Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Bastion host"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Trupti V Inamdar, R. M. Goudar
Publikováno v:
International Journal of Innovative Research in Computer and Communication Engineering. :7297-7300
Firewalls have become the most essential part that is deployed on the Internet for protecting the private networks. Optimizing firewall rules is very critical for enhancing the performance of a network. The early work on firewall optimization focuses
Publikováno v:
15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 178-184
STARTPAGE=178;ENDPAGE=184;TITLE=15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Trustcom/BigDataSE/ISPA
STARTPAGE=178;ENDPAGE=184;TITLE=15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Trustcom/BigDataSE/ISPA
© 2016 IEEE. Firewalls are important network devices which provide first hand defense against network threat. This level of defense is depended on firewall rules. Traditional firewalls, i.e., Cisco ACL, IPTABLES, Check Point and Juniper NetScreen fi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bfd7820018a378adba1bf66a68469df7
https://research.utwente.nl/en/publications/6f23290e-fb89-4049-8a53-ab11b195f6fa
https://research.utwente.nl/en/publications/6f23290e-fb89-4049-8a53-ab11b195f6fa
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Advanced Materials Research. :670-674
In management-type SaaS, user must be permitted to submit tenant’s business data on the SP's server, which may be embedded by the web-based malware. In this paper, we propose the automatic detecting method of web-based malware based on behavior ana
Publikováno v:
Security and Communication Networks. 4:136-146
In this paper we identify a potential Denial of Service (DoS) attack that targets the last-matching rules of the security policy of a firewall. The last-matching rules are those rules that are located at the bottom of the ruleset of a firewall's secu
Publikováno v:
2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).
Due to the extensive use of Internet there are many threats for the users. The threat may be any kind like hacking of the resource, entering of viruses or worms etc. Firewall is designed to protect the users from any kind of threat over the internet.
Autor:
Sagar Ajay Rahalkar
Publikováno v:
Certified Ethical Hacker (CEH) Foundation Guide ISBN: 9781484223246
Routers, switches, and hubs are some of the networking devices used to establish connectivity among networked devices. However, they don't provide much control over access and security. Securing the network requires special-purpose devices like intru
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::eb27a03e1709ea2be4095e2c9d917fee
https://doi.org/10.1007/978-1-4842-2325-3_13
https://doi.org/10.1007/978-1-4842-2325-3_13
Publikováno v:
ICST
Web application firewalls are an indispensable layer to protect online systems from attacks. However, the fast pace at which new kinds of attacks appear and their sophistication require that firewalls be updated and tested regularly as otherwise they
Publikováno v:
Journal of Computer Science. 1:290-295
Intranet often employ an Internet firewall to mitigate risks of system penetration, data theft, data destruction and other security breaches. Conventional Internet firewalls impose an overly simple inside vs. outside model of security that is incompa