Skip to search formSkip to main contentSkip to account menu

Firewall (computing)

Known as: Host-based firewall, Packet filtering, Firewall 
In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
We use holography to study sensitive dependence on initial conditions in strongly coupled field theories. Specifically, we mildly… 
Highly Cited
2013
Highly Cited
2013
General relativity contains solutions in which two distant black holes are connected through the interior via a wormhole, or… 
Highly Cited
2012
Highly Cited
2012
We argue that the following three statements cannot all be true: (i) Hawking radiation is in a pure state, (ii) the information… 
Highly Cited
2011
Highly Cited
2011
MPEG has recently finalized a new standard to enable dynamic and adaptive streaming of media over HTTP. This standard aims to… 
Review
2010
Review
2010
Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible… 
Highly Cited
2008
Highly Cited
2008
This article presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of… 
Highly Cited
2004
Highly Cited
2004
Skype is a peer-to-peer VoIP client developed in 2003 by the organization that created Kazaa. Skype claims that it can work… 
Highly Cited
2002
Highly Cited
2002
An integral part of modeling the global view of network security is constructing attack graphs. Manual attack graph construction… 
Review
2001
Review
2001
The process of categorizing packets into "flows" in an Internet router is called packet classification. All packets belonging to… 
Review
2000
Review
2000
Trust is an important aspect of decision making for Internet applications and particularly influences the specification of…