Skip to search formSkip to main contentSkip to account menu

Firewall (computing)

Known as: Host-based firewall, Packet filtering, Firewall 
In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
More and more applications are adopting peer-to-peer (P2P) technology. Skype is a P2P based, popular VoIP software. The software… 
Highly Cited
2006
Highly Cited
2006
The overall performance of a firewall is crucial in enforcing and administrating security, especially when the network is under… 
2006
2006
With the development of network, multimedia will be the main application in next generation network. Voice is one of the most… 
Highly Cited
2005
Highly Cited
2005
Due to increasing number of network worms and virus, many computer network users are vulnerable to attacks. Unless network… 
2005
2005
Today the standard means for secure transactions in the World Wide Web (WWW) are the SSL/TLS protocols, which provide secure (i.e… 
2005
2005
A major threat to the information economy is denial-of-service (DoS) attacks. These attacks are highly prevalent despite the… 
2004
2004
Network administrators use several methods to protect their network. Installing a honeynet within large enterprise networks… 
Highly Cited
2001
Highly Cited
2001
We propose a general architecture and implementation for the autonomous assessment of the health of arbitrary service elements… 
Highly Cited
1999
Highly Cited
1999
In a policy-based system, policy goals are described with respect to network entities (e.g. networks and users) instead of… 
1999
1999
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys…