Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,293,524 papers from all fields of science
Search
Sign In
Create Free Account
Firewall (computing)
Known as:
Host-based firewall
, Packet filtering
, Firewall
Expand
In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Centrino
Cisco 12000
Cisco MARS
Cloud testing
Expand
Broader (2)
Cyberwarfare
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Hyper-Entropic Gravitational Fireballs (Grireballs) with Firewalls
D. Page
2012
Corpus ID: 119207475
Recently there has been much discussion as to whether old black holes have firewalls at their surfaces that would destroy…
Expand
2011
2011
Side channels in cloud services , the case of deduplication in cloud storage
Danny Harnik
,
Alexandra Shulman-Peleg
2011
Corpus ID: 18639623
Cloud storage services commonly use deduplication, which eliminates redundant data by storing only a single copy of each file or…
Expand
2011
2011
Dynamic Adaptive Streaming over HTTP from Multiple Content Distribution Servers
Wei Pu
,
Z. Zou
,
Chang Wen Chen
Global Communications Conference
2011
Corpus ID: 17055638
Dynamic adaptive streaming over HTTP (DASH\footnote{In this paper, we use DASH as a general acronym, which does not represent…
Expand
2008
2008
Evolutionary Query Optimization for Heterogeneous Distributed Database Systems
R. Ghaemi
,
Amin Milani Fard
,
H. Tabatabaee
,
M. Sadeghizadeh
2008
Corpus ID: 13161614
Abstract — Due to new distributed database applications such as huge deductive database systems, the search complexity is…
Expand
2006
2006
Performance Analysis of a P2P-Based VoIP Software
Lisha Gao
,
Junzhou Luo
Advanced Int'l Conference on Telecommunications…
2006
Corpus ID: 668948
With the development of network, multimedia will be the main application in next generation network. Voice is one of the most…
Expand
Review
2000
Review
2000
Security considerations for FAN-Internet connections
Peter Palensky
,
Thilo Sauter
IEEE International Workshop on Factory…
2000
Corpus ID: 4639811
The interconnection between field area networks and IP-based LANs, as well as the Internet as a whole, is becoming increasingly…
Expand
Highly Cited
1999
Highly Cited
1999
Policy-based management: bridging the gap
S. Hinrichs
Asia-Pacific Computer Systems Architecture…
1999
Corpus ID: 16764866
In a policy-based system, policy goals are described with respect to network entities (e.g. networks and users) instead of…
Expand
1999
1999
Software smart cards via cryptographic camouflage
D. N. Hoover
,
B. N. Kausik
Proceedings of the IEEE Symposium on Security…
1999
Corpus ID: 7473159
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys…
Expand
1998
1998
Catapults and Grappling Hooks: The Tools and Techniques of Information Warfare
Alan Boulanger
IBM Systems Journal
1998
Corpus ID: 18565158
For years, “hackers” have broken into computer systems, and now an entire industry is dedicated to computer network security…
Expand
1994
1994
Firewall-Friendly FTP
S. Bellovin
Request for Comments
1994
Corpus ID: 30670373
This memo describes a suggested change to the behavior of FTP client programs. No protocol modifications are required, though we…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required