Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,211,760 papers from all fields of science
Search
Sign In
Create Free Account
Firewall (computing)
Known as:
Host-based firewall
, Packet filtering
, Firewall
Expand
In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Centrino
Cisco 12000
Cisco MARS
Cloud testing
Expand
Broader (2)
Cyberwarfare
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2008
Review
2008
Implementation of a reconfigurable data protection module for NoC-based MPSoCs
Leandro Fiorin
,
S. Lukovic
,
G. Palermo
IEEE International Symposium on Parallel and…
2008
Corpus ID: 11139322
Security issues are emerging to be a basic concern in modern SoC development. Since in the field of on-chip interconnections the…
Expand
Highly Cited
2007
Highly Cited
2007
Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance
A. El-Atawy
,
T. Samak
,
E. Al-Shaer
,
Hong Li
IEEE INFOCOM - 26th IEEE International…
2007
Corpus ID: 18065125
Packet classification plays a critical role in many of the current networking technologies, and efficient yet lightweight packet…
Expand
Highly Cited
2006
Highly Cited
2006
Traffic-Aware Firewall Optimization Strategies
Subrata Acharya
,
Jia Wang
,
Zihui Ge
,
T. Znati
,
A. Greenberg
IEEE International Conference on Communications
2006
Corpus ID: 16646289
The overall performance of a firewall is crucial in enforcing and administrating security, especially when the network is under…
Expand
2006
2006
Performance Analysis of a P2P-Based VoIP Software
Lisha Gao
,
Junzhou Luo
Advanced Int'l Conference on Telecommunications…
2006
Corpus ID: 668948
With the development of network, multimedia will be the main application in next generation network. Voice is one of the most…
Expand
Highly Cited
2005
Highly Cited
2005
Fast reconfiguring deep packet filter for 1+ gigabit network
Young H. Cho
,
W. Mangione-Smith
IEEE Symposium on Field-Programmable Custom…
2005
Corpus ID: 7915650
Due to increasing number of network worms and virus, many computer network users are vulnerable to attacks. Unless network…
Expand
2005
2005
Measuring Large Overlay Networks - The Overnet Example
K. Kutzner
,
T. Fuhrmann
Kommunikation in Verteilten Systemen
2005
Corpus ID: 17153615
Peer-to-peer overlay networks have grown significantly in size and sophistication over the last years. Meanwhile, distributed…
Expand
2005
2005
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
André Adelsbach
,
Sebastian Gajek
,
Jörg Schwenk
Information Security Practice and Experience
2005
Corpus ID: 5526500
Today the standard means for secure transactions in the World Wide Web (WWW) are the SSL/TLS protocols, which provide secure (i.e…
Expand
Review
2001
Review
2001
Cooperative Intrusion Traceback and Response Architecture (CITRA)
D. Schnackengerg
,
Harley Holliday
,
R. Smith
,
K. Djahandari
,
D. Sterne
Proceedings DARPA Information Survivability…
2001
Corpus ID: 56854207
The Cooperative Intrusion Traceback and Response Architecture (CITRA) was originally developed as an infrastructure for…
Expand
Highly Cited
2001
Highly Cited
2001
Self-aware services: using Bayesian networks for detecting anomalies in Internet-based services
Alexandre Bronstein
,
Joydip Das
,
+5 authors
Ira Cohen
IEEE/IFIP International Symposium on Integrated…
2001
Corpus ID: 2536685
We propose a general architecture and implementation for the autonomous assessment of the health of arbitrary service elements…
Expand
Highly Cited
1999
Highly Cited
1999
Policy-based management: bridging the gap
S. Hinrichs
Asia-Pacific Computer Systems Architecture…
1999
Corpus ID: 16764866
In a policy-based system, policy goals are described with respect to network entities (e.g. networks and users) instead of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE