@article{(Open Science Index):https://publications.waset.org/pdf/10357,
	  title     = {Description and Analysis of Embedded Firewall Techniques},
	  author    = {Ahmed Abou Elfarag and  A. Baith M. and  Hassan H. Alkhishali},
	  country	= {},
	  institution	= {},
	  abstract     = {With the turn of this century, many researchers
started showing interest in Embedded Firewall (EF) implementations.
These are not the usual firewalls that are used as checkpoints at network gateways. They are, rather, applied near those hosts that need protection. Hence by using them, individual or grouped network
components can be protected from the inside as well as from external attacks.
This paper presents a study of EF-s, looking at their architecture and problems. A comparative study assesses how practical each kind is. It particularly focuses on the architecture, weak points, and
portability of each kind. A look at their use by different categories of users is also presented.},
	    journal   = {International Journal of Computer and Information Engineering},
	  volume    = {3},
	  number    = {10},
	  year      = {2009},
	  pages     = {2405 - 2410},
	  ee        = {https://publications.waset.org/pdf/10357},
	  url   	= {https://publications.waset.org/vol/34},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 34, 2009},
	}