Endpoint Firewall for Local Security Hardening in Academic Research Environment
暂无分享,去创建一个
[1] Octavian Rusu,et al. Analysis and prevention of network password guessing attacks in an enterprise environment , 2014, 2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference.
[2] Grzegorz Czajkowski,et al. Multitasking without compromise: a virtual machine evolution , 2001, SIGP.
[3] Avishai Wool,et al. Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese , 2010, IEEE Internet Computing.
[4] Dawei Wang,et al. Memory-Efficient Hypercube Flow Table for Packet Processing on Multi-Cores , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[5] Jin Qian,et al. The TCP Split Handshake: Practical Effects on Modern Network Equipment , 2010, Netw. Protoc. Algorithms.
[6] Gabi Dreo Rodosek,et al. Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 , 2013, CSS.
[7] Michael Hamelin. Preventing firewall meltdowns , 2010, Netw. Secur..
[8] Xiangjian He,et al. Improving cloud network security using the Tree-Rule firewall , 2014, Future Gener. Comput. Syst..
[9] P. Winne,et al. Feedback and Self-Regulated Learning: A Theoretical Synthesis , 1995 .
[10] Sandeep K. Singhal,et al. Designing an academic firewall: policy, practice, and experience with SURF , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[11] Marcel Waldvogel,et al. SIEGE: Service-independent enterprise-grade protection against password scans , 2014, DFN-Forum Kommunikationstechnologien.
[13] Depei Qian,et al. Multi-agent based intrusion detection architecture , 2001, Proceedings 2001 International Conference on Computer Networks and Mobile Computing.
[14] Abhishek Agrawal,et al. Artificial intelligent firewall , 2011, ACAI '11.
[15] Richard Cimler,et al. Cloud based solution for mobile healthcare application , 2014, IDEAS.
[16] Zhi Chen,et al. A New Lookup Model for Multiple Flow Tables of Open Flow with Implementation and Optimization Considerations , 2014, 2014 IEEE International Conference on Computer and Information Technology.
[17] Sun-Hyung Kim,et al. A Study on the Integrated Security System based Real-time Network Packet Deep Inspection , 2014 .
[18] Ehab Al-Shaer,et al. Dynamic rule-ordering optimization for high-speed firewall filtering , 2006, ASIACCS '06.