FIREWALL

作品数:231被引量:154H指数:6
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:罗宁李家春潘瑜朱海虹冯苗苗更多>>
相关机构:广州西麦科技股份有限公司北京邮电大学上海交通大学武汉大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家教育部博士点基金江苏省高校自然科学研究项目国家电子信息产业发展基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
RCCA-SM9:securing SM9 on corrupted machines
《Science China(Information Sciences)》2024年第11期102-116,共15页Rongmao CHEN Jinrong CHEN Xinyi HUANG Yi WANG 
supported by National Natural Science Foundation of China(Grant Nos.62122092,62032005)。
The SM9 identity-based encryption(IBE)scheme is a cryptographic standard used in China,and has been incorporated into the ISO/IEC standard in 2021.This work primarily proposes a countermeasure to secure the SM9 IBE sc...
关键词:SM9 subversion resilience subversion attack cryptographic reverse firewall RCCA 
Data Analysis of Network Parameters for Secure Implementations of SDN-Based Firewall
《Computers, Materials & Continua》2023年第11期1575-1598,共24页Rizwan Iqbal Rashid Hussain Sheeraz Arif Nadia Mustaqim Ansari Tayyab Ahmed Shaikh 
supported in part by the Research Committee of Hamdard University Karachi Pakistan(www.hamdard.edu.pk);the Office of Research Innovation&Commercialization(ORIC)of Dawood University of Engineering&Technology Karachi Pakistan(www.duet.edu.pk).
Software-Defined Networking(SDN)is a new network technology that uses programming to complement the data plane with a control plane.To enable safe connection,however,numerous security challenges must be addressed.Floo...
关键词:Software defined networking FIREWALL POX controller open v switch Mininet OpenFlow 
The Knowledge of Cyber-Security Vulnerabilities in an Institution of Higher and University Education. A Case of ISP-Bukavu (Institut Supérieur Pédagogique de Bukavu) (TTC = Teachers’ Training College)
《Journal of Computer and Communications》2023年第4期12-32,共21页Dominique Wasso Kiseki Vincent Havyarimana Therence Niyonsaba Désiré Lumonge Zabagunda Walumbuka Ilundu Wail Thabo Semong 
This study pursues the objective of analyzing and verifying the knowledge of the agents of the Institut Supérieur Pédagogique/ISP-Bukavu (TTC = Teachers’ training College) in relation to the practical flaws resulti...
关键词:Threats VULNERABILITIES Cybersecurity Anti-Spyware FIREWALL Cyber-Attack ANTIVIRUS 
Study of methods for endpoint aware inspection in a next generation firewall
《Cybersecurity》2022年第4期56-70,共15页Jenny Heino Antti Hakkala Seppo Virtanen 
Given the global increase in remote work with the COVID-19 pandemic and deperimeterization due to cloud deployment of next generation frewalls,the concept of a next generation firewall is at a breaking point.It is bec...
关键词:Network traffc Endpoint identification NGFW Endpoint aware inspection 
OpenEuler Linux系统防火墙技术辨析被引量:3
《网络安全和信息化》2022年第8期134-138,共5页吴刚 
针对Iptables和Firewalld两种防火墙的4种主要应用分别做了服务器允许指定客户端访问指定服务,NAT内网客户端访问外网服务器,外网客户端访问NAT内网服务器,单向Ping功能的实验验证,据此探讨和总结了两种防火墙的理论和配置区别。
关键词:LINUX系统 防火墙技术 客户端访问 FIREWALL Open NAT IPTABLES 内网服务器 
Intrusion detection and prevention system for an IoT environment被引量:4
《Digital Communications and Networks》2022年第4期540-551,共12页Ajay Kumar K.Abhishek M.R.Ghalib A.Shankar X.Cheng 
specific grant from any funding agency in public,commercial or not-for-profit sectors.
Internet of Things(IoT)security is the act of securing IoT devices and networks.IoT devices,including industrial machines,smart energy grids,and building automation,are extremely vulnerable.With the goal of shielding ...
关键词:IDS and IPS CLOUD FIREWALL Denial of service Smart environment Internet of things NBIPS 
开源NG Firewall网关安全防护实战
《网络安全和信息化》2022年第1期57-66,共10页顾武雄 
企业网络只要对外通信,信息安全威胁就可能随之而来。在众多信息安全管理方案中,边界安全的考虑与重要性肯定是第一位的。想要解决各式各样的边缘网络威胁,企业是否一定要投入庞大的IT预算才能够解决呢?那可不一定,因为在一定程度上,采...
关键词:信息安全威胁 边界安全 网络安全环境 FIREWALL 网关安全 程序包 对外通信 开源 
Analysis of Train Network Security Technology Based on Firewall
《外文科技期刊数据库(文摘版)工程技术》2022年第1期159-164,共6页XIAYitao LIShilei 
In the information age, computer network technology has made great progress. The Internet has become an indispensable part of the lives of hundreds of millions of Internet users. The problem of network security has ev...
关键词:FIREWALL network security TECHNOLOGY 
<i>Inmap-t</i>: Leveraging TTCN-3 to Test the Security Impact of Intra Network Elements
《Journal of Computer and Communications》2021年第6期174-190,共17页Antonino Vitale Marc Dacier 
This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of Sy...
关键词:TTCN-3 Network Security Conformance Testing Deep Packet Inspection FIREWALL 
A survey of edge computing-based designs for IoT security被引量:13
《Digital Communications and Networks》2020年第2期195-202,共8页Kewei Sha T.Andrew Yang Wei Wei Sadegh Davari 
This research has been supported by the National Science Foundation(under grant#1723596);the National Security Agency(under grant#H98230-17-1-0355).
Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physi...
关键词:Edge computing Internet of Things(IoT) SECURITY Architecture Secure protocols FIREWALL Intrusion detection Authentication AUTHORIZATION Privacy