Search Results

    ArticlesSee all articles results »

    From journals and magazines

    1. Survey on Unified Threat Management (UTM) Systems for Home Networks

      by Siddiqui, Asif; Reisslein, Martin; Rimal, Bhaskar P. and Wang, Yong

      Ieee Communications Surveys And Tutorials, Volume 26, Issue 4, pp. 2459 - 2509

      Journal Article : Full Text Online

    2. SUTMS: Designing a Unified Threat Management System for Home Networks

      by Siddiqui, Asif; Reisslein, Martin; Rimal, Bhaskar P.; Gc, Deepak and Wang, Yong

      Ieee Access, Volume 12, pp. 80930 - 80949

      Journal Article : Full Text Online

    3. Hybrid mechanism towards network packet early acceptance and rejection for unified threat (...)

      by Masud, Mohammad M; Trabelsi, Zouheir and Zeidan, Safaa

      Iet Information Security, Volume 11, Issue 2, pp. 104 - 113

      Journal Article : Full Text Online

    See all 952 Articles results

    Back to results navigation

    Books & MediaSee all books & media results »

    Books, music, movies and more

    1. UTM security with Fortinet : Mastering FortiOS

      Kenneth Tam ...[et al.].

      Book : View Online

    2. Automated security management

      Ehab Al-Shaer, Xinming Ou, Geoffrey Xie, editors.

      Book : View Online

    3. Microsoft Unified XDR and SIEM Solution Handbook : Modernize and Build a Unified SOC Platform (...)

      Raghu Boddu, Sami Lamppu, and Rod Trent.

      Book : View Online

    See all 144 Books & Media results

    Back to results navigation


    Our WebsiteSee all website results »

    Guides, policies, news more

    1. https://sites.fuqua.duke.edu/fordlibrary/page/20/

      In Eggers’ novel, the Circle is the name of the company that replaces Google, Facebook, Twitter with one unified corporation that (...)

    2. Scholarly Communications @ Duke - Page 28 of 58 - Discussions about the changing world of scholarly

      I’m not sure its authors were really thinking that one through; they just saw OA as a threat and moved to postpone it for 12 months, to (...)

    3. Scholarly Communications @ Duke - Discussions about the changing world of scholarly communications a

      But it’s clear that author-initiated sharing, viewed collectively, is seen as a real threat to that business model. I’m hopeful that (...)

    See all 4 website results

    Back to results navigation


    Manuscript Collections

    Find books, manuscripts, and archive materials from Rubenstein Library


    Collection Guides

    Detailed inventories of archival collections

    No Collection Guides results found for Unified threat management

    Try another search »

    Try another search »

    Archival Materials

    Manuscripts and archival materials

    No Archival Materials results found for Unified threat management

    Try another search »

    Try another search »


    Some materials and descriptions may include offensive content. More info

    More Search Options