Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | JeeHyun Hwang, Tao Xie 0001, Fei Chen 0001, Alex X. Liu |
Systematic Structural Testing of Firewall Policies. |
IEEE Trans. Netw. Serv. Manag. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Fei Chen 0001, Alex X. Liu, JeeHyun Hwang, Tao Xie 0001 |
First step towards automatic correction of firewall policy faults. |
ACM Trans. Auton. Adapt. Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Ehsan Saboori, Shafigh Parsazad, Yasaman Sanatkhani |
Automatic firewall rules generator for anomaly detection systems with Apriori algorithm |
CoRR |
2012 |
DBLP BibTeX RDF |
|
15 | Harleen Kaur, Omid Mahdi Ebadati E., Mohd. Afshar Alam |
Implementation of Portion Approach in Distributed Firewall Application for Network Security Framework |
CoRR |
2012 |
DBLP BibTeX RDF |
|
15 | Philipp Winter, Jedidiah R. Crandall |
The Great Firewall of China: How It Blocks Tor and Why It Is Hard to Pinpoint. |
login Usenix Mag. |
2012 |
DBLP BibTeX RDF |
|
15 | Qi Liao 0002, Zhen Li 0025, Aaron Striegel |
Could firewall rules be public - a game theoretical perspective. |
Secur. Commun. Networks |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Sergio Pozo, Rafael M. Gasca, Antonia M. Reina Quintero, Angel Jesus Varela-Vaca |
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework. |
J. Syst. Softw. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Toshikazu Samura, Hatsuo Hayashi |
Directional spike propagation in a recurrent network: Dynamical firewall as anisotropic recurrent inhibition. |
Neural Networks |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Linquan Xie, Fei Yu 0001, Chen Xu |
Distributed Firewall with Intrusion Detection System. |
J. Comput. |
2012 |
DBLP BibTeX RDF |
|
15 | Alex X. Liu |
Firewall policy change-impact analysis. |
ACM Trans. Internet Techn. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni |
Detecting and Resolving Firewall Policy Anomalies. |
IEEE Trans. Dependable Secur. Comput. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Yakkala V. Naga Manikanta, Anjali Sardana |
Protecting web applications from SQL injection attacks by using framework and database firewall. |
ICACCI |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Muhammad Mahmoud, Sonia Chiasson, Ashraf Matrawy |
Does context influence responses to firewall warnings? |
eCrime Researchers Summit |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Yordanos Beyene, Michalis Faloutsos, Harsha V. Madhyastha |
SyFi: A Systematic Approach for Estimating Stateful Firewall Performance. |
PAM |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Tarik Moataz, Xavier Rimasson |
Handling Stateful Firewall Anomalies. |
SEC |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Bassam Khorchani, Sylvain Hallé, Roger Villemaire |
Firewall anomaly detection with a model checker for visibility logic. |
NOMS |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Leonardo Maccari, Renato Lo Cigno |
Privacy in the pervasive era: A distributed firewall approach. |
WONS |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Florian Mansmann, Timo Göbel, William R. Cheswick |
Visual analysis of complex firewall configurations. |
VizSEC |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Safaa Zeidan |
Multilevel early packet filtering technique based on traffic statistics and splay trees for firewall performance improvement. |
ICC |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Leonardo Maccari |
A Collaborative Firewall for Wireless Ad-Hoc Social Networks. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
15 | Lingfang Huang |
The Firewall Technology Study of Network Perimeter Security. |
APSCC |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Philipp Winter, Stefan Lindskog |
How the Great Firewall of China is Blocking Tor. |
FOCI |
2012 |
DBLP BibTeX RDF |
|
15 | Ping Yi, Ting Zhu 0001, Qingquan Zhang, Yue Wu 0010, Jianhua Li 0001 |
Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network. |
GLOBECOM |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Urjita Thakar, Lalit Purohit, Akhilesh Pahade |
An approach to improve performance of a packet-filtering firewall. |
WOCN |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Hishem El Sayed, Safaa Zeidan |
Firewall packet matching optimization using network traffic behavior and packet matching statistics. |
COMNET |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Andy Applebaum, Karl N. Levitt, Jeff Rowe, Simon Parsons |
Arguing About Firewall Policy. |
COMMA |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex X. Liu, Dan Pei, Jia Wang 0001 |
Firewall fingerprinting. |
INFOCOM |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Amjad Gawanmeh, Sofiène Tahar |
Novel algorithm for detecting conflicts in firewall rules. |
CCECE |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Zahra Tavakoli, Sebastian Meier, Alexander Vensmer |
A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment. |
EUNICE |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Zhiyun Qian, Zhuoqing Morley Mao |
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security. |
IEEE Symposium on Security and Privacy |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Jorge Lobo 0001, Massimo Marchi, Alessandro Provetti |
Firewall Configuration Policies for the Specification and Implementation of Private Zones. |
POLICY |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Liren Zhang, Safaa Zeidan |
Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test. |
ICICS |
2012 |
DBLP DOI BibTeX RDF |
|
15 | George P. Corser |
A tale of two CTs: IP packets rejected by a firewall. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Niels Provos |
Firewall. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | |
Firewall Policy Analysis. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Paul A. Henry |
Firewall Architectures: Viruses and Worms. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Paul A. Henry |
Firewall Architectures: Platforms. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Paul A. Henry |
Firewall Architectures: Other Issues. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Paul A. Henry |
Firewall Architectures. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Per Thorsheim |
Firewall Technologies: Comparison. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Steve Gold |
The future of the firewall. |
Netw. Secur. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Michael Hamelin |
Preparing for a firewall audit. |
Netw. Secur. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Cássio Ditzel Kropiwiec, Edgard Jamhour, Manoel Camillo Penna, Guy Pujolle |
Multi-constraint security policies for delegated firewall administration. |
Int. J. Netw. Manag. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Kenro Yatake, Takuya Katayama |
An executable object-oriented semantics and its application to firewall verification. |
Softw. Syst. Model. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Alex X. Liu, Fei Chen 0001 |
Privacy Preserving Collaborative Enforcement of Firewall Policies in Virtual Private Networks. |
IEEE Trans. Parallel Distributed Syst. |
2011 |
DBLP DOI BibTeX RDF |
privacy, network security, Virtual private networks |
15 | Afolayan Ayodele Obiniyi, Ezugwu E. Absalom, Mohammed Dikko |
Network Security and Firewall Technology: A Step to Safety of National IT Vision. |
Int. J. Dependable Trust. Inf. Syst. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Vadim Zaliva |
Applying static code analysis to firewall policies for the purpose of anomaly detection |
CoRR |
2011 |
DBLP BibTeX RDF |
|
15 | Nenad Stojanovski, Marjan Gusev |
Architecture Of A Identity Based Firewall System |
CoRR |
2011 |
DBLP BibTeX RDF |
|
15 | Wooram Park, Chanik Park |
Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment. |
J. Comput. Sci. Eng. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Moath Hashim Alsafasfeh, Abdel Ilah Alshbatat |
Configuring Snort as a Firewall on Windows 7 Environment. |
J. Ubiquitous Syst. Pervasive Networks |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Subana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi |
Design and Implementation of Conflict Detection System for Time-Based Firewall Policies. |
J. Next Gener. Inf. Technol. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Chi-Shih Chao, Stephen Jen-Hwa Yang |
A novel three-tiered visualization approach for firewall rule validation. |
J. Vis. Lang. Comput. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Rossouw von Solms, Matthew J. Warren |
Towards the Human Information Security Firewall. |
Int. J. Cyber Warf. Terror. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Subana Thanasegaran, Yi Yin, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi |
A Topology-Based Conflict Detection System for Firewall Policies using Bit-Vector-Based Spatial Calculus. |
Int. J. Commun. Netw. Syst. Sci. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Thierry Bessis, Vijay K. Gurbani, Ashwin Rana |
Session Initiation Protocol firewall for the IP Multimedia Subsystem core. |
Bell Labs Tech. J. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Saleem-Ullah Lar, Xiaofeng Liao 0001, Aqeel-ur Rehman, Ma Qinglu |
Proactive Security Mechanism and Design for Firewall. |
J. Information Security |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Haiping Xu, Abhinay Reddyreddy, Daniel F. Fitch |
Defending Against XML-Based Attacks Using State-Based XML Firewall. |
J. Comput. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Mahmoud Mostafa, Anas Abou El Kalam, Dragos Minuta, Christian Fraboul |
QoS-aware Firewall Session Table. |
CRiSIS |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Safaa Zeidan |
Splay trees based early packet rejection mechanism against DoS traffic targeting firewall default security rule. |
WIFS |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Gertjan P. Halkes, Johan A. Pouwelse |
UDP NAT and Firewall Puncturing in the Wild. |
Networking (2) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Arief Wicaksana, Arif Sasongko |
Fast and reconfigurable packet classification engine in FPGA-based firewall. |
ICEEI |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Hassina Bensefia, Nacira Ghoualmi-Zine |
An Intelligent System for Decision Making in Firewall Forensics. |
DICTAP (1) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Nihel Ben Youssef, Adel Bouhoula |
Dealing with Stateful Firewall Checking. |
DICTAP (1) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Nihel Ben Youssef, Adel Bouhoula |
A Fully Automatic Approach for Fixing Firewall Misconfigurations. |
CIT |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Dariusz Palka, Marek Zachara |
Learning Web Application Firewall - Benefits and Caveats. |
ARES |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Hironao Takahashi, Hafiz Farooq Ahmad, Kinji Mori |
Application for Autonomous Decentralized Multi Layer Cache System to Web Application Firewall. |
ISADS |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Amjad Gawanmeh, Sofiène Tahar |
Modeling and verification of firewall configurations using domain restriction method. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
