Unified threat management

Known as: USM, UTM, Unified Security Management 
Unified threat management (UTM) or unified security management (USM), is a solution in the network security industry, and since 2004 it has become… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2003-2017
051020032017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The current detection model used by modern antivirus software is based on the same basic principle. Any antivirus has to analyze… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2015
2015
This paper addresses the problem of enabling non-scripted social interaction with virtual characters, and of authoring the… (More)
  • figure 2
  • figure 3
Is this relevant?
2014
2014
  • Jeremy D ' Hoinne Greg Young
  • 2014
Unified threat management devices provide small or midsize businesses with multiple network security functions in a single… (More)
  • figure 1
  • table 1
  • table 2
Is this relevant?
2012
2012
For many smaller and larger entities over the last couple of decades, information systems and technologies have become an… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2012
2012
Problem statement: Multicore and multithreaded CPUs have become the new approach for increase in the performance of the processor… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
  • Mark Nicolett, Kelly M. Kavanagh
  • 2011
The security information and event management (SIEM) market is defined by the customer's need to analyze security event data in… (More)
  • figure 1
  • table 1
  • table 2
Is this relevant?
2011
2011
Managing the configuration of heterogeneous enterprise security mechanisms is a complex task. The effectiveness of a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
To build holistic protection against complex and blended network threats, multiple security features need to be integrated into… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
Our Nation’s ability to rapidly detect and identify plant pests and pathogens either in offshore native habitats or soon after… (More)
  • table 1
  • table 2
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
2003
2003
Identity and identifiers are tightly linked when both are confirmed on paper. In a world of paper, verified pseudonyms and… (More)
Is this relevant?