• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 38,001
Next 10 →

Table VI. The firewall for deletion of a member function.

in SUMMARY
by Y. K. Jang, M. Munro, Y. R. Kwon

TABLE III FUNCTIONAL DISCREPANCIES BETWEEN THE TWO FIREWALLS DESIGNED BY TEAM A AND B

in Diverse firewall design
by Alex X. Liu, Mohamed G. Gouda 2004
Cited by 8

Table 1. SOPC Firewall Modules

in An Extensible, System-on-Programmable-Chip, Content-Aware Internet Firewall
by John W. Lockwood, Christopher Neely, Christopher Zuver, James Moscola, Sarang Dharma, David Lim 2003
"... In PAGE 6: ... One such module blocks patterns of TCP Synchronize/Acknowledge (SYN/ACK) packets charac- teristic of a DoS attacks. Other extensible functions that have been implemented as modules that fit into the SOPC firewall are listed in Table1 [9] [10]. The set of features in the firewall is only limited by the size of the FPGA.... ..."
Cited by 15

Table 2: Firewall rules

in ABSTRACT OF THE
by Patrik Salmela, Professur Telekommunikationsprogramvara, Övervakare Docent, Pekka Nik 2005
"... In PAGE 9: ...able 1: Evaluation criteria....................................................................................................42 Table2 : Firewall rules .... In PAGE 103: ... Regardless of which of the hosts initiates the connection, the HIP proxy will interfere. The HIP base exchange packets will be properly forwarded by the proxy, since firewall rule 2, Table2 , Chapter 5, states that they should be forwarded. However, the first ESP packet sent by the legacy host will be diverted to the HIP proxy, following firewall rule 10, Table 2.... In PAGE 103: ... The HIP base exchange packets will be properly forwarded by the proxy, since firewall rule 2, Table 2, Chapter 5, states that they should be forwarded. However, the first ESP packet sent by the legacy host will be diverted to the HIP proxy, following firewall rule 10, Table2 . When the proxy examines the source and destination addresses, it notices that there are no SAs for the connection.... ..."

Table 1- The firewall configuration in the example

in Modeling and Analyzing Network Vulnerabilities via a Logic-Based Approach
by Hamid Reza Shahriari, Rasool Jalili
"... In PAGE 4: ... The firewall is configured such that only web and mail services are available from the external network. Table1 depicts the firewall rules. Table 1- The firewall configuration in the example ... ..."
Cited by 1

Table 3. Class firewall size.

in Constructing Precise Object Relation Diagrams
by Ana Milanova, Atanas Rountev, Barbara G. Ryder 2002
"... In PAGE 8: ... Class firewalls com- puted from a more precise ORD contain fewer classes. The first two columns in Table3 show the average class firewall sizes for our benchmarks. For each user class in a program, we calculated the size of its firewall.... ..."
Cited by 6

Table 3. Class firewall size.

in Constructing Precise Object Relation Diagrams
by Ana Milanova, Atanas Rountev, Barbara G. Ryder 2002
"... In PAGE 8: ... Class firewalls com- puted from a more precise ORD contain fewer classes. The first two columns in Table3 show the average class firewall sizes for our benchmarks. For each user class in a program, we calculated the size of its firewall.... ..."
Cited by 6

Table 3. Class firewall size.

in Constructing precise object relation diagrams
by Ana Milanova, Atanas Rountev, Barbara G. Ryderdepartment, Computer Science 2002
"... In PAGE 8: ... Class firewalls com- puted from a more precise ORD contain fewer classes. The first two columns in Table3 show the average class firewall sizes for our benchmarks. For each user class in a program, we calculated the size of its firewall.... ..."
Cited by 6

Table 2. Firewall Filters and Actions

in The OASIS Group at U.C. Berkeley: Research Summary and Future Directions Document Scope
by George Porter, Mel Tsai, Li Yin, Randy Katz 2003
"... In PAGE 7: ... The disadvantage of encoding rules like this is that it becomes difficult to parallelize rule classification over a set of different rules. Table2 lists some example classification filters and actions common in firewalls. Intelligent Storage Storage Area Networks (SANs) consist of a collection of SCSI disks connected together through a fast interconnect, typically Fibre Channel.... ..."

Table 2. Firewall Filters and Actions

in The OASIS Group at U.C. Berkeley: Research Summary and Future Directions Document Scope
by George Porter, Mel Tsai, Li Yin, Y Katz 2003
"... In PAGE 7: ... The disadvantage of encoding rules like this is that it becomes difficult to parallelize rule classification over a set of different rules. Table2 lists some example classification filters and actions common in firewalls. Intelligent Storage Storage Area Networks (SANs) consist of a collection of SCSI disks connected together through a fast interconnect, typically Fibre Channel.... ..."
Next 10 →
Results 1 - 10 of 38,001
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University