Firewall Redundancy Rules Filtering Using Integrity Rules Checking
Securing your network plays a very crucial role in organizations, institutions, and personal home networks. A firewall is a first network defender that located at the entrance between a private network and the public network. Firewall had this job to monitor the arriving or leaving packet into and f...
Saved in:
Main Authors: | Zarina, Dzolkhifli, Wan Nurul Safawati, Wan Manan, Mohd Hafiz, Mohd Hassin, Dhia Syafiqa, Mohd Jaafar |
---|---|
Format: | Article |
Language: | English |
Published: |
American Scientific Publisher
2018
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/19617/1/28.%20Firewall%20Redundancy%20Rules%20Filtering%20using%20Integrity%20Rules%20Checking1.pdf http://umpir.ump.edu.my/id/eprint/19617/ https://doi.org/10.1166/asl.2018.12957 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Pre-Fetch Data Caching Strategy in Mobile Database System for Integrity Constraints Checking
by: Zarina, Dzolkhifli, et al.
Published: (2015) -
Tamper localization for medical images using cyclic redundancy check (CRC)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013) -
Rule-based filtering algorithm for textual document
by: Jamil, Nurul Syafidah, et al.
Published: (2017) -
Prototype system of personal firewall
by: Lau, Sei Ping
Published: (2003) -
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)