Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,798,536 papers from all fields of science
Search
Sign In
Create Free Account
Firewall (computing)
Known as:
Host-based firewall
, Packet filtering
, Firewall
Expand
In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Centrino
Cisco 12000
Cisco MARS
Cloud testing
Expand
Broader (2)
Cyberwarfare
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Black holes and the butterfly effect
S. Shenker
,
D. Stanford
Journal of High Energy Physics
2013
Corpus ID: 54184366
We use holography to study sensitive dependence on initial conditions in strongly coupled field theories. Specifically, we mildly…
Expand
Highly Cited
2013
Highly Cited
2013
Cool horizons for entangled black holes
J. Maldacena
,
L. Susskind
2013
Corpus ID: 119115470
General relativity contains solutions in which two distant black holes are connected through the interior via a wormhole, or…
Expand
Highly Cited
2012
Highly Cited
2012
Black holes: complementarity or firewalls?
Ahmed Almheiri
,
D. Marolf
,
J. Polchinski
,
J. Sully
Journal of High Energy Physics
2012
Corpus ID: 55581818
We argue that the following three statements cannot all be true: (i) Hawking radiation is in a pure state, (ii) the information…
Expand
Highly Cited
2011
Highly Cited
2011
The MPEG-DASH Standard for Multimedia Streaming Over the Internet
I. Sodagar
IEEE Multimedia
2011
Corpus ID: 14431014
MPEG has recently finalized a new standard to enable dynamic and adaptive streaming of media over HTTP. This standard aims to…
Expand
Review
2010
Review
2010
The management of security in Cloud computing
Sumant Ramgovind
,
M. Eloff
,
Elme Smith
Information Security for South Africa
2010
Corpus ID: 12274022
Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible…
Expand
Highly Cited
2008
Highly Cited
2008
EXE: Automatically Generating Inputs of Death
Cristian Cadar
,
Vijay Ganesh
,
Peter M. Pawlowski
,
D. Dill
,
D. Engler
TSEC
2008
Corpus ID: 10905673
This article presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of…
Expand
Highly Cited
2004
Highly Cited
2004
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
Salman Baset
,
H. Schulzrinne
Proceedings IEEE INFOCOM . 25TH IEEE…
2004
Corpus ID: 370766
Skype is a peer-to-peer VoIP client developed in 2003 by the organization that created Kazaa. Skype claims that it can work…
Expand
Highly Cited
2002
Highly Cited
2002
Automated generation and analysis of attack graphs
Oleg Sheyner
,
J. Haines
,
S. Jha
,
R. Lippmann
,
Jeannette M. Wing
Proceedings IEEE Symposium on Security and…
2002
Corpus ID: 8378169
An integral part of modeling the global view of network security is constructing attack graphs. Manual attack graph construction…
Expand
Review
2001
Review
2001
Algorithms for packet classification
Pankaj Gupta
,
N. McKeown
IEEE Network
2001
Corpus ID: 17406119
The process of categorizing packets into "flows" in an Internet router is called packet classification. All packets belonging to…
Expand
Review
2000
Review
2000
A survey of trust in internet applications
T. Grandison
,
M. Sloman
IEEE Communications Surveys and Tutorials
2000
Corpus ID: 9240891
Trust is an important aspect of decision making for Internet applications and particularly influences the specification of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required