نتایج جستجو برای: clustring and firewall

تعداد نتایج: 16827414  

Journal: :IJDTIS 2011
Afolayan A. Obiniyi Ezugwu E. Absalom Mohammed Dikko

With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Ne...

2004
Fanglu Guo Tzi-cker Chiueh

Computer network is already an indispensable part of our modern life. To keep our network run smoothly, we need to know its condition. This calls for the necessity of analyzing the traffic (packets) on the network. In this paper, we investigate traffic analysis techniques need in stateful firewall and network intrusion detection system (NIDS). Stateful firewall analyzes packets up to their laye...

1999
Roger Knobbe Andrew Purtell Stephen Schwab

The TIS Labs Advanced Security Proxies (ASP) project is investigating software architectures for highperformance firewalls to enable the secure use of next generation networks. The project objective is to demonstrate an architecture and implementation in which protocol-specific proxies control when data transmission is allowed across the firewall, but which allows the proxy a range of options i...

2013
Achim D. Brucker Lukas Brügger Burkhart Wolff

The HOL-TestGen environment is conceived as a system for modeling and semi-automated test generation with an emphasis on expressive power and generality. However, its underlying technical framework Isabelle/HOL supports the customization as well as the development of highly automated add-ons working in specific application domains. In this paper, we present HOL-TestGen/fw, an add-on for the tes...

2008
TUGKAN TUGLULAR

Private access to corporate servers from Internet can be achieved using various security mechanisms. This article presents a network access control mechanism that employs a policy management architecture empowered with dynamic firewalls. With the existence of such an architecture, system and/or network administrators do not need to reconfigure firewalls when there is a location change in user s...

Journal: :International Journal of Computer Applications 2013

2011
Dariusz Palka Marek Zachara

The paper discusses selected issues related to the implementation and deployment of the Web Application Firewall that protects the target application by verifying the incoming requests and their parameters through matching them against recorded usage patterns. These patterns in turn are learned from the traffic generated by the users of the application. Since many web applications, including th...

2011
Sayali Gadre

IN traditional cancer diagnosis, pathologists examine biopsies to make diagnostic assessments largely based on cell morphology and tissue distribution. However, this is subjective and often leads to considerable variability. On the other hand, computational diagnostic tools enable objective judgments by making use of quantitative measures. This paper presents steps in autoamted cancer diagnosis...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید