|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 762 occurrences of 447 keywords
|
|
|
Results
Found 1260 publication records. Showing 1260 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
44 | Feng Xian, Hai Jin 0001, Ke Liu, Zongfen Han |
A Mobile-Agent based Distributed Dynamic [mu]Firewall Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 9th International Conference on Parallel and Distributed Systems, ICPADS 2002, Taiwan, ROC, December 17-20, 2002, pp. 431-436, 2002, IEEE Computer Society, 0-7695-1760-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Utz Roedig, Manuel Görtz, Martin Karsten, Ralf Steinmetz |
RSVP as Firewall Signalling Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 3-5 July 2001, Hammamet, Tunisia, pp. 57-62, 2001, IEEE Computer Society, 0-7695-1177-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
40 | William Formyduval |
Integrating static analysis and testing for firewall policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2009, October 25-29, 2009, Orlando, Florida, USA, pp. 749-750, 2009, ACM, 978-1-60558-768-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
firewall policies, test generation, firewalls |
40 | Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch |
An inference system for detecting firewall filtering rules anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2122-2128, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
filtering rules, anomalies detection, firewall, inference system |
40 | Tom Verdickt, Wim Van de Meerssche, Koert Vlaeminck |
Modeling the performance of a NAT/firewall network service for the IXP2400. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSP ![In: Proceedings of the Fifth International Workshop on Software and Performance, WOSP 2005, Palma, Illes Balears, Spain, July 12-14, 2005, pp. 137-144, 2005, ACM, 1-59593-087-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
firewall, network processor |
40 | Mikkel Christiansen, Emmanuel Fleury |
An MTIDD Based Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 27(2-4), pp. 297-319, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
firewall, packet classification, decision diagrams |
38 | Almut Herzog, Nahid Shahmehri |
Usability and Security of Personal Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 37-48, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Utz Roedig, Jens B. Schmitt |
Multimedia and firewalls: a performance perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 11(1), pp. 19-33, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Keyword Firewalls, QoS, Performance, Multimedia, Network Security |
38 | Tom Markham, Lynn Meredith, Charlie Payne |
Distributed Embedded Firewalls with Virtual Private Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 81-83, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Pablo Neira Ayuso, Rafael Martinez Gasca, Laurent Lefèvre |
FT-FW: Efficient Connection Failover in Cluster-based Stateful Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 16th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), 13-15 February 2008, Toulouse, France, pp. 573-580, 2008, IEEE Computer Society, 978-0-7695-3089-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fault tolerant, firewall, stateful |
35 | Gaston Ormazabal, Sarvesh Nagpal, Eilon Yardeni, Henning Schulzrinne |
Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPTComm ![In: Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks, Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers, pp. 107-132, 2008, Springer, 978-3-540-89053-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Signaling Attacks, Application Layer Firewall, Security, Scalability, Distributed Computing, SIP, VoIP, DoS, DDoS, Deep Packet Inspection |
35 | Nen-Fu Huang, Yih-Jou Tzang, Hsi-Feng Chen, Yen-Ming Chu |
Live Multimedia System Using Peer-to-Peer Architecture for Distance Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWL ![In: Advances in Web Based Learning - ICWL 2006, 5th International Conference, Penang, Malaysia, July 19-21, 2006. Revised Papers, pp. 321-335, 2006, Springer, 3-540-49027-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IPv4/IPv6, NAT (Network Address Translation), Firewall, Distance education, Multimedia streaming, Peer-to-Peer (P2P) |
35 | Aditya Ganjam, Hui Zhang 0001 |
Connectivity restrictions in overlay multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOSSDAV ![In: Network and Operating System Support for Digital Audio and Video, 14th International Workshop, NOSSDAV 2004, Cork, Ireland, June 16-18, 2004, Proceedings, pp. 54-59, 2004, ACM, 1-58113-801-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
peer-to-peer systems, firewall, overlay multicast, network address translator |
35 | Lee J. White, Brian Robinson |
Industrial Real-Time Regression Testing and Analysis Using Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 20th International Conference on Software Maintenance (ICSM 2004), 11-17 September 2004, Chicago, IL, USA, pp. 18-27, 2004, IEEE Computer Society, 0-7695-2213-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Testing Firewall, Software Testing, Deadlock, Regression Testing, Software Defects, Real-Time Software |
35 | Marco Cremonini, Sabrina De Capitani di Vimercati, Ernesto Damiani, Pierangela Samarati |
An XML-based approach to combine firewalls and web services security specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, pp. 69-78, 2003, ACM, 1-58113-777-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
service security, Web services, network security, firewall, SOAP |
35 | Rasool Jalili, Mohsen Rezvani |
Specification and Verification of Security Policies in Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EurAsia-ICT ![In: EurAsia-ICT 2002: Information and Communication Technology, First EurAsian Conference, Shiraz, Iran, October 29-31, 2002, Proceedings, pp. 154-163, 2002, Springer, 3-540-00028-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Formal Specification, Security Policy, Firewall |
34 | J. Lane Thames, Randal T. Abler, David Keeling |
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 47th Annual Southeast Regional Conference, 2009, Clemson, South Carolina, USA, March 19-21, 2009, 2009, ACM, 978-1-60558-421-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
path matrix, firewalls, packet classification, blacklisting, bit vectors |
34 | Subana Thanasegaran, Yi Yin, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi |
A topological approach to detect conflicts in firewall policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-7, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Nihel Ben Youssef, Adel Bouhoula, Florent Jacquemard |
Automatic verification of conformance of firewall configurations to security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia, pp. 526-531, 2009, IEEE Computer Society, 978-1-4244-4672-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | J. Lane Thames, Randal T. Abler, David Keeling |
A distributed firewall and active response architecture providing preemptive protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 46th Annual Southeast Regional Conference, 2008, Auburn, Alabama, USA, March 28-29, 2008, pp. 220-225, 2008, ACM, 978-1-60558-105-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
active intrusion response, distributed firewalls, intrusion detection systems |
34 | Mohammed Anis Benelbahri, Adel Bouhoula |
Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 63-70, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | El-Sayed M. El-Alfy, Shokri Z. Selim |
On Optimal Firewall Rule Ordering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 13-16 May 2007, Amman, Jordan, pp. 819-824, 2007, IEEE Computer Society, 1-4244-1030-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Peter Langendörfer, Martin Lehmann 0001, Krzysztof Piotrowski |
Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWIC ![In: Wired/Wireless Internet Communications, 4th International Conference, WWIC 2006, Bern, Switzerland, May 10-12, 2006, Proceedings, pp. 155-165, 2006, Springer, 3-540-34023-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Masashi Ito, Akira Watanabe |
A Realization Method of Voice over IP System Passing Through Firewall and Its Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 883-891, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Pho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoung Lee, Young-Koo Lee |
A Home Firewall Solution for Securing Smart Spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 760-761, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Diana Senn, David A. Basin, Germano Caronni |
Firewall Conformance Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TestCom ![In: Testing of Communicating Systems, 17th IFIP TC6/WG 6.1 International Conference, TestCom 2005, Montreal, Canada, May 31 - June 2, 2005, Proceedings, pp. 226-241, 2005, Springer, 3-540-26054-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Mats Skoglund, Per Runeson |
A case study of the class firewall regression test selection technique on a large scale distributed software system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISESE ![In: 2005 International Symposium on Empirical Software Engineering (ISESE 2005), 17-18 November 2005, Noosa Heads, Australia, pp. 74-83, 2005, IEEE Computer Society, 0-7803-9507-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Xiantai Gou, Weidong Jin |
Multi-Agent System for Multimedia Communications Traversing NAT/Firewall in Next Generation Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 19-21 May 2004, Fredericton, N.B., Canada, pp. 99-104, 2004, IEEE Computer Society, 0-7695-2096-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Fábio Elias Locatelli, Luciano Paschoal Gaspary, Cristina Melchiors, Samir Lohmann, Fabiane Dillenburg |
Spotting Intrusion Scenarios from Firewall Logs Through a Case-Based Reasoning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2004, Davis, CA, USA, November 15-17, 2004.Proceedings, pp. 196-207, 2004, Springer, 3-540-23631-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Luciano Paschoal Gaspary, Cristina Melchiors, Fábio Elias Locatelli, Fabiane Dillenburg |
Identification of Intrustion Scenarios through Classification, Characterization and Analysis of Firewall Events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 16-18 November 2004, Tampa, FL, USA, Proceedings, pp. 327-334, 2004, IEEE Computer Society, 0-7695-2260-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
34 | T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay |
Compiling Policy Descriptions into Reconfigurable Firewall Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 11th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2003), 8-11 April 2003, Napa, CA, USA, Proceedings, pp. 39-, 2003, IEEE Computer Society, 0-7695-1979-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Jung Min Park, Min-Jung Jin, Kijoon Chae |
Secure Firewall Traversal in Mobile IP Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2003, International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003. Proceedings, Part IV, pp. 535-544, 2003, Springer, 3-540-40197-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Lee J. White, Husain Almezen, Shivakumar Sastry |
Firewall Regression Testing of GUI Sequences and their Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 19th International Conference on Software Maintenance (ICSM 2003), The Architecture of Existing Systems, 22-26 September 2003, Amsterdam, The Netherlands, pp. 398-409, 2003, IEEE Computer Society, 0-7695-1905-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Complete Interaction GUI Sequences, Graphical User Interfaces, Regression Testing, GUI Testing |
34 | Padmanabhan Krishnan, Danita Hartley |
Using Model Checking to Test a Firewall : A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 28th EUROMICRO Conference 2002, 4-6 September 2002, Dortmund, Germany, pp. 284-293, 2002, IEEE Computer Society, 0-7695-1787-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Marc Éluard, Thomas P. Jensen, Ewen Denney |
An Operational Semantics of the Java Card Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-smart ![In: Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings, pp. 95-110, 2001, Springer, 3-540-42610-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
31 | Yong Jin, Nariyoshi Yamai |
Proposal of an Adaptive Firewall System in Collaboration with Extended DNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings, pp. 222-225, 2011, IEEE Computer Society, 978-1-4577-0531-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Firewall System, Load Balancing, DNS |
31 | MyungKeun Yoon 0001, Shigang Chen, Zhan Zhang |
Minimizing the Maximum Firewall Rule Set in a Network with Multiple Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 59(2), pp. 218-230, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Firewall configuration, access control rules, network security |
31 | Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel Laskov |
TokDoc: a self-healing web application firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1846-1853, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
web application, anomaly detection, firewall, intrusion prevention |
31 | Sirisha Surisetty, Sanjeev Kumar |
Is McAfee SecurityCenter/Firewall Software Providing Complete Security for Your Computer?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: The Fourth International Conference on Digital Society, ICDS 2010, 10.16 February 2010, St. Maarten, Netherlands Antilles, pp. 178-181, 2010, IEEE Computer Society, 978-0-7695-3953-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
McAfee Firewall, NonPaged Pool Allocs, Ping flood attack, Distributed Denial of Service(DDoS) attack |
31 | Subana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi |
Simultaneous Analysis of Time and Space for Conflict Detection in Time-Based Firewall Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 1015-1021, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
time-based rules, firewall mis-configuration, Packet filtering |
31 | Abdeslam En-Nouaary, Mehdi Akiki |
An Integrated Framework for Automated Firewall Testing and Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 768-773, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
firewall configurations, firewalls, policy languages, white box testing |
31 | Zhang Yu |
The Program Design of Network Firewall Based on Windows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MVHI ![In: 2010 International Conference on Machine Vision and Human-machine Interface, MVHI 2010, Kaifeng, China, April 24-25, 2010, pp. 553-556, 2010, IEEE Computer Soceity, 978-0-7695-4009-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
network securit, personal firewall, layered service provider, software process improvement |
31 | Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca |
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 1037-1046, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
ruleset, management, diagnosis, detection, firewall, minimal, conflict, inconsistency, anomaly, acl |
31 | Eduardo Horowitz, Luís C. Lamb |
A Hierarchical Model for Firewall Policy Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: The IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, May 26-29, 2009, pp. 691-698, 2009, IEEE Computer Society, 978-0-7695-3638-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Firewall Extraction Policies, Foundations of Computer Security, Firewalls |
31 | Hamed Salehi, Hossein Shirazi, Reza Askari Moghadam |
Increasing Overall Network Security by Integrating Signature-Based NIDS with Packet Filtering Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCAI ![In: First IITA International Joint Conference on Artificial Intelligence, Hainan Island, China, 25-26 April 2009, pp. 357-362, 2009, IEEE Computer Society, 978-0-7695-3615-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, Firewall, Snort, NIDS, IPS |
31 | JeeHyun Hwang, Tao Xie 0001, Fei Chen 0001, Alex X. Liu |
Fault Localization for Firewall Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), Niagara Falls, New York, USA, September 27-30, 2009, pp. 100-106, 2009, IEEE Computer Society, 978-0-7695-3826-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Firewall Policy, Policy Testing, Network Security, Firewalls, Fault Localization |
30 | Md Fahad Monir, Dan Pan |
Application and Assessment of Click Modular Firewall vs POX Firewall in SDN/NFV Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TENCON ![In: 2020 IEEE Region 10 Conference, TENCON 2020, Osaka, Japan, November 16-19, 2020, pp. 991-996, 2020, IEEE, 978-1-7281-8455-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta, Lorenzo Veronese |
Firewall Management With FireWall Synthesizer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITASEC ![In: Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018., 2018, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
30 | Lingbo Wei, Chi Zhang 0001, Yanmin Gong 0001, Yuguang Fang, Kefei Chen |
A Firewall of Two Clouds: Preserving Outsourced Firewall Policy Confidentiality with Heterogeneity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: 2016 IEEE Global Communications Conference, GLOBECOM 2016, Washington, DC, USA, December 4-8, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-1328-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Zouheir Trabelsi, Vasiqullah Molvizadah |
Edu-firewall device: An advanced firewall hardware device for information security education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 13th IEEE Annual Consumer Communications & Networking Conference, CCNC 2016, Las Vegas, NV, USA, January 9-12, 2016, pp. 278-279, 2016, IEEE, 978-1-4673-9292-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Patrick G. Clark, Arvin Agah |
Firewall Policy Diagram: Structures for Firewall Behavior Comprehension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 17(2), pp. 150-159, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
30 | Cheng-Hong Wang, Donghong Zhang, Hualin Lu, Jing Zhao 0016, Zhenyu Zhang 0004, Zheng Zheng 0001 |
An experimental study on firewall performance: Dive into the bottleneck for firewall effectiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: 10th International Conference on Information Assurance and Security, IAS 2014, Okinawa, Japan, November 28-30, 2014, pp. 71-76, 2014, IEEE, 978-1-4799-8099-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
30 | Fouad Amine Guenane |
Gestion de la sécurité des réseaux à l'aide d'un service innovant de Cloud Based Firewall. (Network Security Management Using a Novel Firewall Cloud-Based Service). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2014 |
RDF |
|
30 | Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda |
Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDCS ![In: Internet and Distributed Computing Systems - 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings, pp. 275-287, 2012, Springer, 978-3-642-34882-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Mats Skoglund, Per Runeson |
Improving Class Firewall Regression Test Selection by Removing the Class Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Eng. Knowl. Eng. ![In: Int. J. Softw. Eng. Knowl. Eng. 17(3), pp. 359-378, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Avishai Wool |
How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 15th Conference on Systems Administration (LISA 2001), San Diego, California, USA, December 2-7, 2001, 2001, USENIX, 1-880446-05-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
29 | Khaled Salah 0001, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam |
Resiliency of open-source firewalls against remote discovery of last-matching rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 186-192, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dos attacks, nework security, firewalls |
29 | Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz |
Dynamic Balancing of Packet Filtering Workloads on Distributed Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWQoS ![In: 16th International Workshop on Quality of Service, IWQoS 2008, University of Twente, Enskede, The Netherlands, 2-4 June 2008., pp. 209-218, 2008, IEEE, 978-1-4244-2084-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Chao-Hsi Yeh, Chung-Huang Yang |
Design and implementation of honeypot systems based on open-source software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 265-266, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Grzegorz J. Nalepa |
Application of the XTT Rule-Based Model for Formal Design and Verification of Internet Security Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007., pp. 81-86, 2007, Springer, 978-3-540-75100-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Henrich Christopher Pöhls, Joachim Posegga |
Smartcard Firewalls Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 179-191, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Christopher S. Oehmen, Douglas J. Baxter, Ryan W. Mooney, Shaun O'Leary, Tim Carlson |
Bandwidth challenge - High throughput feature-matching analysis of biological spectral data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC ![In: Proceedings of the ACM/IEEE SC2006 Conference on High Performance Networking and Computing, November 11-17, 2006, Tampa, FL, USA, pp. 243, 2006, ACM Press, 0-7695-2700-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Yong Du, Daniel Hoffman |
PBit -- A Pattern-Based Testing Framework for iptables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 19-21 May 2004, Fredericton, N.B., Canada, pp. 107-112, 2004, IEEE Computer Society, 0-7695-2096-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Charles Higby, Michael Bailey |
Wireless security patch management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 165-168, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, wireless, configuration, update, worm, patch, virus, administration |
29 | Young H. Cho, Shiva Navab, William H. Mangione-Smith |
Specialized Hardware for Deep Network Packet Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field-Programmable Logic and Applications, Reconfigurable Computing Is Going Mainstream, 12th International Conference, FPL 2002, Montpellier, France, September 2-4, 2002, Proceedings, pp. 452-461, 2002, Springer, 3-540-44108-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Dongyeon Lee, D. S. Kim, K. H. Pang, H. S. Kim, T. M. Chung |
A design of scalable SNMP agent for managing heterogeneous security systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: The Networked Planet: Management Beyond 2000, 7th IEEE/IFIP Network Operations and Management Symposium, NOMS 2000, Honolulu, HI, USA, April 10-14, 2000. Proceedings, pp. 983-984, 2000, IEEE, 0-7803-5928-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
25 | Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh |
Protecting browsers from DNS rebinding attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Web ![In: ACM Trans. Web 3(1), pp. 2:1-2:26, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
spam, firewall, DNS, Same-origin policy, click fraud |
25 | Pei-Sheng Huang, Chung-Huang Yang, Tae-Nam Ahn |
Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009, pp. 232-238, 2009, ACM, 978-1-60558-662-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection system, firewall, malware, worm, honeypot |
25 | Abhinav Srivastava, Jonathon T. Giffin |
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 39-58, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual machine introspection, attack prevention, Firewall |
25 | Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh |
Protecting browsers from dns rebinding attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 421-431, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
spam, firewall, dns, same-origin policy, click fraud |
25 | Jin Li |
Peer-to-peer multimedia applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 14th ACM International Conference on Multimedia, Santa Barbara, CA, USA, October 23-27, 2006, pp. 3-6, 2006, ACM, 1-59593-447-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
NAT/firewall traversal, P2P economy, erasure resilient coding, scheduling, peer-to-peer, attack, overlay, distributed debugging, peer selection |
25 | Herbert Bos, Kaiming Huang |
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 102-123, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
distributed firewall, network processors |
25 | Michael Stukas, Douglas C. Sicker |
An Evaluation of VoIP Traversal of Firewalls and NATs within an Enterprise Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 6(3), pp. 219-228, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
SIP, VoIP, firewall, enterprise, NAT |
25 | Doug Stinnette |
Attempts to automate client security at virginia commonwealth university. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 350, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
antivirus software, personal firewall |
25 | Jacek Midura, Kazimierz Balos, Krzysztof Zielinski |
Global Discovery Service for JMX Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part III, pp. 114-118, 2004, Springer, 3-540-22116-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
MBean, resources management, firewall, JMX, Discovery service |
25 | Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 |
Real-Time Emulation of Intrusion Victim in HoneyFarm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWCC ![In: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings, pp. 143-154, 2004, Springer, 3-540-23898-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
interception proxy, reverse firewall, Honeypot, intrusion |
25 | John W. Lockwood, Christopher E. Neely, Christopher K. Zuver, David Lim |
Automated tools to implement and test Internet systems in reconfigurable hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 33(3), pp. 103-110, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
network intrusion detection and prevention, Internet, Field Programmable Gate Array (FPGA), networks, tools, firewall, reconfigurable hardware |
25 | Robert N. Smith, Yu Chen, Sourav Bhattacharya |
Cascade of Distributed and Cooperating Firewalls in a Secure Data Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 15(5), pp. 1307-1315, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
class-filters, cascade of firewalls, network security, Firewall, data security, security management, multilevel security |
25 | Ingo Lück, Christian Schäfer, Heiko Krumm |
Model-Based Tool-Assistance for Packet-Filter Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: Policies for Distributed Systems and Networks, International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001, Proceedings, pp. 120-136, 2001, Springer, 3-540-41610-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
policy hierarchy, firewall design, packet filter, model-based management |
25 | Edgard Jamhour |
Distributed Security Management Using LDAP Directories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCCC ![In: 21st International Conference of the Chilean Computer Science Society (SCCC 2001), 6-8 November 2001, Punta Arenas, Chile, pp. 144-153, 2001, IEEE Computer Society, 0-7695-1396-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Firewall Configuration, LDAP |
25 | Carsten Benecke |
A Parallel Packet Screen for High Speed Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 67-74, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Packet Screen, Parallel Processing, Firewall, High Speed Networks |
25 | T. Mitchem, R. Lu, R. O'Brian |
Using Kernel Hypervisors to Secure Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 175-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
kernel hypervisors, secure applications, selective control, loadable module, unbypassable security wrappers, application specific security requirements, client kernel hypervisors, application specific policies, loadable modules, user systems, malicious active content, wrapping servers, firewall services, Web browser, operating system kernels, Linux kernel, COTS components, replication services |
25 | J. Hoffman |
Implementing RBAC on a Type Enforced System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 158-163, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
type enforced system, security database implementations, RBAC mechanisms, LOCK6, RBAC features, firewall construction, lower level mechanism, type enforcement, Role Based Access Control, authorisation, application domain, application domains, secure operating system |
25 | Jack Hong, George Toye, Larry J. Leifer |
Personal Electronic Notebook with Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 4th Workshop on Enabling Technologies, Infrastructure for Collaborative Enterprises (WET-ICE'95), April 20-22, 1995, Berkeley Springs, West Virginia, USA, Proceedings, pp. 88-94, 1995, IEEE Computer Society, 0-8186-7019-3. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
mechanical engineering computing, personal electronic notebook, digital engineering design notebook, Personal Electronic Notebook with Sharing, information web, firewall-independent sharing, mechanical engineering design, Internet, Internet, World-Wide Web, real-time systems, real-time, network security, groupware, CAD, security of data, distributed collaboration, PENS |
24 | Sherri Sparks, Shawn Embleton, Cliff Changchun Zou |
A chipset level network backdoor: bypassing host-based firewall & IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 125-134, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network backdoor, rootkit, hardware security |
24 | Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, Angel Jesus Varela-Vaca |
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 381-390, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, Angel Jesus Varela-Vaca |
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 53-61, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Simon N. Foley, William M. Fitzgerald |
Semantic Web and firewall alignment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 24th International Conference on Data Engineering Workshops, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 447-453, 2008, IEEE Computer Society, 978-1-4244-2161-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Ryma Abassi, Sihem Guemara El Fatmi |
A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 467-472, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Roberto D. Rubino |
An open system for transparent firewall authentication and user traffic identification within corporate intranets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 9th Conference on Information Technology Education, SIGITE 2008, Cincinnati, OH, USA, October 16-18, 2008, pp. 113-118, 2008, ACM, 978-1-60558-329-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, firewalls, packet marking |
24 | Ying Zhang 0022, Zhuoqing Morley Mao, Jia Wang |
A Firewall for Routers: Protecting against Routing Misbehavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 20-29, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Simone Ferraresi, Stefano Pesic, Livia Trazza, Andrea Baiocchi |
Automatic Conflict Analysis and Resolution of Traffic Filtering Policy for Firewall and Security Gateway. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 1304-1310, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Nils Gruschka, Meiko Jensen, Norbert Luttenberger |
A Stateful Web Service Firewall for BPEL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2007 IEEE International Conference on Web Services (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA, pp. 142-149, 2007, IEEE Computer Society, 0-7695-2924-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Mathieu Clabaut |
A Tool for Firewall Administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
B ![In: B 2007: Formal Specification and Development in B, 7th International Conference of B Users, Besançon, France, January 17-19, 2007, Proceedings, pp. 255-256, 2007, Springer, 3-540-68760-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Dalila Boughaci, Habiba Drias, Brahim Oubeka, Abdelkader Aissioui, Belaid Benhamou |
A Distributed Firewall using Autonomous Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DepCoS-RELCOMEX ![In: 2006 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2006), 24-28 May 2006, Szklarska Poreba, Poland, pp. 256-263, 2006, IEEE Computer Society, 0-7695-2565-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Ramy Bebawy, Hesham Sabry, Sherif El-Kassas, Youssef Hanna, Youssef Youssef |
Nedgty: Web Services Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2005 IEEE International Conference on Web Services (ICWS 2005), 11-15 July 2005, Orlando, FL, USA, pp. 597-601, 2005, IEEE Computer Society, 0-7695-2409-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Gregory J. Conti, Mustaque Ahamad, Robert Norback |
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 492-497, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee |
Secure Online Examination Architecture Based on Distributed Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan, pp. 534-537, 2004, IEEE Computer Society, 0-7695-2073-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay |
Irregular Reconfigurable CAM Structures for Firewall Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field Programmable Logic and Application, 13th International Conference, FPL 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings, pp. 890-899, 2003, Springer, 3-540-40822-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Si Choon Noh, Dong Chun Lee, Kuinam J. Kim |
Improved Structure Management of Gateway Firewall Systems for Effective Networks Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2003, 18th International Symposium, Antalya, Turkey, November 3-5, 2003, Proceedings, pp. 1076-1083, 2003, Springer, 3-540-20409-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 1260 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|