Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,003,273 papers from all fields of science
Search
Sign In
Create Free Account
Firewall (computing)
Known as:
Host-based firewall
, Packet filtering
, Firewall
Expand
In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Centrino
Cisco 12000
Cisco MARS
Cloud testing
Expand
Broader (2)
Cyberwarfare
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Computational complexity and black hole horizons
L. Susskind
2014
Corpus ID: 86717739
Computational complexity is essential to understanding the properties of black hole horizons. The problem of Alice creating a…
Expand
Highly Cited
2011
Highly Cited
2011
The MPEG-DASH Standard for Multimedia Streaming Over the Internet
I. Sodagar
IEEE Multimedia
2011
Corpus ID: 14431014
MPEG has recently finalized a new standard to enable dynamic and adaptive streaming of media over HTTP. This standard aims to…
Expand
Review
2010
Review
2010
The management of security in Cloud computing
Sumant Ramgovind
,
M. Eloff
,
Elme Smith
Information Security for South Africa
2010
Corpus ID: 12274022
Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible…
Expand
Review
2006
Review
2006
Security issues in SCADA networks
V. M. Igure
,
S. Laughter
,
Ronald D. Williams
Computers & security
2006
Corpus ID: 19010581
Highly Cited
2005
Highly Cited
2005
Remote physical device fingerprinting
Tadayoshi Kohno
,
A. Broido
,
K. Claffy
IEEE Symposium on Security and Privacy
2005
Corpus ID: 231787
We introduce the area of remote physical device fingerprinting, or fingerprinting a physical device, as opposed to an operating…
Expand
Review
2003
Review
2003
Security for Grid services
Von Welch
,
F. Siebenlist
,
+7 authors
S. Tuecke
High Performance Distributed Computing…
2003
Corpus ID: 462803
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations." The…
Expand
Review
2002
Review
2002
Defending against flooding-based distributed denial-of-service attacks: a tutorial
R. Chang
IEEE Communications Magazine
2002
Corpus ID: 9664076
Flooding-based distributed denial-of-service (DDoS) attack presents a very serious threat to the stability of the Internet. In a…
Expand
Highly Cited
2002
Highly Cited
2002
A framework for understanding and predicting insider attacks
E. Schultz
Computers & security
2002
Corpus ID: 14898265
Review
2001
Review
2001
Algorithms for packet classification
Pankaj Gupta
,
N. McKeown
IEEE Network
2001
Corpus ID: 17406119
The process of categorizing packets into "flows" in an Internet router is called packet classification. All packets belonging to…
Expand
Highly Cited
1985
Highly Cited
1985
Data Collection
L. Poundie Burstein
,
H. Freeman
,
K. Sirotnik
,
Ginette Delandshere
,
M. Hollis
1985
Corpus ID: 120130993
Recent advances in design, measurement, and analysis can have only a marginal impact on the integrity of evaluation studies…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE