|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 762 occurrences of 447 keywords
|
|
|
Results
Found 1260 publication records. Showing 1260 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
203 | Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H. H. Ngu |
Firewall Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 8th International Conference, OPODIS 2004, Grenoble, France, December 15-17, 2004, Revised Selected Papers, pp. 197-212, 2004, Springer, 3-540-27324-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Firewall Queries, Network Security, Firewalls |
188 | Alex X. Liu, Mohamed G. Gouda |
Firewall Policy Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 20(6), pp. 766-777, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
145 | Alex X. Liu, Eric Torng, Chad R. Meiners |
Firewall Compressor: An Algorithm for Minimizing Firewall Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 176-180, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
142 | Kristen Accardi, Tony Bock, Frank T. Hady, Jon Krueger |
Network processor acceleration for a Linux* netfilter firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2005 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, ANCS 2005, Princeton, New Jersey, USA, October 16-18, 2005, pp. 115-123, 2005, ACM, 1-59593-082-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
hybrid firewall, network firewall, prototype, throughput, network processor, netfilter |
134 | Mohamed G. Gouda, Alex X. Liu |
A Model of Stateful Firewalls and Its Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings, pp. 128-137, 2005, IEEE Computer Society, 0-7695-2282-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
120 | Alex X. Liu |
Formal Verification of Firewall Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1494-1498, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
111 | Ehab Al-Shaer |
Managing firewall and network-edge security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS (1) ![In: Managing Next Generation Convergence Networks and Services, IEEE/IFIP Network Operations and Management Symposium, NOMS 2004, Seoul, Korea, 19-23 April 2004, Proceedings, pp. 926, 2004, IEEE, 0-7803-8230-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
111 | Charles Payne, Tom Markham |
Architecture and Applications for a Distributed Embedded Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 329-336, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
101 | Alex X. Liu, Mohamed G. Gouda |
Diverse Firewall Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June - 1 July 2004, Florence, Italy, Proceedings, pp. 595-604, 2004, IEEE Computer Society, 0-7695-2052-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
101 | Mohamed G. Gouda, Alex X. Liu |
Firewall Design: Consistency, Completeness, and Compactness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 24th International Conference on Distributed Computing Systems (ICDCS 2004), 24-26 March 2004, Hachioji, Tokyo, Japan, pp. 320-327, 2004, IEEE Computer Society, 0-7695-2086-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
99 | Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne |
Domain and Type Enforcement Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 122-132, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP |
98 | Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca |
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II, pp. 130-144, 2009, Springer, 978-3-642-02456-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ruleset, framework, language, firewall, acl |
98 | Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool |
Firmato: A novel firewall management toolkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 22(4), pp. 381-420, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
model definition language, visualization, management, Security policy, firewall |
92 | Sergio Pozo, Rafael Ceballos, Rafael M. Gasca |
AFPL, an Abstract Language Model for Firewall ACLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part II, pp. 468-483, 2008, Springer, 978-3-540-69840-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ruleset, model, access control, language, firewalls, acl |
92 | Alain J. Mayer, Avishai Wool, Elisha Ziskind |
Offline firewall analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(3), pp. 125-144, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security anagment, Network Security, Internet Protocol (IP), Packet Filtering |
92 | Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab Al-Shaer |
Analysis of Firewall Policy Rules Using Data Mining Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: Management of Integrated End-to-End Communications and Services, 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, Canada, April 3-7, 2006. Proceedings, pp. 305-315, 2006, IEEE, 1-4244-0143-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
88 | Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov |
Revealing hidden context: improving mental models of personal firewall users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009, 2009, ACM, 978-1-60558-736-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
configuration, firewall, mental model, usable security |
86 | Hrishikesh B. Acharya, Mohamed G. Gouda |
Linear-Time Verification of Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009. ICNP 2009, Princeton, NJ, USA, 13-16 October 2009, pp. 133-140, 2009, IEEE Computer Society, 978-1-4244-4634-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
85 | Christoph L. Schuba, Eugene H. Spafford |
A Reference Model for Firewall Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 133-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
firewall technology, technological aspect, specialized engineering solution, firewall systems, integrity assurance, centralized security policy, authentication, access control, audit, reference model, computer network management, networking technologies, communications security |
82 | Alex X. Liu, Mohamed G. Gouda |
Diverse Firewall Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 19(9), pp. 1237-1251, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
82 | Zobeideh Aliannezhadi, Mohammad Abdollahi Azgomi |
Modeling and Analysis of a Web Service Firewall Using Coloured Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 548-553, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
82 | Yiwen Liang, Wenjun Deng |
Verify Consistency between Security Policy and Firewall Policy with Answer Set Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (1) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 1: Artificial Intelligence, December 12-14, 2008, Wuhan, China, pp. 196-200, 2008, IEEE Computer Society, 978-0-7695-3336-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
82 | Alex X. Liu |
Change-Impact Analysis of Firewall Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 155-170, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
82 | Michael Ihde, William H. Sanders |
Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood Tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2006 International Conference on Dependable Systems and Networks (DSN 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings, pp. 209-216, 2006, IEEE Computer Society, 0-7695-2607-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
82 | Niklas Steinleitner, Henning Peters, Xiaoming Fu 0001 |
Implementation and Performance Study of a New NAT/Firewall Signaling Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 4-7 July 2006, Lisboa, Portugal, pp. 8, 2006, IEEE Computer Society, 0-7695-2541-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
82 | Errin W. Fulp |
An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 292-301, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
82 | Yuan-ni Guo, Renfa Li |
Design and Performance of Firewall System Based on Embedded Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 992-995, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
82 | Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool |
Firmato: A Novel Firewall Management Toolkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1999 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 9-12, 1999, pp. 17-31, 1999, IEEE Computer Society, 0-7695-0176-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
79 | Baba Piprani |
Using ORM-Based Models as a Foundation for a Data Quality Firewall in an Advanced Generation Data Warehouse (Extended Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Data Semantics ![In: Journal on Data Semantics XI, pp. 94-125, 2008, Springer, 978-3-540-92147-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data quality firewall, advanced generation data warehouse, data quality assessment, data quality threshold, conceptual schema, ORM |
79 | Bin Zhang 0007, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher |
Specifications of a high-level conflict-free firewall policy language for multi-domain networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 185-194, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
firewall, policy language, conflicts free |
79 | Jun Xu 0014, Mukesh Singhal |
Design of a High-Performance ATM Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(3), pp. 269-294, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
asynchronous transfer mode, TCP/IP, firewall, packet filtering, switch architecture |
76 | Robert N. Smith, Sourav Bhattacharya |
A Protocol and Simulation for Distributed Communicating Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 23rd International Computer Software and Applications Conference (COMPSAC '99), 27-19 October 1999, Phoenix, AZ, USA, pp. 74-79, 1999, IEEE Computer Society, 0-7695-0368-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Firewall Cascade, Firewall Leak, Simulation, Java, Fault-Tolerance, Network Security, Emulation, Firewall, Security Management |
75 | Xin Li |
NSIS-Based Firewall Detection in Mobile IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 698-702, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Next Steps in Signaling (NSIS), Firewall Detection, Firewall Traversal, Mobile IPv6 |
75 | Lee J. White, Khaled Jaber, Brian Robinson |
Utilization of Extended Firewall for Object-Oriented Regression Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 21st IEEE International Conference on Software Maintenance (ICSM 2005), 25-30 September 2005, Budapest, Hungary, pp. 695-698, 2005, IEEE Computer Society, 0-7695-2368-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Firewall Regression Testing, Extended Firewall Testing, Object-Oriented Software Testing |
75 | Julie L. Connolly |
Operation chain link: the deployment of a firewall at Hanscom Air Force Base. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 170-177, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
operation chain link, Hanscom Air Force Base, Electronic Systems Center, unclassified network, Internet threats, network security assessments, hacker break-in, firewall development team, firewall deployment, security management, military computing |
73 | Yinong Chen, Zhongshi He |
Simulating Highly Dependable Applications in a Distributed Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 36th Annual Simulation Symposium (ANSS-36 2003), Orlando, Florida, USA, March 30 - April 2, 2003, pp. 101-108, 2003, IEEE Computer Society, 0-7695-1911-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Distributed system, load balancing, firewall, task allocation, queuing |
72 | Sven Ehlert, Ge Zhang, Thomas Magedanz |
Increasing SIP firewall performance by ruleset size limitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, 15-18 September 2008, Cannes, French Riviera, France, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
72 | Jerry Cheng, Hao Yang 0004, Starsky H. Y. Wong, Petros Zerfos, Songwu Lu |
Design and Implementation of Cross-Domain Cooperative Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the IEEE International Conference on Network Protocols, ICNP 2007, October 16-19, 2007, Beijing, China, pp. 284-293, 2007, IEEE Computer Society, 1-4244-1588-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
72 | Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer |
FireCracker: A Framework for Inferring Firewall Policies using Smart Probing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the IEEE International Conference on Network Protocols, ICNP 2007, October 16-19, 2007, Beijing, China, pp. 294-303, 2007, IEEE Computer Society, 1-4244-1588-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
72 | Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li |
An Automated Framework for Validating Firewall Policy Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 151-160, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
72 | Weiping Wang 0006, Wenhui Chen, Zhepeng Li, Huaping Chen 0001 |
Comparison Model and Algorithm for Distributed Firewall Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Computational Intelligence, International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Proceedings, Part II, pp. 545-556, 2006, Springer, 3-540-37274-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Yoshio Tanaka, Motonori Hirano, Mitsuhisa Sato, Hidemoto Nakada, Satoshi Sekiguchi |
Performance Evaluation of a Firewall-Compliant Globus-based Wide-Area Cluster System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the Ninth IEEE International Symposium on High Performance Distributed Computing, HPDC'00, Pittsburgh, Pennsylvania, USA, August 1-4, 2000., pp. 121-128, 2000, IEEE Computer Society, 0-7695-0783-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
70 | Khalil Abdullah, James E. Kimble Jr., Lee J. White |
Correcting for unreliable regression integration testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: Proceedings of the International Conference on Software Maintenance, ICSM 1995, Opio (Nice), France, October 17-20, 1995, pp. 232-241, 1995, IEEE Computer Society, 0-8186-7141-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
unreliable regression integration testing, firewall concept, error cases, firewall construction, software maintenance, statistical analysis, program testing, unit testing, control flow, integration testing |
69 | Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov |
Towards improving mental models of personal firewall users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009, pp. 4633-4638, 2009, ACM, 978-1-60558-247-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
configuration, firewall, mental model, usable security |
69 | Dong-Young Lee, Hyung-Jin Lim, Tai-Myoung Chung |
A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (5) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V, pp. 655-664, 2006, Springer, 3-540-34079-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Integrated Security Management, Secure MIB, Agent, Firewall, SNMP |
64 | Samuel Patton, David Doss, William Yurcik |
Open Source Versus Commercial Firewalls: Functional Comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 223-224, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
corporate applications, commercial firewalls, security risks, Cisco, IOS firewall feature set, Internet, Internet, open source, open source software, open systems, network operating systems, authorisation, telecommunication security, virtual private network, business communication, Linux operating system |
64 | Yoshio Tanaka, Mitsuhisa Sato, Motonori Hirano, Hidemoto Nakada, Satoshi Sekiguchi |
Resource Manager for Globus-Based Wide-Area Cluster Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCC ![In: International Workshop on Cluster Computing (IWCC '99), 2-3 December 1999, Melbourne, Australia, pp. 237-, 1999, IEEE Computer Society, 0-7695-0343-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Wide-area Cluster Computing, Firewall, Globus, Cluster Systems, Global Computing |
63 | Gajanan S. Jedhe, Arun Ramamoorthy, Kuruvilla Varghese |
A Scalable High Throughput Firewall in FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 16th IEEE International Symposium on Field-Programmable Custom Computing Machines, FCCM 2008, 14-15 April 2008, Stanford, Palo Alto, California, USA, pp. 43-52, 2008, IEEE Computer Society, 978-0-7695-3307-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Lihua Yuan, Jianning Mai, Zhendong Su 0001, Hao Chen 0003, Chen-Nee Chuah, Prasant Mohapatra |
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 199-213, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
63 | Ehab Al-Shaer, Hazem H. Hamed, Raouf Boutaba, Masum Hasan |
Conflict classification and analysis of distributed firewall policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 23(10), pp. 2069-2084, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Pankaj N. Parmar, Priya Rajagopal, Ravi Sahita |
Protocol Decode Based Stateful Firewall Policy Definition Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 7-9 June 2004, Yorktown Heights, NY, USA, pp. 201-, 2004, IEEE Computer Society, 0-7695-2141-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
63 | Wei T. Yue, Amitava Bagchi |
Tuning the Quality Parameters of a Firewall to Maximize Net Benefit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDC ![In: Distributed Computing - IWDC 2003, 5th International Workshop, Kolkata, India, December 27-30, 2003, Proceedings, pp. 321-329, 2003, Springer, 3-540-20745-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
63 | Yongyuth Permpoontanalarp, Chaiwat Rujimethabhas |
A Unified Methodology for Verification and Synthesis of Firewall Configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 328-339, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
63 | Michael R. Lyu, Lorrien K. Y. Lau |
Firewall Security: Policies, Testing and Performance Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 24th International Computer Software and Applications Conference (COMPSAC 2000), 25-28 October 2000, Taipei, Taiwan, pp. 116-121, 2000, IEEE Computer Society, 0-7695-0792-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
59 | Chi-Shih Chao |
A Visualized Internet Firewall Rule Validation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Managing Next Generation Networks and Services, 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007, Proceedings, pp. 364-374, 2007, Springer, 978-3-540-75475-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Firewall security consistency, Rule anomalies, Policy-based network security management, System visualization |
59 | Ying Qiu, Feng Bao 0001, Jianying Zhou 0001 |
Firewall for Dynamic IP Address in Mobile IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 467-479, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Mobile IP6, Firewall |
59 | Daniel Hoffman, Kevin Yoo |
Blowtorch: a framework for firewall test automation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), November 7-11, 2005, Long Beach, CA, USA, pp. 96-103, 2005, ACM, 1-58113-993-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
network firewall, production grammar, automated testing, covering array, capture/replay |
59 | Alain J. Mayer, Avishai Wool, Elisha Ziskind |
Fang: A Firewall Analysis Engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000, pp. 177-187, 2000, IEEE Computer Society, 0-7695-0665-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Vulnerability Testing, Network Security, Firewall |
58 | Subrata Acharya, Jia Wang 0001, Zihui Ge, Taieb Znati, Albert G. Greenberg |
Simulation Study of Firewalls to Aid Improved Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2-6 April 2006, Huntsville, Alabama, USA, pp. 18-26, 2006, IEEE Computer Society, 0-7695-2559-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Robert N. Smith, Sourav Bhattacharya |
Operating firewalls outside the LAN perimeter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the IEEE International Performance Computing and Communications Conference, IPCCC 1999, Phoenix/Scottsdale, Arizona, USA, 10-12 February 1999, pp. 493-498, 1999, IEEE, 0-7803-5258-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
56 | Robert N. Smith, Sourav Bhattacharya |
Firewall placement in a large network topology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 29-31 October 1997, Tunis, Tunisia, Proceedings, pp. 40-45, 1997, IEEE Computer Society, 0-8186-8153-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
firewall placement heuristics, large network topology, multi-user distributed information environment, firewall cascade, potential attack point, comprehensive security protection, end-to-end security protection, simulation, performance, network security, completeness, authorisation, operations research, cost optimization, delay minimization, sensitive data, confidence degree |
53 | Wang Yu-gang, Ge Yin-mao, Yang Jian-xin |
Research on Packet Filter Rules of the Firewall Based on Visual Prolog. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (1) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 1: Artificial Intelligence, December 12-14, 2008, Wuhan, China, pp. 739-742, 2008, IEEE Computer Society, 978-0-7695-3336-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Grzegorz J. Nalepa |
A Unified Firewall Model for Web Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWIC ![In: Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25 - 27, 2007, pp. 248-253, 2007, Springer, 978-3-540-72574-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Sebastian Felis, Martin Stiemerling |
Securing a Path-Coupled NAT/Firewall Signaling Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPOM ![In: IP Operations and Management, 7th IEEE International Workshop, IPOM 2007, San José, USA, October 31 - November 2, 2007, Proceedings, pp. 61-72, 2007, Springer, 978-3-540-75852-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Charles C. Zhang, Marianne Winslett, Carl A. Gunter |
On the Safety and Efficiency of Firewall Policy Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 33-50, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Richard Clayton 0001, Steven J. Murdoch, Robert N. M. Watson |
Ignoring the Great Firewall of China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 20-35, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Antonio Theophilo Costa, Markus Endler, Renato Cerqueira |
Evaluation of Three Approaches for CORBA Firewall/NAT Traversal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE, OTM Confederated International Conferences, CoopIS, DOA, and ODBASE 2005, Agia Napa, Cyprus, October 31 - November 4, 2005, Proceedings, Part II, pp. 923-940, 2005, Springer, 3-540-29738-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Utz Roedig, Jens B. Schmitt |
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 38-51, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Ana-Maria Ghiran, Gheorghe Cosmin Silaghi, Nicolae Tomai |
Ontology-Based Tools for Automating Integration and Validation of Firewall Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIS ![In: Business Information Systems, 12th International Conference, BIS 2009, Poznan, Poland, April 27-29, 2009. Proceedings, pp. 37-48, 2009, Springer, 978-3-642-01189-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
firewall management, Ontologies, rule-based reasoning |
50 | Achim D. Brucker, Lukas Brügger, Burkhart Wolff |
Model-Based Firewall Conformance Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TestCom/FATES ![In: Testing of Software and Communicating Systems, 20th IFIP TC 6/WG 6.1 International Conference, TestCom 2008, 8th International Workshop, FATES 2008, Tokyo, Japan, June 10-13, 2008, Proceedings, pp. 103-118, 2008, Springer, 978-3-540-68514-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Model-based Testing, Firewall, Conformance Testing, Security Testing |
50 | Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca |
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 229-236, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
consistency, diagnosis, firewall, conflict, acl, rule set |
50 | Christopher P. Lee 0001, Jason Trost, Nicholas Gibbs, Raheem A. Beyah, John A. Copeland |
Visual Firewall: Real-time Network Security Monito. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 16, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
firewall configuration, snort monitoring, user interfaces, information visualization, Network security |
50 | Jung-Seuk Lee, Jun-Cheol Jeon, Kee-Young Yoo |
A security scheme for protecting security policies in firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(2), pp. 69-72, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security policy, firewall, ubiquitous environment, cryptographic algorithm |
48 | Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee 0001, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim |
Towards complete node enumeration in a peer-to-peer botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 23-34, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
infected hosts enumeration, storm, P2P, botnet |
48 | Michael R. Horvath, Errin W. Fulp, Patrick S. Wheeler |
Policy Distribution Methods for Function Parallel Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 17th International Conference on Computer Communications and Networks, IEEE ICCCN 2008, St. Thomas, U.S. Virgin Islands, August 3-7, 2008, pp. 620-625, 2008, IEEE, 978-1-4244-2390-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Livio Riciulli |
Advanced networks - High speed firewalls: securing the 10 gigabit ethernet WAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC ![In: Proceedings of the ACM/IEEE SC2006 Conference on High Performance Networking and Computing, November 11-17, 2006, Tampa, FL, USA, pp. 286, 2006, ACM Press, 0-7695-2700-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Tugkan Tuglular, Özgür Kaya, Can Arda Muftuoglu, Fevzi Belli |
Directed Acyclic Graph Modeling of Security Policies for Firewall Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 393-398, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Firewall Policies, Firewall Testing, Firewalls, Directed Acyclic Graphs, Security Testing, Event Sequence Graphs |
44 | Venanzio Capretta, Bernard Stepien, Amy P. Felty, Stan Matwin |
Formal correctness of conflict detection for firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 22-30, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
firewall, coq |
44 | Wan-Jik Lee, Seok-Yeol Heo, Tae Young Byun, Young-Ho Sohn, Ki Jun Han |
A Secure Packet Filtering Mechanism for Tunneling over Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICESS ![In: Embedded Software and Systems, [Third] International Conference, ICESS 2007, Daegu, Korea, May 14-16, 2007, Proceedings, pp. 641-652, 2007, Springer, 978-3-540-72684-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Firewall, Tunneling, Packet Filtering, Netfilter |
44 | Alex X. Liu, Mohamed G. Gouda |
Complete Redundancy Detection in Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, pp. 193-206, 2005, Springer, 3-540-28138-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Redundant Rules, Network Security, Firewall |
44 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo |
On Securing RTP-Based Streaming Content with Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 304-319, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
streaming content, Network security, firewall |
44 | Ehab Al-Shaer, Adel El-Atawy, Taghrid Samak |
Automated pseudo-live testing of firewall configuration enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 27(3), pp. 302-314, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Shann-Chiuen Wu, Yung-Chung Ku, Tzao-Lin Lee |
Zero-Configuration Personal Firewall for DLNA DMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 847-850, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | JeeHyun Hwang, Tao Xie 0001, Fei Chen 0001, Alex X. Liu |
Systematic Structural Testing of Firewall Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), Napoli, Italy, October 6-8, 2008, pp. 105-114, 2008, IEEE Computer Society, 978-0-7695-3410-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Sergio Pozo, Rafael Ceballos, Rafael M. Gasca |
CSP-Based Firewall Rule Set Diagnosis using Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 723-729, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Chaokai He |
Design and implementation of a personal firewall Based on NDIS Intermediate Drivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 878-882, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Hazem H. Hamed, Ehab Al-Shaer |
Dynamic rule-ordering optimization for high-speed firewall filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 332-342, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Baba Piprani |
Using ORM-Based Models as a Foundation for a Data Quality Firewall in an Advanced Generation Data Warehouse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part II, pp. 1148-1159, 2006, Springer, 3-540-48273-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham |
Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, pp. 15-29, 2006, Springer, 3-540-36796-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Network Security, Security Policy, Firewalls, Anomalies, Packet Filters |
44 | Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu, Alessandra Russo |
Using Argumentation Logic for Firewall Policy Specification and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Large Scale Management of Distributed Systems, 17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2006, Dublin, Ireland, October 23-25, 2006, Proceedings, pp. 185-196, 2006, Springer, 3-540-47659-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Kun Bai, Peng Liu 0005 |
Towards Database Firewall: Mining the Damage Spreading Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 449-462, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Ke Zhang, Naiqi Liu, Yan Chen |
The Design of Firewall Based on Intel IXP2350 and Autopartitioning Mode C. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICESS ![In: Embedded Software and Systems, Second International Conference, ICESS 2005, Xi'an, China, December 16-18, 2005, Proceedings, pp. 726-731, 2005, Springer, 3-540-30881-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Pavan Verma, Atul Prakash 0001 |
FACE: A Firewall Analysis and Configuration Engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January - 4 February 2005, Trento, Italy, pp. 74-81, 2005, IEEE Computer Society, 0-7695-2262-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Se-Chang Son, Bill Allcock, Miron Livny |
CODO: firewall traversal by cooperative on-demand opening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 14th IEEE International Symposium on High Performance Distributed Computing, HPDC-14, Research Triangle Park, North Carolina, USA, 24-27 July 2005, pp. 233-242, 2005, IEEE Computer Society, 0-7803-9037-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Willy Susilo, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang |
Personal Firewall for Pocket PC 2003: Design & Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 661-666, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Gengsheng Zheng, Zhiping Xie, Bo Wang 0007, Guiming He |
A New Tunnel Scheme for Multimedia Communications Traversing NAT/Firewall in NGN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2005), 5-8 December 2005, Dalian, China, pp. 171-173, 2005, IEEE Computer Society, 0-7695-2405-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Avishai Wool |
A Quantitative Study of Firewall Configuration Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 37(6), pp. 62-67, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Mark L. Green, Steven M. Gallo, Russ Miller |
Grid-Enabled Virtual Organization Based Dynamic Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 5th International Workshop on Grid Computing (GRID 2004), 8 November 2004, Pittsburgh, PA, USA, Proceedings, pp. 208-216, 2004, IEEE Computer Society, 0-7695-2256-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
44 | John W. Lockwood, Christopher E. Neely, Christopher K. Zuver, James Moscola, Sarang Dharmapurikar, David Lim |
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field Programmable Logic and Application, 13th International Conference, FPL 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings, pp. 859-868, 2003, Springer, 3-540-40822-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Whe Dar Lin |
A Firewall Approach to Personal Knowledge System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBMS ![In: 16th IEEE Symposium on Computer-Based Medical Systems (CBMS 2003), 26-27 June 2003, New York, NY, USA, pp. 295-300, 2003, IEEE Computer Society, 0-7695-1901-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1260 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|