Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,297,657 papers from all fields of science
Search
Sign In
Create Free Account
Firewall (computing)
Known as:
Host-based firewall
, Packet filtering
, Firewall
Expand
In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Centrino
Cisco 12000
Cisco MARS
Cloud testing
Expand
Broader (2)
Cyberwarfare
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Data traffic analysis of utility smart metering network
Wenpeng Luan
,
D. Sharp
,
Stephen LaRoy
IEEE Power & Energy Society General Meeting
2013
Corpus ID: 40710232
This paper examines an implemented practical utility AMI network, analyzes meter data size and data traffic volume in several key…
Expand
Highly Cited
2006
Highly Cited
2006
Traffic-Aware Firewall Optimization Strategies
Subrata Acharya
,
Jia Wang
,
Zihui Ge
,
T. Znati
,
A. Greenberg
IEEE International Conference on Communications
2006
Corpus ID: 16646289
The overall performance of a firewall is crucial in enforcing and administrating security, especially when the network is under…
Expand
2006
2006
Performance Analysis of a P2P-Based VoIP Software
Lisha Gao
,
Junzhou Luo
Advanced Int'l Conference on Telecommunications…
2006
Corpus ID: 668948
With the development of network, multimedia will be the main application in next generation network. Voice is one of the most…
Expand
2005
2005
Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking
J. Haggerty
,
Q. Shi
,
M. Merabti
IEEE Journal on Selected Areas in Communications
2005
Corpus ID: 16526216
A major threat to the information economy is denial-of-service (DoS) attacks. These attacks are highly prevalent despite the…
Expand
2004
2004
Using Honeynets to Protect Large Enterprise Networks
J. Levine
,
J. Grizzard
,
H. Owen
IEEE Security and Privacy
2004
Corpus ID: 43827283
Network administrators use several methods to protect their network. Installing a honeynet within large enterprise networks…
Expand
Review
2000
Review
2000
Security considerations for FAN-Internet connections
Peter Palensky
,
Thilo Sauter
IEEE International Workshop on Factory…
2000
Corpus ID: 4639811
The interconnection between field area networks and IP-based LANs, as well as the Internet as a whole, is becoming increasingly…
Expand
Highly Cited
1999
Highly Cited
1999
Policy-based management: bridging the gap
S. Hinrichs
Asia-Pacific Computer Systems Architecture…
1999
Corpus ID: 16764866
In a policy-based system, policy goals are described with respect to network entities (e.g. networks and users) instead of…
Expand
1999
1999
Software smart cards via cryptographic camouflage
D. N. Hoover
,
B. N. Kausik
Proceedings of the IEEE Symposium on Security…
1999
Corpus ID: 7473159
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys…
Expand
1998
1998
The Virtual Learning Environment system
Anup Kumar
,
Raj Pakala
,
R. Ragade
,
J. Wong
FIE '98. 28th Annual Frontiers in Education…
1998
Corpus ID: 11468292
The Virtual Learning Environment (VLE) is an integrated university environment where students can apply for admission over the…
Expand
1998
1998
Catapults and Grappling Hooks: The Tools and Techniques of Information Warfare
Alan Boulanger
IBM Systems Journal
1998
Corpus ID: 18565158
For years, “hackers” have broken into computer systems, and now an entire industry is dedicated to computer network security…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE