Meenakshiammal. "Managing Cloud Security Using Energetic Information Flow Control". Asian Journal of Engineering and Applied Technology 4, nr 2 (5.11.2015): 27–33. http://dx.doi.org/10.51983/ajeat-2015.4.2.2877.
Pełny tekst źródłaBizzo, Bernardo C., Shadi Ebrahimian, Mark E. Walters, Mark H. Michalski, Katherine P. Andriole, Keith J. Dreyer, Mannudeep K. Kalra, Tarik Alkasab i Subba R. Digumarthy. "Validation pipeline for machine learning algorithm assessment for multiple vendors". PLOS ONE 17, nr 4 (29.04.2022): e0267213. http://dx.doi.org/10.1371/journal.pone.0267213.
Pełny tekst źródłaDurante, Luca, Lucia Seno i Adriano Valenzano. "A Formal Model and Technique to Redistribute the Packet Filtering Load in Multiple Firewall Networks". IEEE Transactions on Information Forensics and Security 16 (2021): 2637–51. http://dx.doi.org/10.1109/tifs.2021.3057552.
Pełny tekst źródłaShang, Wen Li, Sheng Shan Zhang i Ming Wan. "Modbus/TCP Communication Anomaly Detection Based on PSO-SVM". Applied Mechanics and Materials 490-491 (styczeń 2014): 1745–53. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1745.
Pełny tekst źródłaHuang, Yi, Shah Nazir, Xinqiang Ma, Shiming Kong i Youyuan Liu. "Acquiring Data Traffic for Sustainable IoT and Smart Devices Using Machine Learning Algorithm". Security and Communication Networks 2021 (19.06.2021): 1–11. http://dx.doi.org/10.1155/2021/1852466.
Pełny tekst źródłaDr. Vivekananth.P. "Cybersecurity Risks in Remote Working Environment and Strategies to Mitigate Them". International Journal of Engineering and Management Research 12, nr 1 (28.02.2022): 108–11. http://dx.doi.org/10.31033/ijemr.12.1.13.
Pełny tekst źródłaVaz, Cenalo. "Black holes as gravitational atoms". International Journal of Modern Physics D 23, nr 12 (październik 2014): 1441002. http://dx.doi.org/10.1142/s0218271814410028.
Pełny tekst źródłaM. R., Amal, i Venkadesh P. "Hybrid H-DOC: A bait for analyzing cyber attacker behavior". International journal of electrical and computer engineering systems 14, nr 1 (26.01.2023): 37–44. http://dx.doi.org/10.32985/ijeces.14.1.5.
Pełny tekst źródła