|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 762 occurrences of 447 keywords
|
|
|
Results
Found 1260 publication records. Showing 1260 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
24 | Shuo Chen 0001, Jun Xu 0003, Ravishankar K. Iyer, Keith Whisnant |
Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2002 International Conference on Dependable Systems and Networks (DSN 2002), 23-26 June 2002, Bethesda, MD, USA, Proceedings, pp. 495-504, 2002, IEEE Computer Society, 0-7695-1597-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Harald Rölle |
A Hot-Failover State Machine for Gateway Services and Its Application to a Linux Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Management Technologies for E-Commerce and E-Business Applications, 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2002, Montreal, Canada, October 21-23, 2002, Proceedings, pp. 181-194, 2002, Springer, 3-540-00080-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Lili Qiu, George Varghese, Subhash Suri |
Fast firewall implementations for software-based and hardware-based routers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS/Performance ![In: Proceedings of the Joint International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS/Performance 2001, June 16-20, 2001, Cambridge, MA, USA, pp. 344-345, 2001, ACM, 1-58113-334-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Scott Hazelhurst, Adi Attar, Raymond Sinnappan |
Algorithms for Improving the Dependability of Firewall and Filter Rule Lists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 25-28 June 2000, New York, NY, USA, pp. 576-585, 2000, IEEE Computer Society, 0-7695-0707-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Boolean decision diagrams, validation, filtering, firewalls, traffic management |
24 | Kelly Djahandari, Daniel F. Sterne |
An MBone Proxy for an Application Gateway Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 72-81, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
24 | Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth |
Limitations of the Approach of Solving a Network's Security Problem with a Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings, pp. 144-145, 1996, Springer, 3-540-61770-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
19 | Sanjeev Kumar, Einar Petana |
Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 238-242, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Denial of Service (DoS) attacks, TCP SYN attack, Windows XP Service Pack2 operating system, Internet Security |
19 | Matthew Burnside, Angelos D. Keromytis |
Path-Based Access Control for Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 191-203, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Path-based, SOA, access control, enterprise, Keynote |
19 | Asaad Moosa, Eanas Muhsen Alsaffar |
Proposing a hybrid-intelligent framework to secure e-government web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, ICEGOV 2008, Cairo, Egypt, December 1-4, 2008, pp. 52-59, 2008, ACM, 978-1-60558-386-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
negative logic based filtering, positive logic based filtering, session based filtering, web application firewalls, whitelist, neural networks, fuzzy logic, e-government, web application, blacklist |
19 | Blaine A. D'Amico |
Desktop security in an academic environment...: how to herd cats successfully. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 35th Annual ACM SIGUCCS Conference on User Services 2007, Orlando, Florida, USA, October 7-10, 2007, pp. 46-50, 2007, ACM, 978-1-59593-634-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
fingerprint, signature, vulnerability, patch |
19 | Kai Ouyang, Xiaowen Chu 0001, Lijun Dong, Hengqing Wang, Ting Cai |
MLCC: A Multi Layered Correlative Control Mechanism for the VPN Topology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2007, 29-31 July 2007, Guilin, China, pp. 37-43, 2007, IEEE Computer Society, 0-7695-2927-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Tim Chenoweth, Robert P. Minch, Sharon W. Tabor |
User Security Behavior on Wireless Networks: An Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 145, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Emmanuel Hooper |
An Intelligent Intrusion Detection and Response System Using Network Quarantine Channels: Firewalls and Packet Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 1193-1198, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Ala Rezmerita, Tangui Morlier, Vincent Néri, Franck Cappello |
Private Virtual Cluster: Infrastructure and Protocol for Instant Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par ![In: Euro-Par 2006, Parallel Processing, 12th International Euro-Par Conference, Dresden, Germany, August 28 - September 1, 2006, Proceedings, pp. 393-404, 2006, Springer, 3-540-37783-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
