The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Firewall with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-1996 (22) 1997-1998 (22) 1999 (21) 2000 (23) 2001 (28) 2002 (33) 2003 (59) 2004 (63) 2005 (82) 2006 (78) 2007 (91) 2008 (93) 2009 (65) 2010 (52) 2011 (54) 2012 (36) 2013 (32) 2014 (37) 2015 (44) 2016 (55) 2017 (40) 2018 (47) 2019 (40) 2020 (35) 2021 (29) 2022 (40) 2023 (33) 2024 (6)
Publication types (Num. hits)
article(294) book(2) incollection(12) inproceedings(941) phdthesis(11)
Venues (Conferences, Journals, ...)
CoRR(38) ACSAC(17) ICC(13) Comput. Secur.(10) LISA(10) Security and Management(10) AINA(9) IEEE Access(9) ICDCS(8) ICICS(8) INFOCOM(8) ISCC(8) POLICY(8) DSN(7) ICNP(7) login Usenix Mag.(7) More (+10 of total 665)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 762 occurrences of 447 keywords

Results
Found 1260 publication records. Showing 1260 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
44Feng Xian, Hai Jin 0001, Ke Liu, Zongfen Han A Mobile-Agent based Distributed Dynamic [mu]Firewall Architecture. Search on Bibsonomy ICPADS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
44Utz Roedig, Manuel Görtz, Martin Karsten, Ralf Steinmetz RSVP as Firewall Signalling Protocol. Search on Bibsonomy ISCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
40William Formyduval Integrating static analysis and testing for firewall policies. Search on Bibsonomy OOPSLA Companion The full citation details ... 2009 DBLP  DOI  BibTeX  RDF firewall policies, test generation, firewalls
40Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch An inference system for detecting firewall filtering rules anomalies. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF filtering rules, anomalies detection, firewall, inference system
40Tom Verdickt, Wim Van de Meerssche, Koert Vlaeminck Modeling the performance of a NAT/firewall network service for the IXP2400. Search on Bibsonomy WOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF firewall, network processor
40Mikkel Christiansen, Emmanuel Fleury An MTIDD Based Firewall. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF firewall, packet classification, decision diagrams
38Almut Herzog, Nahid Shahmehri Usability and Security of Personal Firewalls. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Utz Roedig, Jens B. Schmitt Multimedia and firewalls: a performance perspective. Search on Bibsonomy Multim. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Keyword Firewalls, QoS, Performance, Multimedia, Network Security
38Tom Markham, Lynn Meredith, Charlie Payne Distributed Embedded Firewalls with Virtual Private Groups. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Pablo Neira Ayuso, Rafael Martinez Gasca, Laurent Lefèvre FT-FW: Efficient Connection Failover in Cluster-based Stateful Firewalls. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fault tolerant, firewall, stateful
35Gaston Ormazabal, Sarvesh Nagpal, Eilon Yardeni, Henning Schulzrinne Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems. Search on Bibsonomy IPTComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Signaling Attacks, Application Layer Firewall, Security, Scalability, Distributed Computing, SIP, VoIP, DoS, DDoS, Deep Packet Inspection
35Nen-Fu Huang, Yih-Jou Tzang, Hsi-Feng Chen, Yen-Ming Chu Live Multimedia System Using Peer-to-Peer Architecture for Distance Education. Search on Bibsonomy ICWL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IPv4/IPv6, NAT (Network Address Translation), Firewall, Distance education, Multimedia streaming, Peer-to-Peer (P2P)
35Aditya Ganjam, Hui Zhang 0001 Connectivity restrictions in overlay multicast. Search on Bibsonomy NOSSDAV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF peer-to-peer systems, firewall, overlay multicast, network address translator
35Lee J. White, Brian Robinson Industrial Real-Time Regression Testing and Analysis Using Firewalls. Search on Bibsonomy ICSM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Testing Firewall, Software Testing, Deadlock, Regression Testing, Software Defects, Real-Time Software
35Marco Cremonini, Sabrina De Capitani di Vimercati, Ernesto Damiani, Pierangela Samarati An XML-based approach to combine firewalls and web services security specifications. Search on Bibsonomy XML Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF service security, Web services, network security, firewall, SOAP
35Rasool Jalili, Mohsen Rezvani Specification and Verification of Security Policies in Firewalls. Search on Bibsonomy EurAsia-ICT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Formal Specification, Security Policy, Firewall
34J. Lane Thames, Randal T. Abler, David Keeling Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF path matrix, firewalls, packet classification, blacklisting, bit vectors
34Subana Thanasegaran, Yi Yin, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi A topological approach to detect conflicts in firewall policies. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Nihel Ben Youssef, Adel Bouhoula, Florent Jacquemard Automatic verification of conformance of firewall configurations to security policies. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34J. Lane Thames, Randal T. Abler, David Keeling A distributed firewall and active response architecture providing preemptive protection. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF active intrusion response, distributed firewalls, intrusion detection systems
34Mohammed Anis Benelbahri, Adel Bouhoula Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34El-Sayed M. El-Alfy, Shokri Z. Selim On Optimal Firewall Rule Ordering. Search on Bibsonomy AICCSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Peter Langendörfer, Martin Lehmann 0001, Krzysztof Piotrowski Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches. Search on Bibsonomy WWIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Masashi Ito, Akira Watanabe A Realization Method of Voice over IP System Passing Through Firewall and Its Implementation. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Pho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoung Lee, Young-Koo Lee A Home Firewall Solution for Securing Smart Spaces. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Diana Senn, David A. Basin, Germano Caronni Firewall Conformance Testing. Search on Bibsonomy TestCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Mats Skoglund, Per Runeson A case study of the class firewall regression test selection technique on a large scale distributed software system. Search on Bibsonomy ISESE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Xiantai Gou, Weidong Jin Multi-Agent System for Multimedia Communications Traversing NAT/Firewall in Next Generation Networks. Search on Bibsonomy CNSR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Fábio Elias Locatelli, Luciano Paschoal Gaspary, Cristina Melchiors, Samir Lohmann, Fabiane Dillenburg Spotting Intrusion Scenarios from Firewall Logs Through a Case-Based Reasoning Approach. Search on Bibsonomy DSOM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Luciano Paschoal Gaspary, Cristina Melchiors, Fábio Elias Locatelli, Fabiane Dillenburg Identification of Intrustion Scenarios through Classification, Characterization and Analysis of Firewall Events. Search on Bibsonomy LCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay Compiling Policy Descriptions into Reconfigurable Firewall Processors. Search on Bibsonomy FCCM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Jung Min Park, Min-Jung Jin, Kijoon Chae Secure Firewall Traversal in Mobile IP Network. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Lee J. White, Husain Almezen, Shivakumar Sastry Firewall Regression Testing of GUI Sequences and their Interactions. Search on Bibsonomy ICSM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Complete Interaction GUI Sequences, Graphical User Interfaces, Regression Testing, GUI Testing
34Padmanabhan Krishnan, Danita Hartley Using Model Checking to Test a Firewall : A Case Study. Search on Bibsonomy EUROMICRO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
34Marc Éluard, Thomas P. Jensen, Ewen Denney An Operational Semantics of the Java Card Firewall. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
31Yong Jin, Nariyoshi Yamai Proposal of an Adaptive Firewall System in Collaboration with Extended DNS. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Firewall System, Load Balancing, DNS
31MyungKeun Yoon 0001, Shigang Chen, Zhan Zhang Minimizing the Maximum Firewall Rule Set in a Network with Multiple Firewalls. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Firewall configuration, access control rules, network security
31Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel Laskov TokDoc: a self-healing web application firewall. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF web application, anomaly detection, firewall, intrusion prevention
31Sirisha Surisetty, Sanjeev Kumar Is McAfee SecurityCenter/Firewall Software Providing Complete Security for Your Computer?. Search on Bibsonomy ICDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF McAfee Firewall, NonPaged Pool Allocs, Ping flood attack, Distributed Denial of Service(DDoS) attack
31Subana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi Simultaneous Analysis of Time and Space for Conflict Detection in Time-Based Firewall Policies. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF time-based rules, firewall mis-configuration, Packet filtering
31Abdeslam En-Nouaary, Mehdi Akiki An Integrated Framework for Automated Firewall Testing and Validation. Search on Bibsonomy ITNG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF firewall configurations, firewalls, policy languages, white box testing
31Zhang Yu The Program Design of Network Firewall Based on Windows. Search on Bibsonomy MVHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF network securit, personal firewall, layered service provider, software process improvement
31Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF ruleset, management, diagnosis, detection, firewall, minimal, conflict, inconsistency, anomaly, acl
31Eduardo Horowitz, Luís C. Lamb A Hierarchical Model for Firewall Policy Extraction. Search on Bibsonomy AINA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Firewall Extraction Policies, Foundations of Computer Security, Firewalls
31Hamed Salehi, Hossein Shirazi, Reza Askari Moghadam Increasing Overall Network Security by Integrating Signature-Based NIDS with Packet Filtering Firewall. Search on Bibsonomy JCAI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Firewall, Snort, NIDS, IPS
31JeeHyun Hwang, Tao Xie 0001, Fei Chen 0001, Alex X. Liu Fault Localization for Firewall Policies. Search on Bibsonomy SRDS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Firewall Policy, Policy Testing, Network Security, Firewalls, Fault Localization
30Md Fahad Monir, Dan Pan Application and Assessment of Click Modular Firewall vs POX Firewall in SDN/NFV Framework. Search on Bibsonomy TENCON The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
30Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta, Lorenzo Veronese Firewall Management With FireWall Synthesizer. Search on Bibsonomy ITASEC The full citation details ... 2018 DBLP  BibTeX  RDF
30Lingbo Wei, Chi Zhang 0001, Yanmin Gong 0001, Yuguang Fang, Kefei Chen A Firewall of Two Clouds: Preserving Outsourced Firewall Policy Confidentiality with Heterogeneity. Search on Bibsonomy GLOBECOM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Zouheir Trabelsi, Vasiqullah Molvizadah Edu-firewall device: An advanced firewall hardware device for information security education. Search on Bibsonomy CCNC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Patrick G. Clark, Arvin Agah Firewall Policy Diagram: Structures for Firewall Behavior Comprehension. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2015 DBLP  BibTeX  RDF
30Cheng-Hong Wang, Donghong Zhang, Hualin Lu, Jing Zhao 0016, Zhenyu Zhang 0004, Zheng Zheng 0001 An experimental study on firewall performance: Dive into the bottleneck for firewall effectiveness. Search on Bibsonomy IAS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
30Fouad Amine Guenane Gestion de la sécurité des réseaux à l'aide d'un service innovant de Cloud Based Firewall. (Network Security Management Using a Novel Firewall Cloud-Based Service). Search on Bibsonomy 2014   RDF
30Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall. Search on Bibsonomy IDCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
30Mats Skoglund, Per Runeson Improving Class Firewall Regression Test Selection by Removing the Class Firewall. Search on Bibsonomy Int. J. Softw. Eng. Knowl. Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Avishai Wool How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations. Search on Bibsonomy LISA The full citation details ... 2001 DBLP  BibTeX  RDF
29Khaled Salah 0001, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam Resiliency of open-source firewalls against remote discovery of last-matching rules. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dos attacks, nework security, firewalls
29Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz Dynamic Balancing of Packet Filtering Workloads on Distributed Firewalls. Search on Bibsonomy IWQoS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Chao-Hsi Yeh, Chung-Huang Yang Design and implementation of honeypot systems based on open-source software. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Grzegorz J. Nalepa Application of the XTT Rule-Based Model for Formal Design and Verification of Internet Security Systems. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Henrich Christopher Pöhls, Joachim Posegga Smartcard Firewalls Revisited. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Christopher S. Oehmen, Douglas J. Baxter, Ryan W. Mooney, Shaun O'Leary, Tim Carlson Bandwidth challenge - High throughput feature-matching analysis of biological spectral data. Search on Bibsonomy SC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Yong Du, Daniel Hoffman PBit -- A Pattern-Based Testing Framework for iptables. Search on Bibsonomy CNSR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Charles Higby, Michael Bailey Wireless security patch management system. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, wireless, configuration, update, worm, patch, virus, administration
29Young H. Cho, Shiva Navab, William H. Mangione-Smith Specialized Hardware for Deep Network Packet Filtering. Search on Bibsonomy FPL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Dongyeon Lee, D. S. Kim, K. H. Pang, H. S. Kim, T. M. Chung A design of scalable SNMP agent for managing heterogeneous security systems. Search on Bibsonomy NOMS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
25Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh Protecting browsers from DNS rebinding attacks. Search on Bibsonomy ACM Trans. Web The full citation details ... 2009 DBLP  DOI  BibTeX  RDF spam, firewall, DNS, Same-origin policy, click fraud
25Pei-Sheng Huang, Chung-Huang Yang, Tae-Nam Ahn Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection system, firewall, malware, worm, honeypot
25Abhinav Srivastava, Jonathon T. Giffin Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machine introspection, attack prevention, Firewall
25Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh Protecting browsers from dns rebinding attacks. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF spam, firewall, dns, same-origin policy, click fraud
25Jin Li Peer-to-peer multimedia applications. Search on Bibsonomy ACM Multimedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF NAT/firewall traversal, P2P economy, erasure resilient coding, scheduling, peer-to-peer, attack, overlay, distributed debugging, peer selection
25Herbert Bos, Kaiming Huang Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed firewall, network processors
25Michael Stukas, Douglas C. Sicker An Evaluation of VoIP Traversal of Firewalls and NATs within an Enterprise Environment. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SIP, VoIP, firewall, enterprise, NAT
25Doug Stinnette Attempts to automate client security at virginia commonwealth university. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF antivirus software, personal firewall
25Jacek Midura, Kazimierz Balos, Krzysztof Zielinski Global Discovery Service for JMX Architecture. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2004 DBLP  DOI  BibTeX  RDF MBean, resources management, firewall, JMX, Discovery service
25Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 Real-Time Emulation of Intrusion Victim in HoneyFarm. Search on Bibsonomy AWCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interception proxy, reverse firewall, Honeypot, intrusion
25John W. Lockwood, Christopher E. Neely, Christopher K. Zuver, David Lim Automated tools to implement and test Internet systems in reconfigurable hardware. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF network intrusion detection and prevention, Internet, Field Programmable Gate Array (FPGA), networks, tools, firewall, reconfigurable hardware
25Robert N. Smith, Yu Chen, Sourav Bhattacharya Cascade of Distributed and Cooperating Firewalls in a Secure Data Network. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF class-filters, cascade of firewalls, network security, Firewall, data security, security management, multilevel security
25Ingo Lück, Christian Schäfer, Heiko Krumm Model-Based Tool-Assistance for Packet-Filter Design. Search on Bibsonomy POLICY The full citation details ... 2001 DBLP  DOI  BibTeX  RDF policy hierarchy, firewall design, packet filter, model-based management
25Edgard Jamhour Distributed Security Management Using LDAP Directories. Search on Bibsonomy SCCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Firewall Configuration, LDAP
25Carsten Benecke A Parallel Packet Screen for High Speed Networks. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Packet Screen, Parallel Processing, Firewall, High Speed Networks
25T. Mitchem, R. Lu, R. O'Brian Using Kernel Hypervisors to Secure Applications. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF kernel hypervisors, secure applications, selective control, loadable module, unbypassable security wrappers, application specific security requirements, client kernel hypervisors, application specific policies, loadable modules, user systems, malicious active content, wrapping servers, firewall services, Web browser, operating system kernels, Linux kernel, COTS components, replication services
25J. Hoffman Implementing RBAC on a Type Enforced System. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF type enforced system, security database implementations, RBAC mechanisms, LOCK6, RBAC features, firewall construction, lower level mechanism, type enforcement, Role Based Access Control, authorisation, application domain, application domains, secure operating system
25Jack Hong, George Toye, Larry J. Leifer Personal Electronic Notebook with Sharing. Search on Bibsonomy WETICE The full citation details ... 1995 DBLP  DOI  BibTeX  RDF mechanical engineering computing, personal electronic notebook, digital engineering design notebook, Personal Electronic Notebook with Sharing, information web, firewall-independent sharing, mechanical engineering design, Internet, Internet, World-Wide Web, real-time systems, real-time, network security, groupware, CAD, security of data, distributed collaboration, PENS
24Sherri Sparks, Shawn Embleton, Cliff Changchun Zou A chipset level network backdoor: bypassing host-based firewall & IDS. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network backdoor, rootkit, hardware security
24Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, Angel Jesus Varela-Vaca Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, Angel Jesus Varela-Vaca Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Simon N. Foley, William M. Fitzgerald Semantic Web and firewall alignment. Search on Bibsonomy ICDE Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Ryma Abassi, Sihem Guemara El Fatmi A Model for Specification and Validation of Security Policies in Communication Networks: The Firewall Case. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Roberto D. Rubino An open system for transparent firewall authentication and user traffic identification within corporate intranets. Search on Bibsonomy SIGITE Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, firewalls, packet marking
24Ying Zhang 0022, Zhuoqing Morley Mao, Jia Wang A Firewall for Routers: Protecting against Routing Misbehavior. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Simone Ferraresi, Stefano Pesic, Livia Trazza, Andrea Baiocchi Automatic Conflict Analysis and Resolution of Traffic Filtering Policy for Firewall and Security Gateway. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Nils Gruschka, Meiko Jensen, Norbert Luttenberger A Stateful Web Service Firewall for BPEL. Search on Bibsonomy ICWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Mathieu Clabaut A Tool for Firewall Administration. Search on Bibsonomy B The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Dalila Boughaci, Habiba Drias, Brahim Oubeka, Abdelkader Aissioui, Belaid Benhamou A Distributed Firewall using Autonomous Agents. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Ramy Bebawy, Hesham Sabry, Sherif El-Kassas, Youssef Hanna, Youssef Youssef Nedgty: Web Services Firewall. Search on Bibsonomy ICWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Gregory J. Conti, Mustaque Ahamad, Robert Norback Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee Secure Online Examination Architecture Based on Distributed Firewall. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay Irregular Reconfigurable CAM Structures for Firewall Applications. Search on Bibsonomy FPL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Si Choon Noh, Dong Chun Lee, Kuinam J. Kim Improved Structure Management of Gateway Firewall Systems for Effective Networks Security. Search on Bibsonomy ISCIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 1260 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license