Showing 1 - 10 results of 10 for search 'Firewall (networking)', query time: 0.05s Refine Results
  1. 1

    Network Firewall Dynamics and the Subsaturation Stabilization of HIV by Bilal Khan, Kirk Dombrowski, Mohamed Saad, Katherine McLean, Samuel Friedman

    Published 2013-01-01
    “…We confirm the spontaneous emergence of network firewalls in the system and reveal their structural role in the nonspreading of HIV.…”
    Get full text
    Article
  2. 2

    APPLYING SOME MATCHING ALGORITHMS FOR SEQUENCE IGNATURE TO ANALYZE AND DETECT ENTRIES INTO SYSTEM NETWORKS by Pham Nguyen Huy Phuong, Dang Le Nam

    Published 2013-06-01
    “…Nowadays, developing and evaluating pattern matching algorithms for the identification of network-attack has been constantly evolving. In this paper, the pattern matching algorithms is deployed by emulating forms of network attacks on intrusion detection system together with firewall IOS/I PS. …”
    Get full text
    Article
  3. 3

    Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices by Andrea Baiocchi, Gianluca Maiolini, Annachiara Mingo, Daniele Goretti

    Published 2015-01-01
    “…Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. …”
    Get full text
    Article
  4. 4

    Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering by Khafidzun Fadli, Achmad Basuki, Eko Setiawan

    Published 2020-05-01
    “… Keamanan pada Local Area Network (LAN) sekarang ini adalah masalah serius yang harus diperhatikan. …”
    Get full text
    Article
  5. 5

    A SURVEY OF NETWORK SERVICE LOG PROCESSING PLATFORMS AND TECHNIQUES FOR THE DETECTION OF INFORMATION INSECURITY RISKS by Phạm Duy Lộc, Hoàng Xuân Dậu

    Published 2018-07-01
    “…In the layers of information security measures, the monitoring and detection measures of anomalous activities and information insecurity risks are considered the second defense layer behind firewalls and access controls. This defense layer includes intrusion detection and prevention systems for hosts and networks. …”
    Get full text
    Article
  6. 6

    Research on new energy power plant network traffic anomaly detection method based on EMD by Danni Liu, Shengda Wang, YutongLi, Ji Du, Jia Li

    Published 2025-01-01
    “…Methodology This research propose Network Quality Assessment (NQA) traffic management algorithms to prevent illegal access and data breaches, this involves strong security measures such as encryption, firewalls, and encrypted communication methods. …”
    Get full text
    Article
  7. 7

    Analisis Perilaku Entitas untuk Pendeteksian Serangan Internal Menggunakan Kombinasi Model Prediksi Memori dan Metode PCA by Rahmat - Budiarto, Yanif Dwi Kuntjoro

    Published 2023-12-01
    “…Fending off attacks from outside the institutional or organizational network is relatively easier than fending off cybercrime attacks from within the network. …”
    Get full text
    Article
  8. 8

    PCIU: Hardware Implementations of an Efficient Packet Classification Algorithm with an Incremental Update Capability by O. Ahmed, S. Areibi, K. Chattha, B. Kelly

    Published 2011-01-01
    “…Packet classification plays a crucial role for a number of network services such as policy-based routing, firewalls, and traffic billing, to name a few. …”
    Get full text
    Article
  9. 9

    Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment by Alanoud Al Mazroa, Fahad R. Albogamy, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-01-01
    “…Cyberattack recognition and mitigation techniques in CPSs include using numerous models like intrusion detection systems (IDSs), access control mechanisms, encryption, and firewalls. Cyberattack detection employing deep learning (DL) contains training neural networks to identify patterns indicative of malicious actions within system logs or network traffic, allowing positive classification and mitigation of cyber-attacks. …”
    Get full text
    Article
  10. 10

    Development of multi-agent information security management system by I. P. Khavina, Yu. V. Hnusov, O. O. Mozhaiev

    Published 2022-12-01
    “…Now there are security analysis systems, for example, that examine the security elements settings of workstations and servers operating systems, analyze the network topology, look for unprotected network connections, examine the settings of firewalls. …”
    Get full text
    Article