Port knocking

Known as: Port knocker, Portknocking, Single Packet Authorization 
In computer networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2005-2017
02420052017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Mobile cloud computing (MCC) is an increasingly popular research topic, partly due to the widespread adoption of mobile devices… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2017
2017
The Internet of Things (IoT) is more vulnerable to targeted cyber-attacks than an ordinary Information Technology (IT… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2016
2016
Data theft and espionage attacks, which is evolved rapidly, impose the need to develop new and stealthy communication techniques… (More)
  • table I
  • figure 1
  • figure 2
  • figure 5
  • table II
Is this relevant?
2012
2012
Port knocking is a first technique introduces to prevent attackers from discovering and exploiting potentially vulnerable service… (More)
  • table I
  • figure 1
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
2011
2011
Port Knocking is an important concept to secure services provided by the servers. By a predefined port knocking sequence server… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Port knocking is a form of host-to-host communication which relies on deliberately failed TCP connection attempts. The… (More)
  • figure 1
  • table I
Is this relevant?
2010
2010
The main objective of this work is to develop and evaluate the performance of a new PK technique, which can avert all types of… (More)
Is this relevant?
2005
2005
It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports… (More)
  • figure 1
  • table 1
  • table 3
  • table 2
Is this relevant?
Review
2005
Review
2005
Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
Is this relevant?
2005
2005
It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports… (More)
  • figure 1
  • table 1
  • table 2
Is this relevant?