Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,781,043 papers from all fields of science
Search
Sign In
Create Free Account
Firewall (computing)
Known as:
Host-based firewall
, Packet filtering
, Firewall
Expand
In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Centrino
Cisco 12000
Cisco MARS
Cloud testing
Expand
Broader (2)
Cyberwarfare
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Identification and Analysis of Skype Peer-to-Peer Traffic
Dongyan Zhang
,
Chao Zheng
,
Hongli Zhang
,
Hongliang Yu
Fifth International Conference on Internet and…
2010
Corpus ID: 1052743
More and more applications are adopting peer-to-peer (P2P) technology. Skype is a P2P based, popular VoIP software. The software…
Expand
Highly Cited
2006
Highly Cited
2006
Traffic-Aware Firewall Optimization Strategies
Subrata Acharya
,
Jia Wang
,
Zihui Ge
,
T. Znati
,
A. Greenberg
IEEE International Conference on Communications
2006
Corpus ID: 16646289
The overall performance of a firewall is crucial in enforcing and administrating security, especially when the network is under…
Expand
2006
2006
Performance Analysis of a P2P-Based VoIP Software
Lisha Gao
,
Junzhou Luo
Advanced Int'l Conference on Telecommunications…
2006
Corpus ID: 668948
With the development of network, multimedia will be the main application in next generation network. Voice is one of the most…
Expand
Highly Cited
2005
Highly Cited
2005
Fast reconfiguring deep packet filter for 1+ gigabit network
Young H. Cho
,
W. Mangione-Smith
IEEE Symposium on Field-Programmable Custom…
2005
Corpus ID: 7915650
Due to increasing number of network worms and virus, many computer network users are vulnerable to attacks. Unless network…
Expand
2005
2005
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
André Adelsbach
,
Sebastian Gajek
,
Jörg Schwenk
Information Security Practice and Experience
2005
Corpus ID: 5526500
Today the standard means for secure transactions in the World Wide Web (WWW) are the SSL/TLS protocols, which provide secure (i.e…
Expand
2005
2005
Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking
J. Haggerty
,
Q. Shi
,
M. Merabti
IEEE Journal on Selected Areas in Communications
2005
Corpus ID: 16526216
A major threat to the information economy is denial-of-service (DoS) attacks. These attacks are highly prevalent despite the…
Expand
2004
2004
Using Honeynets to Protect Large Enterprise Networks
J. Levine
,
J. Grizzard
,
H. Owen
IEEE Security and Privacy
2004
Corpus ID: 43827283
Network administrators use several methods to protect their network. Installing a honeynet within large enterprise networks…
Expand
Highly Cited
2001
Highly Cited
2001
Self-aware services: using Bayesian networks for detecting anomalies in Internet-based services
Alexandre Bronstein
,
Joydip Das
,
+5 authors
Ira Cohen
IEEE/IFIP International Symposium on Integrated…
2001
Corpus ID: 2536685
We propose a general architecture and implementation for the autonomous assessment of the health of arbitrary service elements…
Expand
Highly Cited
1999
Highly Cited
1999
Policy-based management: bridging the gap
S. Hinrichs
Asia-Pacific Computer Systems Architecture…
1999
Corpus ID: 16764866
In a policy-based system, policy goals are described with respect to network entities (e.g. networks and users) instead of…
Expand
1999
1999
Software smart cards via cryptographic camouflage
D. N. Hoover
,
B. N. Kausik
Proceedings of the IEEE Symposium on Security…
1999
Corpus ID: 7473159
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE