Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Next-Generation Firewall

Known as: NGFW 
A Next-Generation Firewall (NGFW) is an integrated network platform that, a part of the third generation of firewall technology, combines a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
The goal of this research is to analyze of effectiveness the Next Generation Firewall that implemented to secure IoT in smart… Expand
  • table I
Review
2018
Review
2018
In today's world, with the advent of internet, the network security has become a necessity to protect the usability and integrity… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • table II
Review
2017
Review
2017
Firewalls represent a critical security building block for networks as they monitor and control incoming and outgoing network… Expand
2017
2017
Network protocol normalization and reassembly is the basis of traffic inspection performed by NGFW and IPS devices. Even common… Expand
  • table I
  • table III
  • table II
  • table IV
Review
2017
Review
2017
This paper will address a recent trend in network security, which is leveraging next-generation firewalls (NGFW) at the network… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2016
2016
One of the most effective defense mechanisms against threats is to establish threat intelligence platform and early warning… Expand
  • figure 1
  • figure 2
  • table I
  • table III
  • table II
2016
2016
With increasing number of users on the internet, risk of security and probability of vulnerable attacks are increasing day by day… Expand
  • figure 1
2013
2013
Organisations of all types and sizes have come to rely on file transfer technology to help their businesses run smoothly. But… Expand
2012
2012
IT managers in corporate and mid-size businesses have to balance both network performance and network security concerns. While… Expand
2008
2008
In this paper, we propose a simple and robust method to detect Distributed Reflective Denial of Service (DRDoS) attacks. In DRDoS… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2