|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 741 occurrences of 469 keywords
|
|
|
Results
Found 803 publication records. Showing 803 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Lynn M. Meredith |
A Summary of the Autonomic Distributed Firewalls (ADF) Project. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Kai Hwang 0001, Muralidaran Gangadharan |
Micro-Firewalls for Dynamic Network Security with Distributed Intrusion Detection. |
NCA |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Flemming Nielson, Hanne Riis Nielson, René Rydhof Hansen, Jacob Grydholt Jensen |
Validating Firewalls in Mobile Ambients. |
CONCUR |
1999 |
DBLP DOI BibTeX RDF |
|
28 | David B. Ingham, Owen Rees, Andy Norman |
CORBA Transactions through Firewalls. |
DOA |
1999 |
DBLP DOI BibTeX RDF |
|
19 | Sam Burnett, Nick Feamster, Santosh S. Vempala |
Circumventing censorship with collage. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
availability, censorship |
19 | Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh |
Protecting browsers from DNS rebinding attacks. |
ACM Trans. Web |
2009 |
DBLP DOI BibTeX RDF |
spam, firewall, DNS, Same-origin policy, click fraud |
19 | Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee 0001, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim |
Towards complete node enumeration in a peer-to-peer botnet. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
infected hosts enumeration, storm, P2P, botnet |
19 | Robert Schaefer |
Debugging debugged, a metaphysical manifesto of systems integration. |
ACM SIGSOFT Softw. Eng. Notes |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, Angel Jesus Varela-Vaca |
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Achim D. Brucker, Lukas Brügger, Burkhart Wolff |
Model-Based Firewall Conformance Testing. |
TestCom/FATES |
2008 |
DBLP DOI BibTeX RDF |
Model-based Testing, Firewall, Conformance Testing, Security Testing |
19 | Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch |
An inference system for detecting firewall filtering rules anomalies. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
filtering rules, anomalies detection, firewall, inference system |
19 | Baba Piprani, Denise Ernst |
A Model for Data Quality Assessment. |
OTM Workshops |
2008 |
DBLP DOI BibTeX RDF |
Data Quality Assessment, Data Quality Firewall, Data Quality filter, Type Instance, Data lineage |
19 | Thomas Oistrez, Egon Grünter, Markus Meier, Ralph Niederberger |
A Reliable and Fast Data Transfer for Grid Systems Using a Dynamic Firewall Configuration. |
Euro-Par Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Michael Benedikt, Alan Jeffrey, Ruy Ley-Wild |
Stream firewalling of xml constraints. |
SIGMOD Conference |
2008 |
DBLP DOI BibTeX RDF |
query processing, streams, xpath, xml |
19 | Ken Hironaka, Hideo Saito, Kei Takahashi, Kenjiro Taura |
gluepy: A Simple Distributed Python Programming Framework for Complex Grid Environments. |
LCPC |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Alexandre Denis 0001 |
Meta-communications in component-based communication frameworks for grids. |
Clust. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Bootstrap connection, Software components, Grid networking, Control channel |
19 | Sebastian Felis, Martin Stiemerling |
Securing a Path-Coupled NAT/Firewall Signaling Protocol. |
IPOM |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Saikat Guha 0002, Paul Francis |
An end-middle-end approach to connection establishment. |
SIGCOMM |
2007 |
DBLP DOI BibTeX RDF |
NUTSS, end-middle-end, off-path, on-path, signaling |
19 | Liang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo |
Transport Layer Identification of Skype Traffic. |
ICOIN |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Alex X. Liu |
Change-Impact Analysis of Firewall Policies. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Niels Drost, Elth Ogston, Rob van Nieuwpoort, Henri E. Bal |
ARRG: real-world gossiping. |
HPDC |
2007 |
DBLP DOI BibTeX RDF |
peer-to-peer, robust, gossiping, real-World |
19 | Massimo Marchi, Romeo Penzo, Alessandro Provetti |
Policy-Based Parametric Firewall Configuration: A Real-Case Application. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Chun-Ming Leung, Yuen-Yan Chan |
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics. |
WETICE |
2007 |
DBLP DOI BibTeX RDF |
Enterprise Network Security, Network Foren- sics, Traffic Prioritiza- tion, Reverse Engineering, Blocking, Traffic Analysis, Skype, NAT Traversal |
19 | Sebastian Kiesel, Michael Scharf |
Modeling and Performance Evaluation of SCTP as Transport Protocol for Firewall Control. |
Networking |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Pablo Neira Ayuso, Laurent Lefèvre, Rafael M. Gasca |
High Availability support for the design of stateful networking equipments. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
