CCS   2000 Conference on Computer and Communications Security
Wall of Fame | Most Viewed CCS-2000 Paper
13 years 11 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source163
2Download preprint from source131
3Download preprint from source111
4Download preprint from source106
5Download preprint from source105
6Download preprint from source105
7Download preprint from source104
8Download preprint from source100
9Download preprint from source95
10Download preprint from source95
11Download preprint from source93
12Download preprint from source93
13Download preprint from source93
14Download preprint from source87
15Download preprint from source87
16Download preprint from source84
17Download preprint from source83
18Download preprint from source75