Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,854 papers from all fields of science
Search
Sign In
Create Free Account
iptables
Known as:
IPT
, Ip tables
, Ip6tables
iptables is a user-space application program that allows a system administrator to configure the tables provided by the Linux kernel firewall…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
Arptables
Broadcast domain
ClearOS
Fail2Ban
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Design of a 13.56 MHz IPT system optimised for dynamic wireless charging environments
J. Arteaga
,
S. Aldhaher
,
G. Kkelis
,
D. Yates
,
P. Mitcheson
SPEC Workshops
2016
Corpus ID: 8859034
Inductive power transfer (IPT) systems are often designed to achieve their highest efficiency at a fixed load value and at a…
Expand
2015
2015
The challenges fraughting isoniazid prophylaxis as a child tuberculosis prevention strategy in high burden settings in Nairobi, Kenya
F. Okwara
,
J. Oyore
,
F. Were
2015
Corpus ID: 53385161
This article was scanned from a hard copy of the East and Central Africa medical journal Vol.2 no1 2015
2013
2013
Thwarting DDoS attacks in grid using information divergence
P. Varalakshmi
,
S. Selvi
Future generations computer systems
2013
Corpus ID: 32298563
2011
2011
Magnetic modeling of a high-power three phase bi-directional IPT system
D. Thrimawithana
,
U. Madawala
,
A. Francis
,
M. Neath
Annual Conference of the IEEE Industrial…
2011
Corpus ID: 41130603
The demand for high power and bi-directional Inductive Power Transfer (IPT) systems is on the rise due mainly to applications…
Expand
2010
2010
Preventing of SYN Flood Attack with Iptables Firewall
Sara Mirzaie
,
Alireza Karimi Elyato
,
M. Sarram
Second International Conference on Communication…
2010
Corpus ID: 27095965
Denial of services attacks prevents legitimate users from using a service. One particular type of this attack is known as SYN…
Expand
2010
2010
Modeling and Analysis of Firewalls by (Tissue-like) P Systems
A. Leporati
,
C. Ferretti
2010
Corpus ID: 16178302
We propose to use tissue-like P systems as a tool to model and analyse the security properties of firewall systems. The idea…
Expand
2009
2009
Consistency verification of stateful firewalls is not harder than the stateless case
L. Buttyán
,
Gábor Pék
,
T. Thong
2009
Corpus ID: 2506191
Firewalls play an important role in the enforcement of access control policies in contemporary networks. However, firewalls are…
Expand
2008
2008
Implementation of modified AQM mechanisms in IP routers
J. Domańska
,
A. Domanski
,
T. Czachórski
2008
Corpus ID: 31552896
The article is an attempt to answer the question if it makes sense to modify the way of choosing packets to reject in AQM…
Expand
2008
2008
Model-Based Firewall Conformance Testing
Achim D. Brucker
,
Lukas Brügger
,
B. Wolff
TestCom/FATES
2008
Corpus ID: 359115
Firewalls are a cornerstone of todays security infrastructure for networks. Their configuration, implementing a firewall policy…
Expand
2003
2003
Performance Evaluation of AODV Routing Protocol: Real-Life Measurements
Jean-Pierre Hubaux
2003
Corpus ID: 10735559
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE