Results 21 to 30 of about 79,557 (216)
AN IMPLEMENTATION OF FIREWALL SYSTEM USING MIKROTIK ROUTER OS [PDF]
This work concerned with implementing packet filtering firewall by using Mikrotik Router OS, and tested on a LAN. In the host machine, the programs VMware workstation and Wireshark were installed.
Shaymaa W. Abdulatteef
doaj +1 more source
Internet access is so easy that every level of society can access information from the website. If internet access is used positively, it will produce positive things for its users as well.
Asyiq Maulana +2 more
doaj +1 more source
Evaluation of firewall performance when ranging a filtration rule set
This article is a continuation of a number of works devoted to evaluation of probabilistic-temporal characteristics of firewalls when ranging a filtration rule set.
Anatoly Y. Botvinko +1 more
doaj +1 more source
Delay Time Analysis of Reconfigurable Firewall Unit [PDF]
A firewall function is indispensable for mobile devices and it demands low-power operations. To realize this demand, the authors have developed a firewall unit with a reconfigurable device.
Tomoaki Sato +2 more
doaj
Improved Session Table Architecture for Denial of Stateful Firewall Attacks
Stateful firewalls keep track of the state of network connections. The performance of stateful firewalls depends mainly on the processing of session tables and the mechanism used for packet filtering.
Zouheir Trabelsi +3 more
doaj +1 more source
New requirements from the customers' and manufacturers' point of view such as adding new software functions during the product life cycle require a transformed architecture design for future vehicles.
Marcel Rumez +3 more
doaj +1 more source
Learning to Customize Network Security Rules
Security is a major concern for organizations who wish to leverage cloud computing. In order to reduce security vulnerabilities, public cloud providers offer firewall functionalities.
Ajay Piriya Vijaya Kumar Saroja (5597705) +4 more
core +6 more sources
A firewall is a device that is used generally to prevent cyberattacks and protect internal assets by blocking unauthorized access. Information security managers have many difficulties in managing firewall policies due to errors or anomalies in the policy
Jinyong Park +2 more
doaj +1 more source
Quantum entanglement of Hawking radiation has been supposed to give rise to a Planck density "firewall" near the event horizon of old black holes.
Abramowicz, M. A. +2 more
core +1 more source
Active router approach to defeating denial-of-service attacks in networks [PDF]
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core +1 more source