OpenSource, Security, Firewall, High Availability, Stateful |
19 | Feng Liu 0016, Gesan Wang, Wu Chou, Lookman Fazal, Li Li 0001 |
TARGET: Two-way Web Service Router Gateway. |
ICWS |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Dong-Young Lee, Hyung-Jin Lim, Tai-Myoung Chung |
A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall Systems. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
Integrated Security Management, Secure MIB, Agent, Firewall, SNMP |
19 | Errin W. Fulp |
An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper). |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Peter Koski, Jorma Ylinen, Pekka Loula |
The SIP-Based System Used in Connection with a Firewall. |
AICT/ICIW |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Tim Schattkowsky |
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Hoffman, Kevin Yoo |
Blowtorch: a framework for firewall test automation. |
ASE |
2005 |
DBLP DOI BibTeX RDF |
network firewall, production grammar, automated testing, covering array, capture/replay |
19 | Se-Chang Son, Matthew Farrellee, Miron Livny |
A Generic Proxy Mechanism for Secure Middlebox Traversal. |
CLUSTER |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Kristen Accardi, Tony Bock, Frank T. Hady, Jon Krueger |
Network processor acceleration for a Linux* netfilter firewall. |
ANCS |
2005 |
DBLP DOI BibTeX RDF |
hybrid firewall, network firewall, prototype, throughput, network processor, netfilter |
19 | Matjaz B. Juric, Bostjan Kezmah, Marjan Hericko, Ivan Rozman, Ivan Vezocnik |
Java RMI, RMI tunneling and Web services comparison and performance analysis. |
ACM SIGPLAN Notices |
2004 |
DBLP DOI BibTeX RDF |
web services, performance, SOAP, tunneling, RMI |
19 | Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool |
Firmato: A novel firewall management toolkit. |
ACM Trans. Comput. Syst. |
2004 |
DBLP DOI BibTeX RDF |
model definition language, visualization, management, Security policy, firewall |
19 | Alex X. Liu, Mohamed G. Gouda |
Diverse Firewall Design. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Peter Hwang, Dawid Kurzyniec, Vaidy S. Sunderam |
Heterogeneous Parallel Computing Across Multidomain Clusters. |
PVM/MPI |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Utz Roedig, Jens B. Schmitt |
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Ehab Al-Shaer |
Managing firewall and network-edge security policies. |
NOMS (1) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Alan Mislove, Peter Druschel |
Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays. |
IPTPS |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Kenji Kaneda, Kenjiro Taura, Akinori Yonezawa |
Routing and resource discovery in Phoenix Grid-enabled message passing library. |
CCGRID |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Takafumi Yamaya, Toramatsu Shintani, Tadachika Ozono, Yusuke Hiraoka, Hiromitsu Hattori, Takayuki Ito 0001, Naoki Fukuta, Kyoji Umemura |
MiNet: Building Ad-Hoc Peer-to-Peer Networks for Information Sharing Based on Mobile Agents. |
PAKM |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Alexandre Denis 0001, Olivier Aumage, Rutger F. H. Hofman, Kees Verstoep, Thilo Kielmann, Henri E. Bal |
Wide-Area Communication for Grids: An Integrated Solution to Connectivity, Performance and Security Problems. |
HPDC |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Se-Chang Son, Miron Livny |
Recovering Internet Symmetry in Distributed Computing. |
CCGRID |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Mike Surridge, Colin Upstill |
Grid Security: Lessons for Peer-to-Peer Systems. |
Peer-to-Peer Computing |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Shuo Chen 0001, Jun Xu 0003, Ravishankar K. Iyer, Keith Whisnant |
Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors. |
DSN |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Wing Hang Cheung, Michael R. Lyu, Kam-Wing Ng |
Integrating digital libraries by CORBA, XML and Servlet. |
JCDL |
2001 |
DBLP DOI BibTeX RDF |
XML, CORBA |
19 | Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool |
Firmato: A Novel Firewall Management Toolkit. |
S&P |
1999 |
DBLP DOI BibTeX RDF |
|
18 | Avishai Wool |
Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese. |
IEEE Internet Comput. |
2010 |
DBLP DOI BibTeX RDF |
risk sets, network security, firewalls |
18 | Abdeslam En-Nouaary, Mehdi Akiki |
An Integrated Framework for Automated Firewall Testing and Validation. |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
firewall configurations, firewalls, policy languages, white box testing |
18 | Amir R. Khakpour, Alex X. Liu |
Quantifying and Querying Network Reachability. |
ICDCS |
2010 |
DBLP DOI BibTeX RDF |
Network Reachability, firewalls, network configuration, Access control lists, Network Access Control |
18 | William Formyduval |
Integrating static analysis and testing for firewall policies. |
OOPSLA Companion |
2009 |
DBLP DOI BibTeX RDF |
firewall policies, test generation, firewalls |
18 | Tugkan Tuglular, Özgür Kaya, Can Arda Muftuoglu, Fevzi Belli |
Directed Acyclic Graph Modeling of Security Policies for Firewall Testing. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Firewall Policies, Firewall Testing, Firewalls, Directed Acyclic Graphs, Security Testing, Event Sequence Graphs |
18 | Eduardo Horowitz, Luís C. Lamb |
A Hierarchical Model for Firewall Policy Extraction. |
AINA |
2009 |
DBLP DOI BibTeX RDF |
Firewall Extraction Policies, Foundations of Computer Security, Firewalls |
18 | JeeHyun Hwang, Tao Xie 0001, Fei Chen 0001, Alex X. Liu |
Fault Localization for Firewall Policies. |
SRDS |
2009 |
DBLP DOI BibTeX RDF |
Firewall Policy, Policy Testing, Network Security, Firewalls, Fault Localization |
18 | Sergio Pozo, Rafael Ceballos, Rafael M. Gasca |
AFPL, an Abstract Language Model for Firewall ACLs. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
ruleset, model, access control, language, firewalls, acl |
18 | Pi-Chung Wang, Chun-Liang Lee, Chia-Tai Chan, Hung-Yi Chang |
Performance improvement of two-dimensional packet classification by filter rephrasing. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
quality of service (QoS), firewalls, packet classification, forwarding |
18 | Paul Z. Kolano |
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
multiport protocols, security, grids, Firewalls, high performance networking, network access control |
18 | I. A. Almerhag, Michael E. Woodward |
Security as a quality of service routing problem. |
CoNEXT |
2005 |
DBLP DOI BibTeX RDF |
quality of service, authentication, network security, encryption, IDS, firewalls, routing metric |
18 | Mike Andrews, James A. Whittaker |
Computer Security. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
defense in depth, computer security, attackers, firewalls, vulnerability |
18 | Nancy P. Kutner |
Viruses, updates, and security: making the campus aware. |
SIGUCCS |
2004 |
DBLP DOI BibTeX RDF |
anti-virus software, security, documentation, spam, firewalls, worms, E-mail, viruses |
18 | Sumeet Singh, Florin Baboescu, George Varghese, Jia Wang |
Packet classification using multidimensional cutting. |
SIGCOMM |
2003 |
DBLP DOI BibTeX RDF |
QoS, firewalls, packet classification |
18 | Prabhaker Mateti |
A laboratory-based course on internet security. |
SIGCSE |
2003 |
DBLP DOI BibTeX RDF |
TCP/IP exploits, network security, ethics, firewalls, buffer overflow, internet security |
18 | Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith |
Implementing a distributed firewall. |
CCS |
2000 |
DBLP DOI BibTeX RDF |
OpenBSD, access control, network security, distributed, IP, trust management, firewalls, IPsec, credentials, KeyNote, IKE |
18 | Stefan Mink, Frank Pählke, Günter Schäfer, Jochen H. Schiller |
FATIMA: A Firewall-Aware Transparent Internet Mobility Architecture. |
ISCC |
2000 |
DBLP DOI BibTeX RDF |
Security, Internet Protocol, Mobile Communications, Firewalls, Mobile IP, Micro-Mobility |
18 | W. R. Soley |
Scalable security in an unimaginably large Internet. |
FTDCS |
1997 |
DBLP DOI BibTeX RDF |
scalable security, connected device diversity, Internet, access control, firewalls, Internet security |
18 | Hongliang Liang, Xiangyu Li, Da Xiao, Jie Liu, Yanjie Zhou, Aibo Wang, Jin Li |
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls. |
IEEE Trans. Dependable Secur. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Di Li, Yikun Hu, Guoqing Xiao 0001, Mingxing Duan, Kenli Li 0001 |
An active defense model based on situational awareness and firewalls. |
Concurr. Comput. Pract. Exp. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yuyang Zhou, Zhebin Hu, Fagen Li |
Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage. |
IEEE Trans. Cloud Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tatjana Kapus |
Improved Formal Verification of SDN-Based Firewalls by Using TLA+. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Azam Andalib, Seyed Morteza Babamir |
Anomaly detection of policies in distributed firewalls using data log analysis. |
J. Supercomput. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mohammadhossein Amouei, Mohsen Rezvani, Mansoor Fateh |
RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Juyan Li, Ye Fan, Xuefen Bian, Qi Yuan |
Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT. |
Entropy |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Paula Arnold, Sebastian Berndt 0001, Jörn Müller-Quade, Astrid Ottenhues |
Protection Against Subversion Corruptions via Reverse Firewalls in the plain Universal Composability Framework. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza |
Automating the configuration of firewalls and channel protection systems in virtual networks. |
NetSoft |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Katharina Dietz 0001, Nicholas Gray, Manuel Wolz, Claas Lorenz, Tobias Hoßfeld, Michael Seufert |
Moving Down the Stack: Performance Evaluation of Packet Processing Technologies for Stateful Firewalls. |
NOMS |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Akihiro Shoji, Yasushi Shinjo |
Implementation method of non-bypassable PC application firewalls using virtualization technologies. |
HPCC/DSS/SmartCity/DependSys |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yang Zhao, Xingyu Ke, Yuwei Pang, Hu Xiong, Guobin Zhu, Kuo-Hui Yeh |
Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls. |
BDTA |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Wassim Mohamed Laïd Koribeche, David Espes, Cédric Morin |
UDP State Manipulation: Description of a Packet Filtering Vulnerability in Stateful Firewalls. |
FPS (1) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar |
Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge. |
EUROCRYPT (1) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac, Radu Tarabuta |
Distributed Firewall Traffic Filtering and Intrusion Detection Using Snort on pfSense Firewalls with Random Forest Classification. |
TSP |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Naoyuki Ito, Takashi Oshiba, Kozo Satoda, Tutomu Murase |
PathRakeTCP: Available Bandwidth Estimation Using Multiple TCP Connections for Passing through Firewalls. |
ICCE |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tri-Chan-Hung Nguyen, Minh-Khoi Le-Nguyen, Dinh-Thuan Le, Van-Hoa Nguyen, Long-Phuoc Tôn, Khuong Nguyen-An |
Improving Web Application Firewalls with Automatic Language Detection. |
SN Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Taha Elamine Hadjadj, Adel Bouhoula, Rim Tebourbi, Riadh Ksantini |
Optimization of parallel firewalls filtering rules. |
Int. J. Inf. Sec. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Mojtaba Hemmati, Mohammad Ali Hadavi |
Bypassing Web Application Firewalls Using Deep Reinforcement Learning. |
ISC Int. J. Inf. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Assia Tria |
Photonic power firewalls. |
J. Cryptogr. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Ke Li, Heng Yang 0008, Willem Visser |
Evolutionary Multi-Task Injection Testing on Web Application Firewalls. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar |
Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
18 | Yi Wang 0055, Rongmao Chen, Xinyi Huang 0001, Baosheng Wang |
Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls. |
IEEE Trans. Dependable Secur. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Mohammadhossein Amouei, Mohsen Rezvani, Mansoor Fateh |
RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls. |
IEEE Trans. Dependable Secur. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Xiaoyi Chen, Qingni Shen, Peng Cheng 0005, Yongqiang Xiong, Zhonghai Wu |
RuleCache: Accelerating Web Application Firewalls by On-line Learning Traffic Patterns. |
ICWS |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Amit Klein 0001 |
Subverting Stateful Firewalls with Protocol States. |
NDSS |
2022 |
DBLP BibTeX RDF |
|
18 | Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Lucia Seno, Adriano Valenzano |
Open-source firewalls for industrial applications: a laboratory study of Linux IPFire behavior*. |
IECON |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Junyan Liang, Yoohwan Kim |
Evolution of Firewalls: Toward Securer Network Using Next Generation Firewall. |
CCWC |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Penghui Su, Yan Gao, Ming Chen 0003 |
A Novel Firewalls ConFigure Fault and Its Repair Method. |
CBD |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Muhammad Iftikhar Hussain, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Fahad Razque, Saqib Hussain, Muhammad Salman Pathan |
An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls. |
J. Intell. Fuzzy Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Dave Klein |
Relying on firewalls? Here's why you'll be hacked. |
Netw. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Michael Alicea, Izzat Alsmadi |
Misconfiguration in Firewalls and Network Access Controls: Literature Review. |
Future Internet |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Chaya Ganesh, Bernardo Magri, Daniele Venturi 0001 |
Cryptographic reverse firewalls for interactive proof systems. |
Theor. Comput. Sci. |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Amit Klein 0001 |
Subverting Stateful Firewalls with Protocol States (Extended Version). |
CoRR |
2021 |
DBLP BibTeX RDF |
|
Displaying result #101 - #200 of 803 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|