Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Firewall (computing)

Known as: Host-based firewall, Packet filtering, Firewall 
In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Traffic classification has been studied for two decades and applied to a wide range of applications from QoS provisioning and… Expand
  • figure 1
  • table 1
  • table 2
Review
2018
Review
2018
Abstract End users’ cyber hygiene often plays a large role in cybersecurity breaches. Therefore, we need a deeper understanding… Expand
Highly Cited
2013
Highly Cited
2013
General relativity contains solutions in which two distant black holes are connected through the interior via a wormhole, or… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2012
Highly Cited
2012
A bstractWe argue that the following three statements cannot all be true: (i) Hawking radiation is in a pure state, (ii) the… Expand
Highly Cited
2006
Highly Cited
2006
Skype is a peer-to-peer VoIP client developed in 2003 by the organization that created Kazaa. Skype claims that it can work… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2002
Highly Cited
2002
An integral part of modeling the global view of network security is constructing attack graphs. Manual attack graph construction… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Highly Cited
2001
Highly Cited
2001
The Ponder language provides a common means of specifying security policies that map onto various access control implementation… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Highly Cited
1999
Highly Cited
1999
14 The Session Initiation Protocol (SIP) is an application-layer control (signaling) protocol for creating, 15 modifying, and… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Highly Cited
1998
Highly Cited
1998
In this paper we present the design, rationale, and implementation of a security architecture for protecting the secrecy and… Expand
Highly Cited
1993
Highly Cited
1993
Many versions of Unix provide facilities for user-level packet capture, making possible the use of general purpose workstations… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5