Distributed firewall

Results: 118



#Item
31Computer network security / Cyberwarfare / Internet standards / Data security / Firewall / Wireless sensor network / Border Gateway Protocol / Anycast / Transmission Control Protocol / Network architecture / Computing / Internet

Toward Understanding Distributed Blackhole Placement Evan Cooke, Michael Bailey, Z. Morley Mao, Danny McPherson David Watson, Farnam Jahanian University of Michigan Arbor Networks

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-11-02 14:39:14
32Internet Relay Chat / Cyberwarfare / Videotelephony / Ident / Distributed firewall / Firewall / Skype / Denial-of-service attack / Secure Shell / Software / Computing / Computer network security

Delegating Network Security with More Information Jad Naous Ryan Stutsman Stanford University

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-09-12 02:13:18
33Network architecture / Denial-of-service attack / Traffic classification / Peer-to-peer / IP traceback / Packet switching / Distributed firewall / IP address spoofing / Flooding / Computer network security / Computing / Internet

A Framework for A Collaborative DDoS Defense George Oikonomou, Jelena Mirkovic University of Delaware oikonomo,

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2006-11-28 14:29:34
34Firewall / Computing / Computer security / Distributed firewall / Application firewall / Computer network security / Security / Cyberwarfare

Copyright 2003 AT&T and Lumeta. All Rights Reserved. Notice: For personal use only. These materials may not be reproduced or distributed in any form or by any means except that they may be downloaded from this source

Add to Reading List

Source URL: www.wilyhacker.com.

Language: English - Date: 2004-11-16 15:11:46
35Data / Information / XACML / Security policy / Datalog / Maximum flow problem / Flow network / Distributed firewall / SQL / Computing / Network flow / Query languages

Practical Declarative Network Management Timothy Hinrichs Natasha Gude Martin Casado

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 22:02:42
36Network architecture / Firewall / Network switch / Load balancing / Distributed firewall / Virtual LAN / Deep packet inspection / Computer network security / Computing / Middlebox

A Policy-aware Switching Layer for Data Centers Dilip A. Joseph [removed] Arsalan Tavakoli [removed]

Add to Reading List

Source URL: ccr.sigcomm.org

Language: English - Date: 2008-07-23 12:32:55
37System software / Firewall / Stateful firewall / Distributed firewall / Common Address Redundancy Protocol / Replication / Deep packet inspection / Netfilter / Check Point VPN-1 / Computer network security / Computing / Computer security

Demystifying cluster-based fault-tolerant Firewalls P. Neira, R.M. Gasca L. Lef`evre

Add to Reading List

Source URL: 1984.lsi.us.es

Language: English - Date: 2010-01-12 07:22:00
38Cyberwarfare / Security / Denial-of-service attack / Radware / Application firewall / Network security / Application security / Botnet / Intrusion prevention system / Computer network security / Computer security / Computing

DefensePro Data Sheet DefensePro: DDoS Protection and Attack Mitigation Protect the Data Center and Network Against Emerging Network Threats In today’s info-security threat landscape, denial of service and distributed

Add to Reading List

Source URL: www.radware.com

Language: English - Date: 2015-04-14 15:45:14
39Hyper-V / Windows Server / Hypervisor / Proxy server / VM / Trusted Computing / Embedded hypervisor / Virtual firewall / System software / Software / Computer networking

“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten Schwan Georgia Tech Information Security Center & Center for Expe

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-09 17:34:04
40Software / Inter-process communication / Distributed Component Object Model / Windows Vista / Windows Firewall / Component Object Model / User Account Control / Microsoft Windows / Windows / Computing / Component-based software engineering / Software engineering

DCOM – Secure by Default

Add to Reading List

Source URL: www.kepware.com

Language: English - Date: 2015-02-17 10:49:24
UPDATE