Results 21 to 30 of about 79,557 (216)

AN IMPLEMENTATION OF FIREWALL SYSTEM USING MIKROTIK ROUTER OS [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
This work concerned with implementing packet filtering firewall by using Mikrotik Router OS, and tested on a LAN. In the host machine, the programs VMware workstation and Wireshark were installed.
Shaymaa W. Abdulatteef
doaj   +1 more source

Application of MikroTik Firewall for Website Access Restriction and Prevention of DoS (Denial of Service) Attacks on Internet Networks Al-Mahrusiyah Vocational School Lirboyo

open access: yesJurnal Jaringan Telekomunikasi, 2023
Internet access is so easy that every level of society can access information from the website. If internet access is used positively, it will produce positive things for its users as well.
Asyiq Maulana   +2 more
doaj   +1 more source

Evaluation of firewall performance when ranging a filtration rule set

open access: yesDiscrete and Continuous Models and Applied Computational Science, 2021
This article is a continuation of a number of works devoted to evaluation of probabilistic-temporal characteristics of firewalls when ranging a filtration rule set.
Anatoly Y. Botvinko   +1 more
doaj   +1 more source

Delay Time Analysis of Reconfigurable Firewall Unit [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2012
A firewall function is indispensable for mobile devices and it demands low-power operations. To realize this demand, the authors have developed a firewall unit with a reconfigurable device.
Tomoaki Sato   +2 more
doaj  

Improved Session Table Architecture for Denial of Stateful Firewall Attacks

open access: yesIEEE Access, 2018
Stateful firewalls keep track of the state of network connections. The performance of stateful firewalls depends mainly on the processing of session tables and the mechanism used for packet filtering.
Zouheir Trabelsi   +3 more
doaj   +1 more source

An Overview of Automotive Service-Oriented Architectures and Implications for Security Countermeasures

open access: yesIEEE Access, 2020
New requirements from the customers' and manufacturers' point of view such as adding new software functions during the product life cycle require a transformed architecture design for future vehicles.
Marcel Rumez   +3 more
doaj   +1 more source

Learning to Customize Network Security Rules

open access: yes, 2017
Security is a major concern for organizations who wish to leverage cloud computing. In order to reduce security vulnerabilities, public cloud providers offer firewall functionalities.
Ajay Piriya Vijaya Kumar Saroja (5597705)   +4 more
core   +6 more sources

Development of an Anomaly Classification Model and a Decision Support Tool for Firewall Policy Configuration

open access: yesApplied Sciences
A firewall is a device that is used generally to prevent cyberattacks and protect internal assets by blocking unauthorized access. Information security managers have many difficulties in managing firewall policies due to errors or anomalies in the policy
Jinyong Park   +2 more
doaj   +1 more source

Mass of a Black Hole Firewall

open access: yes, 2014
Quantum entanglement of Hawking radiation has been supposed to give rise to a Planck density "firewall" near the event horizon of old black holes.
Abramowicz, M. A.   +2 more
core   +1 more source

Active router approach to defeating denial-of-service attacks in networks [PDF]

open access: yes, 2007
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core   +1 more source

Home - About - Disclaimer - Privacy