A Client-Transparent Approach to Defend Against Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006),2-4 October 2006, Leeds, UK, pp. 61-70, 2006, IEEE Computer Society, 0-7695-2677-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Client Transparency, Denial of Service (DoS) attacks, Authentication, Availability, Web Servers |
19 | Costantina Caruso, Donato Malerba, Davide Papagni |
Learning the Daily Model of Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 15th International Symposium, ISMIS 2005, Saratoga Springs, NY, USA, May 25-28, 2005, Proceedings, pp. 131-141, 2005, Springer, 3-540-25878-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
daily model, data mining, machine learning, Anomaly detection, network traffic analysis, symbolic data analysis |
19 | Everett Anderson, Kevin Eustice, Shane Markstrum, Mark H. Hansen, Peter L. Reiher |
Mobile Contagion: Simulation of Infection and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PADS ![In: 19th Workshop on Parallel and Distributed Simulation, PADS 20055, Monterey, CA, USA, June 1-3, 2005, pp. 80-87, 2005, IEEE Computer Society, 0-7695-2383-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Shinsuke Suzuki, Satoshi Kondo |
Dynamic Network Separation for IPv6 Network Security Enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January - 4 February 2005, Trento, Italy, pp. 22-25, 2005, IEEE Computer Society, 0-7695-2263-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Mian Zhou, Robert Lee, Sheau-Dong Lang |
Locality-based Profile Analysis for Secondary Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 8th International Symposium on Parallel Architectures, Algorithms, and Networks, ISPAN 2005, December 7-9. 2005, Las Vegas, Nevada, USA, pp. 166-173, 2005, IEEE Computer Society, 0-7695-2509-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Se-Chang Son, Matthew Farrellee, Miron Livny |
A Generic Proxy Mechanism for Secure Middlebox Traversal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLUSTER ![In: 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26 - 30, 2005, Boston, Massachusetts, USA, pp. 1-10, 2005, IEEE Computer Society, 0-7803-9485-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Xinyou Zhang, Chengzhong Li, Wenbin Zheng |
Intrusion Prevention System Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 2004 International Conference on Computer and Information Technology (CIT 2004), 14-16 September 2004, Wuhan, China, pp. 386-390, 2004, IEEE Computer Society, 0-7695-2216-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Sherif M. Khattab, Chatree Sangpachatanaruk, Daniel Mossé, Rami G. Melhem, Taieb Znati |
Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 24th International Conference on Distributed Computing Systems (ICDCS 2004), 24-26 March 2004, Hachioji, Tokyo, Japan, pp. 328-337, 2004, IEEE Computer Society, 0-7695-2086-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Miyoung Kim, Misun Kim, Youngsong Mun |
Design and Implementation of the HoneyPot System with Focusing on the Session Redirection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 262-269, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Lu Yan |
Via Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 474-481, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | C. Edward Chow, Paul J. Fong, Ganesh Godavari |
An Exercise in Constructing Secure Mobile Ad hoc Network (SMANET). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 436-440, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Voravud Santiraveewan, Yongyuth Permpoontanalarp |
A Graph-based Methodology for Analyzing IP Spoofing Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 227-231, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IP spoofing and Formal Method for Network Security, Network Security, Firewalls |
19 | Eun-Ser Lee, Sun-myoung Hwang |
Software Design Method Enhanced by Appended Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (1) ![In: Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part I, pp. 578-585, 2004, Springer, 3-540-23974-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège |
A Formal Approach to Specify and Deploy a Network Security Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 203-218, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | David Lim, Christopher E. Neely, Christopher K. Zuver, John W. Lockwood |
Internet-based Tool for System-on-Chip Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSE ![In: 2003 International Conference on Microelectronics Systems Education, MSE 2003, Educating Tomorrow's Microsystems Designers, Anaheim, CA, USA, June 1-2, 2003, pp. 117-118, 2003, IEEE Computer Society, 0-7695-1973-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Miyoung Kim, Misun Kim, Hyewon K. Lee, Youngsong Mun |
