Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,795,880 papers from all fields of science
Search
Sign In
Create Free Account
Application firewall
Known as:
Application layer firewall
, Database firewall
, Application-layer firewall
Expand
An application firewall is a form of firewall that controls input, output, and/or access from, to, or by an application or service. It operates by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
AppArmor
AppShield
Application delivery controller
Application delivery network
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
IP Based Traffic Recovery: An Optimal Approach using SDN Application for Data Center Network
Ahmed Mateen
,
Qaiser Abbas
arXiv.org
2017
Corpus ID: 1871968
With the passage of time and indulgence in Information Technology, network management has proved its significance and has become…
Expand
2016
2016
Application Layer Security for CoAP using the (D)TLS Record Layer
S. García
,
R. López
,
D. Garcia
2016
Corpus ID: 195951103
This document briefly describes an idea to provide Application-Layer Security for CoAP using (D)TLS Record Layer, assuming it is…
Expand
2014
2014
Detecting Hybrid Botnets with Web Command and Control Servers or Fast Flux Domain
Chia-Mei Chen
,
Ming-Zong Huang
,
Ya-Hui Ou
J. Inf. Hiding Multim. Signal Process.
2014
Corpus ID: 198938305
,
2012
2012
Performance analysis of application layer firewall
M. Z. A. Aziz
,
Muhammad Ibrahim
,
Abdullatif M. Omar
,
R. A. Rahman
,
Md. Mahfudz Md. Zan
,
M. I. Yusof
IEEE Symposium on Wireless Technology and…
2012
Corpus ID: 16763180
Nowadays organizations are likely to have Internet presence and this has led to a significant increase in all kinds of network…
Expand
2011
2011
A study on the impact of AL-FEC techniques on TV over IP Quality of Experience
F. Battisti
,
M. Carli
,
E. Mammi
,
A. Neri
EURASIP Journal on Advances in Signal Processing
2011
Corpus ID: 17550681
In this contribution, an evaluation of the effectiveness of Application Layer-Forward Error Correction (AL-FEC) scheme in video…
Expand
2010
2010
A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks
H. Lee
,
T. Cho
IEICE transactions on communications
2010
Corpus ID: 26818238
In wireless sensor networks, adversaries can easily launch application layer attacks, such as false data injection attacks and…
Expand
2007
2007
Analysis Methods of Firewall Policies by using Spatial Relationships between Filters
Y. Yin
,
R. Bhuvaneswaran
,
Y. Katayama
,
N. Takahashi
International Conference on Signal Processing…
2007
Corpus ID: 16520870
Network security can be increased by filtering packets at a firewall. Packet filtering examines network packets and decides…
Expand
2005
2005
Towards Database Firewalls
Kun Bai
,
A. Wang
,
Peng Liu
Database Security
2005
Corpus ID: 13434840
Authentication based access control and integrity constraints are the major approaches applied in commercial database systems to…
Expand
2004
2004
J2ME application-layer end-to-end security for m-commerce
W. Itani
,
A. Kayssi
Journal of Network and Computer Applications
2004
Corpus ID: 16375108
2000
2000
The Problem of End-to-end Security for Proxy-based Systems
M. Portmann
2000
Corpus ID: 14325117
Proxies can provide valuable services for today’s increasingly heterogeneous computing environment by providing various kinds of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE