Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,157,516 papers from all fields of science
Search
Sign In
Create Free Account
Firewall (computing)
Known as:
Host-based firewall
, Packet filtering
, Firewall
Expand
In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Centrino
Cisco 12000
Cisco MARS
Cloud testing
Expand
Broader (2)
Cyberwarfare
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Jerusalem Lectures on Black Holes and Quantum Information
D. Harlow
2014
Corpus ID: 119258231
In these lectures I give an introduction to the quantum physics of black holes, including recent developments based on quantum…
Expand
Highly Cited
2011
Highly Cited
2011
More than 50 billion connected devices
2011
Corpus ID: 16270177
as many other things; such as a connected wallet, a connection to medical services, and an interactive location guide. In the…
Expand
Review
2010
Review
2010
The management of security in Cloud computing
Sumant Ramgovind
,
M. Eloff
,
Elme Smith
Information Security for South Africa
2010
Corpus ID: 12274022
Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible…
Expand
Highly Cited
2007
Highly Cited
2007
The Missing Motivation in Macroeconomics
George A. Akerlof
2007
Corpus ID: 55652693
Macroeconomics changed between the early 1960s and the late 1970s. The macroeconomics of the early 1960s was avowedly Keynesian…
Expand
Review
2006
Review
2006
Security issues in SCADA networks
V. M. Igure
,
S. Laughter
,
Ronald D. Williams
Computers & security
2006
Corpus ID: 19010581
Highly Cited
2002
Highly Cited
2002
A framework for understanding and predicting insider attacks
E. Schultz
Computers & security
2002
Corpus ID: 14898265
Highly Cited
2002
Highly Cited
2002
Practical Data Hiding in TCP/IP
K. Ahsan
,
D. Kundur
2002
Corpus ID: 5828473
This work relates the areas of steganography, network protocols and security for practical data hiding in communication networks…
Expand
Highly Cited
2001
Highly Cited
2001
Scalable packet classification
Florin Baboescu
,
G. Varghese
Conference on Applications, Technologies…
2001
Corpus ID: 1653546
Packet classification is important for applications such as firewalls, intrusion detection, and differentiated services. Existing…
Expand
Highly Cited
2000
Highly Cited
2000
Detecting and resolving packet filter conflicts
Hari Adiseshu
,
S. Suri
,
G. Parulkar
Proceedings IEEE INFOCOM . Conference on Computer…
2000
Corpus ID: 1658416
Packet filters are rules for classifying packets based on their header fields. Packet classification is essential to routers…
Expand
Highly Cited
1974
Highly Cited
1974
A program structure for error detection and recovery
J. Horning
,
H. Lauer
,
P. Melliar-Smith
,
B. Randell
Symposium on Operating Systems
1974
Corpus ID: 1615589
The paper describes a method of structuring programs which aids the design and validation of facilities for the detection of and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE