|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8 occurrences of 7 keywords
|
|
|
Results
Found 23 publication records. Showing 23 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
147 | Daniel Hoffman, Durga Prabhakar, Paul A. Strooper |
Testing iptables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 2003 conference of the Centre for Advanced Studies on Collaborative Research, October 6-9, 2003, Toronto, Ontario, Canada, pp. 80-91, 2003, IBM. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
IP |
124 | Yong Du, Daniel Hoffman |
PBit -- A Pattern-Based Testing Framework for iptables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 19-21 May 2004, Fredericton, N.B., Canada, pp. 107-112, 2004, IEEE Computer Society, 0-7695-2096-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Jorge Herrerías Guerrero, Roberto Gómez Cárdenas |
An example of communication between security tools: iptables - snort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 39(3), pp. 34-43, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Linux |
33 | Eric Flior, Tychy Anaya, Cory Moody, Mohsen Beheshti, Jianchao Han, Kazimierz Kowalski |
A Knowledge-Based System Implementation of Intrusion Detection Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 738-742, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Corvid, iptables, See5, Expert System, Linux |
33 | Douglas E. Ennis, Divyangi Anchan, Mahmoud Pegah |
The front line battle against P2P. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 101-106, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IPTables, log parsing tool, log server, peer-to-peer software, snortsam, intrusion detection, firewall, router, snort |
32 | Md Fahad Monir, Azwad Fawad Hasan |
Exploring SDN Based Firewall and NAPT: A Comparative Analysis with Iptables and OVS in Mininet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (4) ![In: Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 4, pp. 436-447, 2024, Springer, 978-3-031-57915-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
32 | Cimone Wright-Hamor, Steffanie Bisinger, Jeffrey Neel, Benjamin A. Blakely, Nathaniel Evans |
A Preventative Moving Target Defense Solution for Web Servers Using Iptables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Science ![In: Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media, Cyber Science 2022, Wales, UK, June 20-21, 2022, pp. 191-205, 2022, Springer, 978-981-19-6414-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Sebastiano Miano, Matteo Bertrone, Fulvio Risso, Mauricio Vásquez Bernal, Yunsong Lu, Jianwen Pi |
Securing Linux with a faster and scalable iptables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 49(3), pp. 2-17, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Cornelius Diekmann, Lars Hupel, Julius Michaelis, Max W. Haslbeck, Georg Carle |
Verified iptables Firewall Analysis and Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Autom. Reason. ![In: J. Autom. Reason. 61(1-4), pp. 191-242, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Matteo Bertrone, Sebastiano Miano, Fulvio Risso, Massimo Tumolo |
Accelerating Linux Security with eBPF iptables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM Posters and Demos ![In: Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, SIGCOMM 2018, Budapest, Hungary, August 20-25, 2018, pp. 108-110, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Gerardo Canfora, Antonio Pirozzi, Aaron Visaggio |
s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017., pp. 462-467, 2017, SciTePress, 978-989-758-259-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Luca Petrucci, Marco Bonola, Salvatore Pontarelli, Giuseppe Bianchi 0001, Roberto Bifulco |
Implementing iptables using a programmable stateful data plane abstraction: Demo. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSR ![In: Proceedings of the Symposium on SDN Research, SOSR 2017, Santa Clara, CA, USA, April 3-4, 2017, pp. 193-194, 2017, ACM, 978-1-4503-4947-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Cornelius Diekmann, Julius Michaelis, Max W. Haslbeck, Georg Carle |
Verified iptables firewall analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: 2016 IFIP Networking Conference, Networking 2016 and Workshops, Vienna, Austria, May 17-19, 2016, pp. 252-260, 2016, IEEE Computer Society, 978-3-9018-8283-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Mike Rash |
IDS Signature Matching with iptables, psad, and fwsnort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 32(6), 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
32 | Robert M. Marmorstein, Phil Kearns |
A Tool for Automated iptables Firewall Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Annual Technical Conference, FREENIX Track ![In: Proceedings of the FREENIX Track: 2005 USENIX Annual Technical Conference, April 10-15, 2005, Anaheim, CA, USA, pp. 71-81, 2005, USENIX. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
32 | Robert M. Marmorstein, Phil Kearns |
An Open Source Solution for Testing NAT'd and Nested iptables Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 19th Conference on Systems Administration (LISA 2005), December 4-9, 2005, San Diego, California, USA, pp. 103-112, 2005, USENIX. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
32 | Gregor N. Purdy |
Linux iptables - pocket reference: firewalls, nat and accounting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2004 |
RDF |
|
23 | Massimo Marchi, Romeo Penzo, Alessandro Provetti |
Policy-Based Parametric Firewall Configuration: A Real-Case Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 276, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Wu-chi Feng, Edward C. Kaiser, A. Luu |
Design and implementation of network puzzles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 2372-2382, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Kwangsun Ko, Eun-kyung Cho, Taekeun Lee, Yong-hyeog Kang, Young Ik Eom |
The Abnormal Traffic Control Framework Based on QoS Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2004, 19th International Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings, pp. 167-175, 2004, Springer, 3-540-23526-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Mark L. Green, Steven M. Gallo, Russ Miller |
Grid-Enabled Virtual Organization Based Dynamic Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 5th International Workshop on Grid Computing (GRID 2004), 8 November 2004, Pittsburgh, PA, USA, Proceedings, pp. 208-216, 2004, IEEE Computer Society, 0-7695-2256-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Bernd Podey, Thomas Kessler, Hans-Dietrich Melzer |
Network Packet Filter Design and Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Enhanced Internet Services International Conference, ICOIN 2003, Cheju Island, Korea, February 12-14, 2003, Revised Selected Papers, pp. 803-816, 2003, Springer, 3-540-40827-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | George Lawton |
Open Source Security: Opportunity or Oxymoron? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 35(3), pp. 18-21, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #23 of 23 (100 per page; Change: )
|
|