Design of Active HoneyPot System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part II, pp. 356-364, 2003, Springer, 3-540-40161-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith |
The STRONGMAN Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (1) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 178-188, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Anindya Datta, Kaushik Dutta, Helen M. Thomas, Debra E. VanderMeer, Suresha, Krithi Ramamritham |
Proxy-based acceleration of dynamically generated content on the world wide web: an approach and implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, USA, June 3-6, 2002, pp. 97-108, 2002, ACM, 1-58113-497-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
proxy-based caching, dynamic content, edge caching |
19 | Rocky K. C. Chang, King P. Fung |
Transport layer proxy for stateful UDP packet filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 595-600, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Anindya Datta, Kaushik Dutta, Helen M. Thomas, Debra E. VanderMeer, Krithi Ramamritham, Suresha |
A Proxy-Based Approach for Dynamic Content Acceleration on the WWW. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WECWIS ![In: Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS'02), Newport Beach, California, USA, June 26-28, 2002, pp. 159-164, 2002, IEEE Computer Society, 0-7695-1567-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Hee Suk Seo, Tae Ho Cho |
Modeling and Simulation for Detecting a Distributed Denial of Service Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Joint Conference on Artificial Intelligence ![In: AI 2002: Advances in Artificial Intelligence, 15th Australian Joint Conference on Artificial Intelligence, Canberra, Australia, December 2-6, 2002, Proceedings, pp. 179-190, 2002, Springer, 3-540-00197-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Asuman Dogac, M. Ezbiderli, Yusuf Tambag, C. Icdem, Arif Tumer, Nesime Tatbul, N. Hamali, Catriel Beeri |
The MARIFlow Workflow Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 16th International Conference on Data Engineering, San Diego, California, USA, February 28 - March 3, 2000, pp. 193, 2000, IEEE Computer Society, 0-7695-0506-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Internet, Agent, Workflow, Web |
19 | Paola Dotti, Owen Rees |
Protecting the Hosted Application Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 8th Workshop on Enabling Technologies (WETICE '99), Infrastructure for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA, Proceedings, pp. 164-167, 1999, IEEE Computer Society, 0-7695-0365-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
19 | John T. McHenry, Patrick W. Dowd, Frank A. Pellegrino, Todd M. Carrozzi, W. B. Cocks |
An FPGA-based coprocessor for ATM firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 5th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM '97), 16-18 April 1997, Napa Valley, CA, USA, pp. 30-39, 1997, IEEE Computer Society, 0-8186-8159-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Hermann Kopetz, Roman Nossal |
Temporal firewalls in large distributed real-time systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 29-31 October 1997, Tunis, Tunisia, Proceedings, pp. 310-315, 1997, IEEE Computer Society, 0-8186-8153-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
large distributed real-time systems, temporal firewalls, autonomous subsystems, stable control-free interfaces, encapsulated subsystem, static properties, controlled object, real-time systems, complexity, abstraction, error propagation, system partitioning |
16 | Paulo Sousa 0001, Alysson Neves Bessani, Miguel Correia 0001, Nuno Ferreira Neves, Paulo Veríssimo |
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 21(4), pp. 452-465, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
reactive recovery, firewall, Intrusion tolerance, proactive recovery |
16 | Feng Liu 0016, Weiping Guo, Zhi Qiang Zhao, Wu Chou |
SaaS Integration for Software Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: IEEE International Conference on Cloud Computing, CLOUD 2010, Miami, FL, USA, 5-10 July, 2010, pp. 402-409, 2010, IEEE Computer Society, 978-1-4244-8207-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
web services, SOA, Firewall, SaaS |
16 | Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov, Kellogg S. Booth |
Investigating an appropriate design for personal firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Extended Abstracts Volume, Atlanta, Georgia, USA, April 10-15, 2010, pp. 4123-4128, 2010, ACM, 978-1-60558-930-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
personal firewall, usable security |
16 | Hrishikesh B. Acharya, Mohamed G. Gouda |
Projection and Division: Linear-Space Verification of Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 2010 International Conference on Distributed Computing Systems, ICDCS 2010, Genova, Italy, June 21-25, 2010, pp. 736-743, 2010, IEEE Computer Society, 978-0-7695-4059-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
firewall verification, projection, division |
16 | Jefferson Tan, David Abramson 0001, Colin Enticott |
A Virtual Connectivity Layer for Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eScience ![In: Fifth International Conference on e-Science, e-Science 2009, 9-11 December 2009, Oxford, UK, pp. 307-312, 2009, IEEE Computer Society, 978-0-7695-3877-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
firewall virtualization, Grid, tunneling |
16 | Jan Wiebelitz, Christopher Kunz, Stefan Piger, Christian Grimm |
TCP-AuthN: TCP Inline Authentication to Enhance Network Security in Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPDC ![In: Eighth International Symposium on Parallel and Distributed Computing, ISPDC 2009, Lisbon, Portugal, June 30-July 4 2009, pp. 237-240, 2009, IEEE Computer Society, 978-0-7695-3680-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, Authentication, Grid, Firewall |
16 | Jad Naous, Ryan Stutsman, David Mazières, Nick McKeown, Nickolai Zeldovich |
Delegating network security with more information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WREN ![In: Proceedings of the 1st ACM SIGCOMM 2009 Workshop on Research on Enterprise Networking, WREN 2009, Barcelona, Spain, August 21, 2009, pp. 19-26, 2009, ACM, 978-1-60558-443-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network policy, network security, network management, firewall, ident |
16 | Bing-Heng Peng, Huai-Jen Liu, Huan-Yun Wei |
Performance Improvement over Linux Layer-7 Content Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: MSN 2009, The Fifth International Conference on Mobile Ad-hoc and Sensor Networks, Wu Yi Mountain, Fujian, China , December 14-16, 2009, pp. 522-527, 2009, IEEE Computer Society, 978-0-7695-3935-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
L7filter, firewall, content filter, Netfilter |
16 | Young H. Cho, William H. Mangione-Smith |
Deep network packet filter design for reconfigurable devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 7(2), pp. 21:1-21:26, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
string filter, Firewall, worm, network intrusion detection, virus |
16 | Adam Barth, Collin Jackson, John C. Mitchell |
Robust defenses for cross-site request forgery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 75-88, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cross-site request forgery, http referer header, web application firewall, same-origin policy |
16 | Sourour Meharouech, Adel Bouhoula, Tarek Abbes |
Collaboration between Security Devices toward improving Network Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA, pp. 13-18, 2008, IEEE Computer Society, 978-0-7695-3131-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Collaboration between Security Devices, vulnerability scanner, Network Security, Firewall, Honeypot, IPS |
16 | Olalekan Adeyinka |
Internet Attack Methods and Internet Security Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: Second Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, Malaysia, May 13-15, 2008, pp. 77-82, 2008, IEEE Computer Society, 978-0-7695-3136-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Cryptography, Integrity, Intrusion Detection Systems (IDS), Confidentiality, Firewall, Worms, Virus |
16 | Baba Piprani, Denise Ernst |
A Model for Data Quality Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems: OTM 2008 Workshops, OTM Confederated International Workshops and Posters, ADI, AWeSoMe, COMBEK, EI2N, IWSSA, MONET, OnToContent + QSI, ORM, PerSys, RDDS, SEMELS, and SWWS 2008, Monterrey, Mexico, November 9-14, 2008. Proceedings, pp. 750-759, 2008, Springer, 978-3-540-88874-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Data Quality Assessment, Data Quality Firewall, Data Quality filter, Type Instance, Data lineage |
16 | Steve Harris, Jeremy Gibbons, Jim Davies, Andrew Tsui, Charles Crichton |
Semantic technologies in electronic government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, ICEGOV 2008, Cairo, Egypt, December 1-4, 2008, pp. 45-51, 2008, ACM, 978-1-60558-386-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ISO 11179, SKOS, application firewall, ontology, XML, semantic web, interoperability, metadata, OWL, RDF, SPARQL, XMI, SAWSDL, semantic markup |
16 | Mirco Marchetti, Michele Colajanni |
Adaptive traffic filtering for efficient and secure IP-mobility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'08 - Proceedings of the 4th ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, October 27-28, 2008, pp. 43-50, 2008, ACM, 978-1-60558-237-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dynamic firewall reconfiguration, egress filtering, mobile IP |
16 | José Carlos Brustoloni |
