Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
126 | Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani |
Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 318-325, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
failed accesses, Access control, role-based access control, role mining, misconfigurations |
113 | Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim, Darrell Newcomb |
Detecting network-wide and router-specific misconfigurations through data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 17(1), pp. 66-79, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
static analysis, network management, error detection, association rules mining |
113 | Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim, Darrell Newcomb |
Minerals: using data mining to detect router misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 2nd Annual ACM Workshop on Mining Network Data, MineNet 2006, Pisa, Italy, September 15, 2006, pp. 293-298, 2006, ACM, 1-59593-569-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network misconfiguration, static analysis, association rules mining, routers |
88 | Sihyung Lee, Tina Wong, Hyong S. Kim |
Netpiler: detection of ineffective router configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 27(3), pp. 291-301, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
78 | Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein |
Brief announcement: strong detection of misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, PODC 2005, Las Vegas, NV, USA, July 17-20, 2005, pp. 40, 2005, ACM, 1-58113-994-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
strong detection, routing, anomaly detection, distance-vector, misconfiguration |
74 | Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala |
Misconfigurations discovery between distributed security components using the mobile agent approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 663-668, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomalies detection system (IDS), intra/inter-components anomalies detection, static agent, mobile agents, firewalls, misconfigurations |
70 | Khalid El-Arini, Kevin S. Killourhy |
Bayesian detection of router configuration anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 1st Annual ACM Workshop on Mining Network Data, MineNet 2005, Philadelphia, Pennsylvania, USA, August 26, 2005, pp. 221-222, 2005, ACM, 1-59593-026-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
router configuration, statistical anomaly detection |
66 | Vasileios Pappas, Zhiguo Xu, Songwu Lu, Daniel Massey, Andreas Terzis, Lixia Zhang 0001 |
Impact of configuration errors on DNS robustness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 2004, Portland, Oregon, USA, pp. 319-330, 2004, ACM, 1-58113-862-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
resiliency, DNS, misconfigurations |
61 | Lujo Bauer, Scott Garriss, Michael K. Reiter |
Detecting and resolving policy misconfigurations in access-control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 185-194, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Lihua Yuan, Jianning Mai, Zhendong Su 0001, Hao Chen 0003, Chen-Nee Chuah, Prasant Mohapatra |
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 199-213, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Vasileios Pappas, Duane Wessels, Daniel Massey, Songwu Lu, Andreas Terzis, Lixia Zhang 0001 |
Impact of configuration errors on DNS robustness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 27(3), pp. 275-290, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | William Formyduval |
Integrating static analysis and testing for firewall policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2009, October 25-29, 2009, Orlando, Florida, USA, pp. 749-750, 2009, ACM, 978-1-60558-768-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
firewall policies, test generation, firewalls |
35 | HaiYing Liang, Guowen Teng, Hongjun Wang, Yuan Gao |
Detecting BGP Misconfiguration for BGP/MPLS VPNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2005), 5-8 December 2005, Dalian, China, pp. 168-170, 2005, IEEE Computer Society, 0-7695-2405-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Vladimir Brik, Jesse Stroik, Suman Banerjee 0001 |
Debugging DHCP performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, IMC 2004, Taormina, Sicily, Italy, October 25-27, 2004, pp. 257-262, 2004, ACM, 1-58113-821-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
performance, measurement, tools, experimentation, DHCP |
35 | Ratul Mahajan, David Wetherall, Thomas E. Anderson |
Understanding BGP misconfiguration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 19-23, 2002, Pittsburgh, PA, USA, pp. 3-16, 2002, ACM, 1-58113-570-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Francesco Minna, Fabio Massacci, Katja Tuma |
Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.09537, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Zhehui Zhang, Yanbing Liu, Qianru Li, Zizheng Liu, Chunyi Peng 0001, Songwu Lu |
Dependent Misconfigurations in 5G/4.5G Radio Resource Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACMNET ![In: PACMNET 1(CoNEXT1), pp. 2:1-2:20, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Akond Rahman, Shazibul Islam Shamim, Dibyendu Brinto Bose, Rahul Pandita |
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 32(4), pp. 99:1-99:36, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Salil Purandare, Urjoshi Sinha, Md Nafee Al Islam, Jane Cleland-Huang, Myra B. Cohen |
Self-Adaptive Mechanisms for Misconfigurations in Small Uncrewed Aerial Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEAMS ![In: 18th IEEE/ACM Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2023, Melbourne, Australia, May 15-16, 2023, pp. 169-180, 2023, IEEE, 979-8-3503-1192-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Shulin Zhou, Zhijie Jiang, Shanshan Li 0001, Xiaodong Liu 0004, Zhouyang Jia, Yuanliang Zhang, Jun Ma 0015, Haibo Mi |
WMWatcher: Preventing Workload-Related Misconfigurations in Production Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 30th Asia-Pacific Software Engineering Conference, APSEC 2023, Seoul, Republic of Korea, December 4-7, 2023, pp. 279-288, 2023, IEEE, 979-8-3503-4417-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | James Guffey, Yanyan Li |
Cloud Service Misconfigurations: Emerging Threats, Enterprise Data Breaches and Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCWC ![In: 13th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2023, Las Vegas, NV, USA, March 8-11, 2023, pp. 806-812, 2023, IEEE, 979-8-3503-3286-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Areeg Samir, Abdo Ali A. Al-Wosabi, Mohsin Khan, Håvard D. Johansen |
A Multi-pronged Self-adaptive Controller for Analyzing Misconfigurations for Kubernetes Clusters and IoT Edge Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOCC ![In: Service-Oriented and Cloud Computing - 10th IFIP WG 6.12 European Conference, ESOCC 2023, Larnaca, Cyprus, October 24-25, 2023, Proceedings, pp. 153-169, 2023, Springer, 978-3-031-46234-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Areeg Samir, Håvard D. Johansen |
Adaptive Controller to Identify Misconfigurations and Optimize the Performance of Kubernetes Clusters and IoT Edge Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOCC ![In: Service-Oriented and Cloud Computing - 10th IFIP WG 6.12 European Conference, ESOCC 2023, Larnaca, Cyprus, October 24-25, 2023, Proceedings, pp. 170-187, 2023, Springer, 978-3-031-46234-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Salvatore Manfredi, Mariano Ceccato, Giada Sciarretta, Silvio Ranise |
Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable Mitigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. ![In: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(1), pp. 56-86, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Thijs van Ede, Niek Khasuntsev, Bas Steen, Andrea Continella |
Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCSW ![In: Proceedings of the 2022 on Cloud Computing Security Workshop, CCSW 2022, Los Angeles, CA, USA, 7 November 2022, pp. 63-74, 2022, ACM, 978-1-4503-9875-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Jianqi Du, Fenghao Xu, Chennan Zhang, Zidong Zhang, Xiaoyin Liu, Pengcheng Ren, Wenrui Diao, Shanqing Guo, Kehuan Zhang |
Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECON ![In: 19th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2022, Stockholm, Sweden, September 20-23, 2022, pp. 343-351, 2022, IEEE, 978-1-6654-8643-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Christopher Steven Timperley, Tobias Dürschmid, Bradley R. Schmerl, David Garlan, Claire Le Goues |
ROSDiscover: Statically Detecting Run-Time Architecture Misconfigurations in Robotics Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSA ![In: 19th IEEE International Conference on Software Architecture, ICSA 2022, Honolulu, HI, USA, March 12-15, 2022, pp. 112-123, 2022, IEEE, 978-1-6654-1728-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Christopher Steven Timperley, Tobias Dürschmid, Bradley R. Schmerl, David Garlan, Claire Le Goues |
ROSDiscover: Statically Detecting Run-Time Architecture Misconfigurations in Robotics Systems : Artifact Paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSA Companion ![In: IEEE 19th International Conference on Software Architecture Companion, ICSA Companion 2022, Honolulu, HI, USA, March 12-15, 2022., pp. 56, 2022, IEEE, 978-1-6654-9494-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Jialu Zhang 0002, Ruzica Piskac, Ennan Zhai, Tianyin Xu |
Static detection of silent misconfigurations with deep interaction analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 5(OOPSLA), pp. 1-30, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Sergio Loureiro |
Security misconfigurations and how to prevent them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2021(5), pp. 13-16, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Yu Zhang 0095, Yani Ge, Peiran Yu, Jianzhong Zhang 0003, Yongzheng Zhang 0002, Thar Baker |
A Novel Method to Prevent Misconfigurations of Industrial Automation and Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 17(6), pp. 4210-4218, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Salvatore Manfredi, Mariano Ceccato, Giada Sciarretta, Silvio Ranise |
Do Security Reports Meet Usability?: Lessons Learned from Using Actionable Mitigations for Patching TLS Misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021, pp. 141:1-141:13, 2021, ACM, 978-1-4503-9051-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Chengcheng Xiang |
Detecting Access Control Misconfigurations with Change Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
26 | Rahul Krishna, Md Shahriar Iqbal, Mohammad Ali Javidian, Baishakhi Ray, Pooyan Jamshidi |
CADET: A Systematic Method For Debugging Misconfigurations using Counterfactual Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2010.06061, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
26 | Andrew Robert, Apaar Gupta, Vinayak Shenoy, Dinkar Sitaram, Subramaniam Kalambur |
Predicting Hadoop misconfigurations using machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Pract. Exp. ![In: Softw. Pract. Exp. 50(7), pp. 1168-1183, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Siva Kesava Reddy K., Alan Tang, Ryan Beckett, Karthick Jayaraman, Todd D. Millstein, Yuval Tamir, George Varghese |
Finding Network Misconfigurations by Automatic Template Inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSDI ![In: 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020, Santa Clara, CA, USA, February 25-27, 2020., pp. 999-1013, 2020, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
26 | Chengcheng Xiang, Haochen Huang, Andrew Yoo, Yuanyuan Zhou 0001, Shankar Pasupathy |
PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Annual Technical Conference ![In: 2020 USENIX Annual Technical Conference, USENIX ATC 2020, July 15-17, 2020, pp. 265-280, 2020, USENIX Association, 978-1-939133-14-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
26 | Wejdene Saied, Adel Bouhoula |
A Formal Approach for Automatic Detection and Correction of SDN Switch Misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSM ![In: 16th International Conference on Network and Service Management, CNSM 2020, Izmir, Turkey, November 2-6, 2020, pp. 1-5, 2020, IEEE, 978-3-903176-31-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Yousra Javed, Mohamed Shehab |
Visual Analysis of Photo Policy Misconfigurations Using Treemaps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1903.02612, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
26 | Anderson Santos da Silva, Alberto Schaeffer-Filho |
ARMOR: An Architecture for Diagnosis and Remediation of Network Misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: 2019 IEEE Symposium on Computers and Communications, ISCC 2019, Barcelona, Spain, June 29 - July 3, 2019, pp. 1-6, 2019, IEEE, 978-1-7281-2999-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig |
Investigating System Operators' Perspective on Security Misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, pp. 1272-1289, 2018, ACM, 978-1-4503-5693-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Yuichiro Tateiwa, Naohisa Takahashi |
Design of Program Analysis Based Approach for Narrowing Down Misconfigurations in Beginner Network Construction Exercises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018, Krakow, Poland, May 16-18, 2018, pp. 807-814, 2018, IEEE Computer Society, 978-1-5386-2195-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Amina Saâdaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula |
Automated and Optimized Formal Approach to Verify SDN Access-Control Misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRIDENTCOM ![In: Testbeds and Research Infrastructures for the Development of Networks and Communications - 13th EAI International Conference, TridentCom 2018, Shanghai, China, December 1-3, 2018, Proceedings, pp. 96-112, 2018, Springer, 978-3-030-12970-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Salvador Martínez Perez, Valerio Cosentino, Jordi Cabot |
Model-based analysis of Java EE web security misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Lang. Syst. Struct. ![In: Comput. Lang. Syst. Struct. 49, pp. 36-61, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Petar D. Bojovic, Slavko Gajin |
An approach to evaluation of common DNS misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1711.05696, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
26 | Amina Saâdaoui, Nihel Ben Youssef, Adel Bouhoula |
Automatic detection and correction of firewall misconfigurations- A formal approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCSS ![In: SCSS 2017, The 8th International Symposium on Symbolic Computation in Software Science 2017, April 6-9, 2017, Gammarth, Tunisia, pp. 68-76, 2017, EasyChair. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Saeed Al-Haj, William J. Tolone |
FlowTable pipeline misconfigurations in Software Defined Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM Workshops ![In: 2017 IEEE Conference on Computer Communications Workshops, INFOCOM Workshops, Atlanta, GA, USA, May 1-4, 2017, pp. 247-252, 2017, IEEE, 978-1-5386-2784-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Luuk Hendriks, Pieter-Tjerk de Boer, Aiko Pras |
IPv6-specific misconfigurations in the DNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSM ![In: 13th International Conference on Network and Service Management, CNSM 2017, Tokyo, Japan, November 26-30, 2017, pp. 1-5, 2017, IEEE Computer Society, 978-3-901882-98-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Amina Saâdaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula |
A New FDD-Based Method for Distributed Firewall Misconfigurations Resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMCIS ![In: Information Systems - 14th European, Mediterranean, and Middle Eastern Conference, EMCIS 2017, Coimbra, Portugal, September 7-8, 2017, Proceedings, pp. 369-383, 2017, Springer, 978-3-319-65929-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Tianyin Xu |
Hardening Cloud and Datacenter Systems against Misconfigurations: Principles and Tool Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2017 |
RDF |
|
26 | Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula |
An Accurate FDD-Based Approach for Discovering Distributed Firewalls Misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trustcom/BigDataSE/ISPA ![In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016, pp. 552-559, 2016, IEEE, 978-1-5090-3205-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Tianxiang Dai, Haya Schulmann, Michael Waidner |
DNSSEC Misconfigurations in Popular Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 651-660, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Niels L. M. van Adrichem, Norbert Blenn, Antonio Reyes Lua, Xin Wang, Muhammad Wasif, Ficky Fatturrahman, Fernando A. Kuipers |
A measurement study of DNSSEC misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Informatics ![In: Secur. Informatics 4(1), pp. 8, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula |
Automated and Optimized FDD-Based Method to Fix Firewall Misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: 14th IEEE International Symposium on Network Computing and Applications, NCA 2015, Cambridge, MA, USA, September 28-30, 2015, pp. 63-67, 2015, IEEE Computer Society, 978-1-5090-1849-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Sascha Fahl, Yasemin Acar, Henning Perl, Matthew Smith 0001 |
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014, pp. 507-512, 2014, ACM, 978-1-4503-2800-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Niels L. M. van Adrichem, Antonio Reyes Lua, Xin Wang, Muhammad Wasif, Ficky Fatturrahman, Fernando A. Kuipers |
DNSSEC Misconfigurations: How Incorrectly Configured Security Leads to Unreachability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JISIC ![In: IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014, pp. 9-16, 2014, IEEE, 978-1-4799-6363-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula |
Formal approach for managing firewall misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RCIS ![In: IEEE 8th International Conference on Research Challenges in Information Science, RCIS 2014, Marrakech, Morocco, May 28-30, 2014, pp. 1-10, 2014, IEEE, 978-1-4799-2393-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Rafik Kheddam, Oum-El-Kheir Aktouf, Ioannis Parissis, Sanaa Boughazi |
Monitoring of RFID failures resulting from LLRP misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoftCOM ![In: 21st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2013, Split-Primosten, Croatia, September 18-20, 2013, pp. 1-6, 2013, IEEE, 978-953-290-043-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Zhen Dong 0004, Mohammadreza Ghanavati, Artur Andrzejak 0001 |
Automated diagnosis of software misconfigurations based on static analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE (Supplemental Proceedings) ![In: IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013, Pasadena, CA, USA, November 4-7, 2013 - Supplemental Proceedings, pp. 162-168, 2013, IEEE Computer Society, 978-1-4799-2552-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Tianyin Xu, Jiaqi Zhang, Peng Huang 0005, Jing Zheng, Tianwei Sheng, Ding Yuan 0004, Yuanyuan Zhou 0001, Shankar Pasupathy |
Do not blame users for misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: ACM SIGOPS 24th Symposium on Operating Systems Principles, SOSP '13, Farmington, PA, USA, November 3-6, 2013, pp. 244-259, 2013, ACM, 978-1-4503-2388-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Lujo Bauer, Yuan Liang, Michael K. Reiter, Chad Spensky |
Discovering access-control misconfigurations: new approaches and evaluation methodologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012, pp. 95-104, 2012, ACM, 978-1-4503-1091-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Lujo Bauer, Scott Garriss, Michael K. Reiter |
Detecting and resolving policy misconfigurations in access-control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 14(1), pp. 2:1-2:28, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Nihel Ben Youssef, Adel Bouhoula |
A Fully Automatic Approach for Fixing Firewall Misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 11th IEEE International Conference on Computer and Information Technology, CIT 2011, Pafos, Cyprus, 31 August-2 September 2011, pp. 461-466, 2011, IEEE Computer Society, 978-0-7695-4388-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Ravi Mukkamala, Bhavana Tapde |
Improving Transaction Success Rate by Detecting and Correcting Access Control Misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes, pp. 16-22, 2010, CSREA Press, 1-60132-163-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
26 | Tathagata Das, Ranjita Bhagwan, Prasad Naldurg |
Baaz: A System for Detecting Access Control Misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 19th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings, pp. 161-176, 2010, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
26 | Bhavish Agarwal, Ranjita Bhagwan, Tathagata Das, Siddharth Eswaran, Venkata N. Padmanabhan, Geoffrey M. Voelker |
NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSDI ![In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2009, April 22-24, 2009, Boston, MA, USA, pp. 349-364, 2009, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
26 | Antonio Magnaghi, Takeo Hamada, Tsuneo Katsuyama |
A wavelet-based framework for proactive detection of network misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetT@SIGCOMM ![In: Proceedings of the ACM SIGCOMM Workshop on Network Troubleshooting - Research, Theory and Operations Practice Meet Malfunctioning Reality, NetT '04, Portland, Oregon, USA, September 3, 2004, pp. 253-258, 2004, ACM. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas E. Anderson, Jie Gao 0001 |
Moving beyond end-to-end path information to optimize CDN performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, Illinois, USA, November 4-6, 2009, pp. 190-201, 2009, ACM, 978-1-60558-771-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
latency inflation, network troubleshooting, content distribution networks |
18 | Bryan Parno, Adrian Perrig, Dave G. Andersen |
SNAPP: stateless network-authenticated path pinning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 168-178, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
path pinning, next-generation networks |
18 | Jürgen Angele, Michael Erdmann, Dirk Wenke |
Ontology-Based Knowledge Management in Automotive Engineering Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ontology Management ![In: Ontology Management, Semantic Web, Semantic Web Services, and Business Applications, pp. 245-264, 2008, Springer, 978-0-387-69900-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Semantic Web, applications, rules, information integration, engineering, automotive |
18 | James Shearer, Kwan-Liu Ma, Toby Kohlenberg |
BGPeep: An IP-Space Centered View for Internet Routing Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings, pp. 95-110, 2008, Springer, 978-3-540-85931-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Amogh Dhamdhere, Renata Teixeira, Constantine Dovrolis, Christophe Diot |
NetDiagnoser: troubleshooting network unreachabilities using end-to-end probes and routing data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2007, New York, NY, USA, December 10-13, 2007, pp. 18, 2007, ACM, 978-1-59593-770-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Wei Zheng, Ricardo Bianchini, Thu D. Nguyen |
Automatic configuration of internet services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, pp. 219-229, 2007, ACM, 978-1-59593-636-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
operator mistakes, manageability, configuration, internet services |
18 | Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah, William M. Pottenger |
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China, pp. 874-879, 2006, IEEE Computer Society, 0-7695-2701-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Khadija Houerbi Ramah, Hichem Ayari, Farouk Kamoun |
Traffic Anomaly Detection and Characterization in the Tunisian National University Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2006 - Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 5th International IFIP-TC6 Networking Conference, Coimbra, Portugal, May 15-19, 2006, Proceedings, pp. 136-147, 2006, Springer, 3-540-34192-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Temporal Characteristics, Principal Component Analysis, Anomaly Detection |
18 | Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao |
Internet-scale malware mitigation: combining intelligence of the control and data plane. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006, pp. 33-40, 2006, ACM Press, 1-59593-551-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
internet motion sensor, routing anomaly, network security, BGP, computer worms |
18 | Tao Wan 0004, Paul C. van Oorschot |
Analysis of BGP prefix origins during Google's May 2005 outage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Jun Li 0001, Dejing Dou, Zhen Wu, Shiwoong Kim, Vikash Agarwal |
An internet routing forensics framework for discovering rules of abnormal BGP events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 35(5), pp. 55-66, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
abnormal BGP events, routing forensics, data mining, internet worms, blackout |
18 | Qiang Huang, David Jao, Helen J. Wang |
Applications of secure electronic voting to automated privacy-preserving troubleshooting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 68-80, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
automatic troubleshooting, privacy, integrity, homomorphic encryption, zero knowledge proof |
18 | Peidong Zhu, Xin Liu, Mingjun Yang, Ming Xu 0002 |
Rule-Based Anomaly Detection of Inter-domain Routing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPT ![In: Advanced Parallel Processing Technologies, 6th International Workshop, APPT 2005, Hong Kong, China, October 27-28, 2005, Proceedings, pp. 417-426, 2005, Springer, 3-540-29639-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | John C. McEachen, John Zachary |
A Novel Approach to Accentuating Anomalous Events in Complex Network Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
network diagnostics, Intrusion detection, statistical mechanics |
18 | Avishai Wool |
A Quantitative Study of Firewall Configuration Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 37(6), pp. 62-67, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu |
SPV: secure path vector routing for securing BGP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 2004, Portland, Oregon, USA, pp. 179-192, 2004, ACM, 1-58113-862-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, routing, BGP, Border Gateway Protocol, interdomain routing |
18 | Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang 0001, Yi-Min Wang |
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPTPS ![In: Peer-to-Peer Systems III, Third International Workshop, IPTPS 2004, La Jolla, CA, USA, February 26-27, 2004, Revised Selected Papers, pp. 184-194, 2004, Springer, 3-540-24252-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson |
Characteristics of internet background radiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, IMC 2004, Taormina, Sicily, Italy, October 25-27, 2004, pp. 27-40, 2004, ACM, 1-58113-821-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
internet background radiation, network telescope, honeypot |
18 | Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel |
On the performance, feasibility, and use of forward-secure signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 131-144, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
forward-secure signatures, digital signatures |
18 | Lixin Gao 0001 |
On inferring autonomous system relationships in the internet . ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 9(6), pp. 733-745, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Internet, Internet, routing, protocols, Border Gateway Protocol (BGP) |
18 | Christoph Koch 0001, Paolo Petta |
Coordination Issues in Multi-agent Event Data Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAW ![In: Engineering Societies in the Agent World, First International Workshop, ESAW 2000, Berlin, Germany, August 21, 2000, Revised Papers, pp. 64-77, 2000, Springer, 3-540-41477-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|