15 | Tugkan Tuglular, Gurcan Gercek |
Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Saeed Al-Haj, Ehab Al-Shaer |
Measuring Firewall Security. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Matthias Wilhelm 0001, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders |
WiFire: a firewall for wireless networks. |
SIGCOMM |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Ui-Hyong Kim, Jung-Min Kang, Jae-Sung Lee, Hyong-Shik Kim |
Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization. |
ICITCS |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Raouf Ajami, Anh Dinh |
Embedded Network Firewall on FPGA. |
ITNG |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Liren Zhang, Safaa Zeidan |
Packet flow histograms to improve firewall efficiency. |
ICICS |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Wang, Konstantin Beznosov |
Promoting a physical security mental model for personal firewall warnings. |
CHI Extended Abstracts |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Johann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger |
Privacy Protection for Smartphones: An Ontology-Based Firewall. |
WISTP |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Elias P. Duarte Jr., Kleber Vieira Cardoso, Micael O. M. C. de Mello, João G. G. Borges |
Transparent Communications for Applications behind NAT/Firewall over any Transport Protocol. |
ICPADS |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Hrishikesh B. Acharya, Mohamed G. Gouda |
Firewall verification and redundancy checking are equivalent. |
INFOCOM |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Fei Chen 0001, Bezawada Bruhadeshwar, Alex X. Liu |
A cross-domain privacy-preserving protocol for cooperative firewall optimization. |
INFOCOM |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Clement Wang, Konstantin Beznosov |
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings. |
SOUPS |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Chi-Shih Chao |
A flexible and feasible anomaly diagnosis system for Internet firewall rules. |
APNOMS |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Hyeonwoo Kim, Hongtaek Ju |
Efficient method for inferring a firewall policy. |
APNOMS |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Sapan Bhatia, Andy C. Bavier, Larry L. Peterson, Soner Sevinc |
sfatables: A Firewall-like Policy Engine for Federated Systems. |
ICDCS |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Archana Mishra, Abhishek Agrawal, Rajeev Ranjan |
Artificial intelligent firewall. |
ACAI |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Debmalya Biswas, Kathryn Bean, Florian Kerschbaum |
NAT/Firewall traversal cost model for publish-subscribe systems. |
ICPE |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Raouf Ajami, Anh Dinh |
Design a hardware network firewall on FPGA. |
CCECE |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Bin Zhang 0007, Ehab Al-Shaer |
On synthesizing distributed firewall configurations considering risk, usability and cost constraints. |
CNSM |
2011 |
DBLP BibTeX RDF |
|
15 | Muhammad Abedin, Syeda Nessa, Latifur Khan, Ehab Al-Shaer, Mamoun Awad |
Analysis of firewall policy rules using traffic mining techniques. |
Int. J. Internet Protoc. Technol. |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Prasad Calyam, Gregg Trueb, Nathan Howes |
Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems. |
Int. J. Internet Protoc. Technol. |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Avishai Wool |
Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese. |
IEEE Internet Comput. |
2010 |
DBLP DOI BibTeX RDF |
risk sets, network security, firewalls |
15 | Michael Hamelin |
Preventing firewall meltdowns. |
Netw. Secur. |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Seong-Hwan Kim 0004, Sundar Vedantham, Pravin Pathak |
SMB gateway firewall implementation using a network processor. |
Netw. Secur. |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Andreea Ancuta Onofrei, Yacine Rebahi, Thomas Magedanz |
Preventing Distributed Denial-of-Service Attacks on the IMS Emergency Services Support through Adaptive Firewall Pinholing |
CoRR |
2010 |
DBLP BibTeX RDF |
|
15 | Sugam Sharma, Hari Cohly, Tzusheng Pei |
On Generation of Firewall Log Status Reporter (SRr) Using Perl |
CoRR |
2010 |
DBLP BibTeX RDF |
|
15 | N. K. Sreelaja, G. A. Vijayalakshmi Pai |
Ant Colony Optimization based approach for efficient packet filtering in firewall. |
Appl. Soft Comput. |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Martin Stiemerling, Hannes Tschofenig, Cedric Aoun, Elwyn B. Davies |
NAT/Firewall NSIS Signaling Layer Protocol (NSLP). |
RFC |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Alex X. Liu |
Firewall Design and Analysis |
|
2010 |
DOI RDF |
|
15 | Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey Kouprienko, Oleg Zayats |
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation. |
Security and Management |
2010 |
DBLP BibTeX RDF |
|
15 | Anton Titov, Vladimir S. Zaborovsky |
Firewall Configuration based on Specifications of Access Policy and Network Environment. |
Security and Management |
2010 |
DBLP BibTeX RDF |
|
15 | Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar |
Security Analysis of Firewall Rule Sets in Computer Networks. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Hironao Takahashi, Kinji Mori, Hafiz Farooq Ahmad |
Autonomous Short Latency System for Web Application Layer Firewall. |
SERVICES |
2010 |
DBLP DOI BibTeX RDF |
WAF, L3 Block cache, block I/O device, IOPS, Jmeter, Locality of reference |