Laboratory experiments for network security instruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Educ. Resour. Comput. ![In: ACM J. Educ. Resour. Comput. 6(4), pp. 5, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle |
16 | Pablo Neira Ayuso, Laurent Lefèvre, Rafael M. Gasca |
High Availability support for the design of stateful networking equipments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 254-261, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
OpenSource, Security, Firewall, High Availability, Stateful |
16 | Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu |
Hacking Tricks Toward Security on Network Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), 4-7 December 2006, Taipei, Taiwan, pp. 442-447, 2006, IEEE Computer Society, 0-7695-2736-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing |
16 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
Using Honeynets to Protect Large Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(6), pp. 73-75, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
firewall, honeypot, honeynet |
16 | |
User Confidence-and the Software Developer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 21(6), pp. 5-8, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
keylogger, trust, firewall, virus, spyware, adware |
16 | Matthew Fuchs |
Adapting Web Services in a Heterogeneous Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: Proceedings of the IEEE International Conference on Web Services (ICWS'04), June 6-9, 2004, San Diego, California, USA, pp. 656-, 2004, IEEE Computer Society, 0-7695-2167-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
XML Firewall, Operation Reusability, XML, Management, WSDL, Web Services Security |
16 | Douglas E. Ennis, Divyangi Anchan, Mahmoud Pegah |
The front line battle against P2P. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 101-106, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IPTables, log parsing tool, log server, peer-to-peer software, snortsam, intrusion detection, firewall, router, snort |
16 | Ludwin Fuchs, Steven E. Poltrock, Werner Geyer, Tom Frauenhofer, Shahrokh Daijavad, Heather A. Richter |
Enabling Inter-Company Team Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 20-22 June 2001, Cambridge, MA, USA, pp. 374-379, 2001, IEEE Computer Society, 0-7695-1269-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Team collaboration, virtual meetings, firewall, security infrastructure |
16 | Oliver Spatscheck, Jørgen S. Hansen, John H. Hartman, Larry L. Peterson |
Optimizing TCP forwarder performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 8(2), pp. 146-157, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
TCP, TCP/IP, firewall, router, proxy |
16 | Samuel Patton, David Doss, William Yurcik |
Distributed Weakness in Virtual Private Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 96-97, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
distributed weakness, corporate VPN, routing attack, VPN tunnel endpoints, coordinated filtering, corporate firewall, network security, transport protocols, packet switching, network topology, network topology, telecommunication network routing, authorisation, IP network, telecommunication networks, telecommunication security, Internet service, virtual private networks, business communication |
16 | Mark Vandenwauver, Joris Claessens, Wim Moreau, Calin Vaduva, Robert Maier |
Why Enterprises Need More than Firewalls and Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 8th Workshop on Enabling Technologies (WETICE '99), Infrastructure for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA, Proceedings, pp. 152-157, 1999, IEEE Computer Society, 0-7695-0365-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Active Content, Java, Intrusion Detection Systems, Firewall, JavaScript, Intranet |
16 | Yinong Chen, Vashti Galpin, Scott Hazelhurst, Roger Mateer, Conrad Mueller |
Development of a Decentralized Virtual Service Redirector for Internet Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 7th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '99), 20-22 December 1999, Cape Town, South Africa, Proceedings, pp. 235-241, 1999, IEEE Computer Society, 0-7695-0468-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
dependable computing, modeling, distributed system, verification, firewall |
16 | I-Ling Yen |
Computer security: the good, the bad and the ugly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 1st High-Assurance Systems Engineering Workshop (HASE '96), October 22, 1996, Niagara, Canada, Proceedings, pp. 52-53, 1996, IEEE Computer Society, 0-8186-7629-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Trusted Computer Systems Evaluation Criteria, computer security, firewall, cost, security of data, data security, high assurance systems |
15 | Rebecca Finster, Thomas Kronschläger, Linda Grogorick, Susanne Robra-Bissantz |
Ok, gegen Cupids Pfeil hilft keine Firewall - Sichere(s) Daten durch ganzheitlichen Kompetenzaufbau. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HMD Prax. Wirtsch. ![In: HMD Prax. Wirtsch. 61(1), pp. 27-42, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Hyunjung Lee, Suryeon Lee, Kyounggon Kim, Huy Kang Kim |
HSViz-II: Octet Layered Hierarchy Simplified Visualizations for Distributed Firewall Policy Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 936-948, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Xiuhong Zhou, Wenbing Shi |
Research on the optimisation of whitelisting technology for network firewall in industrial control system using genetic algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Distributed Syst. ![In: Int. J. Commun. Networks Distributed Syst. 30(1), pp. 30-41, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Adrian Komadina, Ivan Kovacevic, Bruno Stengl, Stjepan Gros |
Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 24(8), pp. 2636, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Akihiro Takai, Yusei Katsura, Nariyoshi Yamai, Rei Nakagawa, Vasaka Visoottiviseth |
Quick Blocking Operation of IDS/SDN Cooperative Firewall Systems by Reducing Communication Overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACT ![In: 26th International Conference on Advanced Communications Technology, ICACT 2024, Pyeong Chang, Republic of Korea, February 4-7, 2024, pp. 1514-1520, 2024, IEEE, 979-11-88428-12-0. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Md Fahad Monir, Azwad Fawad Hasan |
Exploring SDN Based Firewall and NAPT: A Comparative Analysis with Iptables and OVS in Mininet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (4) ![In: Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 4, pp. 436-447, 2024, Springer, 978-3-031-57915-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Fahad M. Alotaibi, Vassilios G. Vassilakis |
Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 15(5), pp. 170, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Mohammed Abdulridha Hussein |
Proposed Multi-Layer Firewall to Improve the Security of Software Defined Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Interact. Mob. Technol. ![In: Int. J. Interact. Mob. Technol. 17(2), pp. 153-165, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Daniele Bringhenti, Lucia Seno, Fulvio Valenza |
An Optimized Approach for Assisted Firewall Anomaly Resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 119693-119710, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Jamal Kh-Madhloom, Zainab H. Noori, Sif K. Ebis, Oday A. Hassen, Saad M. Darwish |
An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 12(10), pp. 202, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Md Habibur Rahman, Taminul Islam, Md Masum Rana, Rehnuma Tasnim, Tanzina Rahman Mona, Md. Mamun Sakib |
Machine Learning Approach on Multiclass Classification of Internet Firewall Log Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.07997, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | |
Self-Deception: Reverse Penetrating the Semantic Firewall of Large Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.11521, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | François De Keersmaeker, Ramin Sadre, Cristel Pelsser |
Supervising Smart Home Device Interactions: A Profile-Based Firewall Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.03510, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Wei-Yang Chiu, Weizhi Meng 0001 |
BlockFW - Towards Blockchain-based Rule-Sharing Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.13073, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Abhijeet Sahu, Patrick Wlazlo, Nastassja Gaudet, Ana E. Goulart, Edmond Rogers, Katherine R. Davis 0001 |
A Firewall Optimization for Threat-Resilient Micro-Segmentation in Power System Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.15072, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Mariusz Sepczuk |
Dynamic Web Application Firewall detection supported by Cyber Mimic Defense approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 213, pp. 103596, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Yang Zhao, Yuwei Pang, Xingyu Ke, Bintao Wang, Guobin Zhu, Mingsheng Cao |
A metaverse-oriented CP-ABE scheme with cryptographic reverse firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 147, pp. 195-206, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Lin Song, Shangwei Wu 0002 |
Walled cosmopolitanization: how China's Great Firewall mediates young urban gay men's lives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Mediat. Commun. ![In: J. Comput. Mediat. Commun. 28(2), January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo |
An innovative two-stage algorithm to optimize Firewall rule ordering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 134, pp. 103423, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Babu R. Dawadi, Bibek Adhikari, Devesh Srivastava |
Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(4), pp. 2073, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac |
Research on Security Weakness Using Penetration Testing in a Distributed Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(5), pp. 2683, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov |
Automated Firewall Configuration in Virtual Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 20(2), pp. 1559-1576, March - April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Abdelrahman Osman Elfaki, Amer Aljaedi |
Deep Analysis and Detection of Firewall Anomalies Using Knowledge Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPRAM ![In: Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2023, Lisbon, Portugal, February 22-24, 2023., pp. 411-417, 2023, SCITEPRESS, 978-989-758-626-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza |
A demonstration of VEREFOO: an automated framework for virtual firewall configuration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetSoft ![In: 9th IEEE International Conference on Network Softwarization, NetSoft 2023, Madrid, Spain, June 19-23, 2023, pp. 293-295, 2023, IEEE, 979-8-3503-9980-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Shingo Yamaguchi, Ryutaro Matsumoto |
Smallest Botnet Firewall Building Problem and a Girvan-Newman Algorithm-Based Heuristic Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE-Taiwan ![In: International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2023, PingTung, Taiwan, July 17-19, 2023, pp. 349-350, 2023, IEEE, 979-8-3503-2417-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Perakorn Nimitkul, Akihiro Takai, Nariyoshi Yamai, Rei Nakagawa, Songpon Teerakanok |
The Study on the Blocking Time Reduction of the IDS/SON Cooperative Firewall System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QRS Companion ![In: 23rd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2023 Companion, Chiang Mai, Thailand, October 22-26, 2023, pp. 549-554, 2023, IEEE, 979-8-3503-5939-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock 0001, Amir Houmansadr, Dave Levin, Eric Wustrow |
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 2653-2670, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Agus Harya Maulana, I. G. P. Ari Suyasa, Erwan Kurniawan |
Analysis of the Demilitarized Zone Implementation in Java Madura Bali Electrical Systems to Increase the Level of IT/OT Cyber Security With the Dual DMZ Firewall Architecture Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartNets ![In: International Conference on Smart Applications, Communications and Networking, SmartNets 2023, Istanbul, Turkey, July 25-27, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-0252-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Yi Yin, Yuichiro Tateiwa, Xiaojun Qian, Qian Gao, Lingling Shen, Guoqiang Zhang |
Inconsistency Detecting and Resolving for Security Policy and IPv6 Firewall Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAI ![In: Proceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence, CSAI 2023, Beijing, China, December 8-10, 2023, pp. 91-98, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Shen Su, Yue Xue, Liansheng Lin, Chao Wang, Hui Lu 0005, Jing Qiu 0002, Yanbin Sun, Yuan Liu, Zhihong Tian |
Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2023, Kuala Lumpur, Malaysia, December 4-8, 2023, pp. 5122-5128, 2023, IEEE, 979-8-3503-1090-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac |
Design and Implementation of a Distributed Firewall Management System for Improved Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RoEduNet ![In: 22nd RoEduNet Conference: Networking in Education and Research, RoEduNet 2023, Craiova, Romania, September 21-22, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-9366-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Cong-Vu Trinh, Thien-Thanh Le, Minh-Khoi Le-Nguyen, Dinh-Thuan Le, Van-Hoa Nguyen, Khuong Nguyen-An |
An Efficient Machine Learning-Based Web Application Firewall with Deep Automated Pattern Categorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDSE ![In: Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications - 10th International Conference, FDSE 2023, Da Nang, Vietnam, November 22-24, 2023, Proceedings, pp. 212-225, 2023, Springer, 978-981-99-8295-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Mads Solberg Collingwood Pyke, Weizhi Meng 0001, Brooke Lampe |
Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ML4CS ![In: Machine Learning for Cyber Security - 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings, pp. 145-162, 2023, Springer, 978-981-97-2457-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 1260 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|