Kadhim et al., 2006
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Bellovin | Distributed firewalls | |
| US9832227B2 (en) | System and method for network level protection against malicious software | |
| US6182226B1 (en) | System and method for controlling interactions between networks | |
| EP1817685B1 (en) | Intrusion detection in a data center environment | |
| US20060026680A1 (en) | System and method of characterizing and managing electronic traffic | |
| Mahan et al. | Secure data transfer guidance for industrial control and SCADA systems | |
| Chopra | Security issues of firewall | |
| Abie | An overview of firewall technologies | |
| Kizza | Firewalls | |
| Cobb | Establishing firewall policy | |
| Oloyede et al. | Firewall Approach To Computer Network Security: Functional Viewpoint | |
| Wool | Packet filtering and stateful firewalls | |
| Weber | Firewall basics | |
| Kadhim et al. | Design and Implementation of a Proposal Network Firewall | |
| Kaplesh et al. | Firewalls: A study on Techniques, Security and Threats | |
| Meredith | A summary of the autonomic distributed firewalls (ADF) project | |
| Keromytis et al. | Designing firewalls: A survey | |
| Ozhiganova et al. | Functional model of firewall application layer protection for web-based information systems | |
| Patel et al. | IJDI-ERET | |
| Vasile | Firewall Technologies | |
| Pandikumar et al. | Data Security in LAN Using Distributed Firewall | |
| Etuk Effiong | CHECK POINT AS AN ALTERNATIVE TO ACCESS CONTROL LISTS IN MODERN NETWORK SECURITY | |
| Maiwada | Local Network Security Using Distributed Firewall | |
| Balakrishnan et al. | and Harish Sukumaran {lokesh, ksrini, vinodkk, chow, sharish}@ utdallas. edu Department of Computer Science University of Texas at Dallas | |
| Mustafa | Implement the packet filtering mechanism using the Dual-homed host architecture |