Firewall Redundancy Rules Filtering Using Integrity Rules Checking
Securing your network plays a very crucial role in organizations, institutions, and personal home networks. A firewall is a first network defender that located at the entrance between a private network and the public network. Firewall had this job to monitor the arriving or leaving packet into and f...
| Main Authors: | Zarina, Dzolkhifli, Wan Nurul Safawati, Wan Manan, Mohd Hafiz, Mohd Hassin, Dhia Syafiqa, Mohd Jaafar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
American Scientific Publisher
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/19617/ http://umpir.ump.edu.my/id/eprint/19617/1/28.%20Firewall%20Redundancy%20Rules%20Filtering%20using%20Integrity%20Rules%20Checking1.pdf |
Similar Items
Pre-Fetch Data Caching Strategy in Mobile Database System for Integrity Constraints Checking
by: Zarina, Dzolkhifli, et al.
Published: (2015)
by: Zarina, Dzolkhifli, et al.
Published: (2015)
Tamper localization for medical images using cyclic redundancy check (CRC)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013)
Data Security Analysis with Advanced Firewall Filtering at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
Authorized Redundant Check Support in a Hybrid Cloud Environment
by: Durgadevi, ., et al.
Published: (2024)
by: Durgadevi, ., et al.
Published: (2024)
Rule-based automated design check for modular building
by: Sun, Yanhui, et al.
Published: (2019)
by: Sun, Yanhui, et al.
Published: (2019)
Simulated Annealing Based Strategy for Test Redundancy Reduction
by: Kamal Z., Zamli, et al.
Published: (2014)
by: Kamal Z., Zamli, et al.
Published: (2014)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
Isolated Iqlab checking rules based on speech recognition system
by: Yousfi, Bilal, et al.
Published: (2017)
by: Yousfi, Bilal, et al.
Published: (2017)
Combinatorial Rules Approach to Improve Priority Rules Scheduler in Grid Computing Environment
by: Zafril Rizal, M Azmi, et al.
Published: (2012)
by: Zafril Rizal, M Azmi, et al.
Published: (2012)
Firewalls offer stronger defences
Published: (2008)
Published: (2008)
Checking cat diseases symptoms system using rule-based technique
by: Nur Idayu, Samat
Published: (2010)
by: Nur Idayu, Samat
Published: (2010)
Tracing Significant Association Rules Using Critical Least Association Rules Model
by: Zailani, Abdullah, et al.
Published: (2013)
by: Zailani, Abdullah, et al.
Published: (2013)
Data caching framework and strategies for integrity constraint checking in mobile database system
by: Dzolkhifli, Zarina
Published: (2012)
by: Dzolkhifli, Zarina
Published: (2012)
Travel budget recommendation system by using rule-based filtering / Nor Anis Arina Zafie
by: Zafie, Nor Anis Arina
Published: (2020)
by: Zafie, Nor Anis Arina
Published: (2020)
Holy Qur'an speech recognition system Imaalah checking rule for warsh recitation
by: Yousfi, Bilal, et al.
Published: (2017)
by: Yousfi, Bilal, et al.
Published: (2017)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
A Benchmarking Methodology for NPU-Based Stateful Firewall
by: Lee, Eng Kean, et al.
Published: (2003)
by: Lee, Eng Kean, et al.
Published: (2003)
Design Rule Check To Validate Option Metal And Via For A Preprogrammed Layout Design
by: Oothayer Kumar, Sureindra Kumar
Published: (2014)
by: Oothayer Kumar, Sureindra Kumar
Published: (2014)
Governance and new rules relating to directors
by: Wan Zahari, Wan Mohd Zulhafiz
Published: (2016)
by: Wan Zahari, Wan Mohd Zulhafiz
Published: (2016)
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005)
by: Ding, Khoon Chong
Published: (2005)
On the use of fuzzy rule interpolation techniques for monotonic multi-input fuzzy rule base models
by: Tay, Kai Mei, et al.
Published: (2009)
by: Tay, Kai Mei, et al.
Published: (2009)
Formal Semantics of Dynamic Constraints and Derivation Rules in ORM
by: Balsters, Herman, et al.
Published: (2016)
by: Balsters, Herman, et al.
Published: (2016)
WLAR-Viz: Weighted least association rules visualization
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
An Integrated Firewall System Model In A Multiclient-Server Environment
by: Al-Kazwini, Hussein A. Taqi
Published: (2005)
by: Al-Kazwini, Hussein A. Taqi
Published: (2005)
Mastering the new corporate finance rules-rights and accountability; rules and process
by: Mohd. Sulaiman, Aiman @ Nariman
Published: (2016)
by: Mohd. Sulaiman, Aiman @ Nariman
Published: (2016)
Simplication of boolean function based on simplification rules
by: Chin, Kui Fern
Published: (2003)
by: Chin, Kui Fern
Published: (2003)
A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility
by: Muthu Anbananthen, Kalaiarasi Sonai, et al.
Published: (2012)
by: Muthu Anbananthen, Kalaiarasi Sonai, et al.
Published: (2012)
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Study of FSKKP portal based on Shneidermanâs eight golden rules
by: Ooi Boon, Khuan
Published: (2013)
by: Ooi Boon, Khuan
Published: (2013)
3-L model: a model for checking the integrity constraints of mobile databases
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
Characterizing business rules for practical information systems
by: Carver, Andrew, et al.
Published: (2011)
by: Carver, Andrew, et al.
Published: (2011)
Design and Implementation of an XML Firewall
by: Loh, Yin-soon, et al.
Published: (2006)
by: Loh, Yin-soon, et al.
Published: (2006)
Bandwidth Management for Intranets Using Multicast Firewalls
by: Tat, Chee Wan, et al.
Published: (2000)
by: Tat, Chee Wan, et al.
Published: (2000)
Selecting A Cyclic Redundancy Check (CRC) Generator Polynomial for CEH (CRC Extension Header).
by: Supriyanto, Supriyanto, et al.
Published: (2009)
by: Supriyanto, Supriyanto, et al.
Published: (2009)
Traditional medical assistance using forward chaining
Rule-Based System / Wan Mohamad Kamil Wan Salim
by: Wan Salim, Wan Mohamad Kamil
Published: (2020)
by: Wan Salim, Wan Mohamad Kamil
Published: (2020)
Car Rental System With Rule Based Technique
by: Chin, Hong Jie
Published: (2022)
by: Chin, Hong Jie
Published: (2022)
Integrated mobile zakat Melaka using rule based / Ahmad Zakwan Azizan
by: Azizan, Ahmad Zakwan
Published: (2017)
by: Azizan, Ahmad Zakwan
Published: (2017)
Similar Items
-
Pre-Fetch Data Caching Strategy in Mobile Database System for Integrity Constraints Checking
by: Zarina, Dzolkhifli, et al.
Published: (2015) -
Tamper localization for medical images using cyclic redundancy check (CRC)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013) -
Data Security Analysis with Advanced Firewall Filtering at PT PUSRI
by: Misinem, ., et al.
Published: (2024) -
Authorized Redundant Check Support in a Hybrid Cloud Environment
by: Durgadevi, ., et al.
Published: (2024) -
Rule-based automated design check for modular building
by: Sun, Yanhui, et al.
Published: (2019)