Results 1 to 10 of about 79,557 (216)

Evaporating Firewalls [PDF]

open access: yesJournal of High Energy Physics, 2013
In this note, we begin by reviewing an argument (independent from 1304.6483) that the large AdS black holes dual to typical high-energy pure states of a single holographic CFT must have some structure at the horizon (i.e. a firewall/fuzzball).
Van Raamsdonk, Mark
core   +4 more sources

Firewall Technologies [PDF]

open access: yesInformatică economică, 2007
Internet provides access to information and the ability to publish information in a revolutionary way. It is also a major danger that provides the ability to pollute and destroy information.
Gheorghe DODESCU
doaj   +2 more sources

Using a combined fuzzy-AHP and topsis decision model for selecting the best firewall alternative [PDF]

open access: yesJournal of Fuzzy Extension and Applications, 2022
Covid-19 pandemic forced all the world to make significant changes in their daily routines. As a result, internet and digital technologies started to be used more actively by individuals and businesses.
Ceren Cubukcu, Cem Cantekin
doaj   +1 more source

Perancangan Firewall dan Spanning Tree Protocol Sebagai Sistem Keamanan Jaringan Komputer

open access: yesJurnal Teknologi Informatika & Komputer, 2023
Dalam mengimplementasikan firewall di perusahaan, yang menjadi perhatian adalah perangkat yang digunakan, karena implementasi firewall pada setiap perangkat berbeda, misalnya router Mikrotik berbeda dengan implementasi firewall pada router Cisco route ...
Aldi Adisty Putra   +2 more
doaj   +1 more source

Evaluation of firewall performance metrics with ranging the rules for Poisson incoming packet flow and exponential filtering time

open access: yesDiscrete and Continuous Models and Applied Computational Science, 2023
The given article is a continuation of a number of works devoted to the development of models and methods for ranging the filtration rules to prevent a decrease in the firewall performance caused by the use of a sequential scheme for checking packet ...
Anatoly Yu. Botvinko   +1 more
doaj   +1 more source

Firewall modules and modular firewalls [PDF]

open access: yesThe 18th IEEE International Conference on Network Protocols, 2010
A firewall is a packet filter placed at an entry point of a network in the Internet. Each packet that goes through this entry point is checked by the firewall to determine whether to accept or discard the packet. The firewall makes this determination based on a specified sequence of overlapping rules.
H. B. Acharya, Aditya Joshi, M. G. Gouda
openaire   +1 more source

Research and implementation on high-speed transmission performance optimization technology of ten gigabit firewall UDP multicast [PDF]

open access: yesMATEC Web of Conferences, 2020
Under the development trend of high throughput, large capacity and strong time effective data security transmission of the second generation data relay system in China, the high-performance processing requirements for the firewall of the backbone network
Yang Fan   +6 more
doaj   +1 more source

Secure Collecting, Optimizing, and Deploying of Firewall Rules in Software-Defined Networks

open access: yesIEEE Access, 2020
Firewalls are a fundamental element of network security systems with the ability to block network data traffic flows according to pre-defined rules.
Sunghwan Kim   +3 more
doaj   +1 more source

Performance Evaluation Model for Application Layer Firewalls. [PDF]

open access: yesPLoS ONE, 2016
Application layer firewalls protect the trusted area network against information security risks. However, firewall performance may affect user experience.
Shichang Xuan   +3 more
doaj   +1 more source

Towards Secure Implementations of SDN Based Firewall

open access: yesJISR on Computing, 2022
Software-defined networking (SDN) is an emerging technology as a new paradigm for network architecture. It is a revolutionizing technology that facilitates effective management and programmability in a network.
Rizwan Iqbal
doaj   +1 more source

Home - About - Disclaimer - Privacy