The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Firewall with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-1996 (22) 1997-1998 (22) 1999 (21) 2000 (23) 2001 (28) 2002 (33) 2003 (59) 2004 (63) 2005 (82) 2006 (78) 2007 (91) 2008 (93) 2009 (65) 2010 (52) 2011 (54) 2012 (36) 2013 (32) 2014 (37) 2015 (44) 2016 (55) 2017 (40) 2018 (47) 2019 (40) 2020 (35) 2021 (29) 2022 (40) 2023 (33) 2024 (6)
Publication types (Num. hits)
article(294) book(2) incollection(12) inproceedings(941) phdthesis(11)
Venues (Conferences, Journals, ...)
CoRR(38) ACSAC(17) ICC(13) Comput. Secur.(10) LISA(10) Security and Management(10) AINA(9) IEEE Access(9) ICDCS(8) ICICS(8) INFOCOM(8) ISCC(8) POLICY(8) DSN(7) ICNP(7) login Usenix Mag.(7) More (+10 of total 665)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 762 occurrences of 447 keywords

Results
Found 1260 publication records. Showing 1260 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Shuo Chen 0001, Jun Xu 0003, Ravishankar K. Iyer, Keith Whisnant Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors. Search on Bibsonomy DSN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Harald Rölle A Hot-Failover State Machine for Gateway Services and Its Application to a Linux Firewall. Search on Bibsonomy DSOM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Lili Qiu, George Varghese, Subhash Suri Fast firewall implementations for software-based and hardware-based routers. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Scott Hazelhurst, Adi Attar, Raymond Sinnappan Algorithms for Improving the Dependability of Firewall and Filter Rule Lists. Search on Bibsonomy DSN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Boolean decision diagrams, validation, filtering, firewalls, traffic management
24Kelly Djahandari, Daniel F. Sterne An MBone Proxy for an Application Gateway Firewall. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
24Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth Limitations of the Approach of Solving a Network's Security Problem with a Firewall. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
19Sanjeev Kumar, Einar Petana Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of Service (DoS) attacks, TCP SYN attack, Windows XP Service Pack2 operating system, Internet Security
19Matthew Burnside, Angelos D. Keromytis Path-Based Access Control for Enterprise Networks. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Path-based, SOA, access control, enterprise, Keynote
19Asaad Moosa, Eanas Muhsen Alsaffar Proposing a hybrid-intelligent framework to secure e-government web applications. Search on Bibsonomy ICEGOV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF negative logic based filtering, positive logic based filtering, session based filtering, web application firewalls, whitelist, neural networks, fuzzy logic, e-government, web application, blacklist
19Blaine A. D'Amico Desktop security in an academic environment...: how to herd cats successfully. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF fingerprint, signature, vulnerability, patch
19Kai Ouyang, Xiaowen Chu 0001, Lijun Dong, Hengqing Wang, Ting Cai MLCC: A Multi Layered Correlative Control Mechanism for the VPN Topology. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Tim Chenoweth, Robert P. Minch, Sharon W. Tabor User Security Behavior on Wireless Networks: An Empirical Study. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Emmanuel Hooper An Intelligent Intrusion Detection and Response System Using Network Quarantine Channels: Firewalls and Packet Filters. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Ala Rezmerita, Tangui Morlier, Vincent Néri, Franck Cappello Private Virtual Cluster: Infrastructure and Protocol for Instant Grids. Search on Bibsonomy Euro-Par The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 A Client-Transparent Approach to Defend Against Denial of Service Attacks. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Client Transparency, Denial of Service (DoS) attacks, Authentication, Availability, Web Servers
19Costantina Caruso, Donato Malerba, Davide Papagni Learning the Daily Model of Network Traffic. Search on Bibsonomy ISMIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF daily model, data mining, machine learning, Anomaly detection, network traffic analysis, symbolic data analysis
19Everett Anderson, Kevin Eustice, Shane Markstrum, Mark H. Hansen, Peter L. Reiher Mobile Contagion: Simulation of Infection and Defense. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Shinsuke Suzuki, Satoshi Kondo Dynamic Network Separation for IPv6 Network Security Enhancement. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Mian Zhou, Robert Lee, Sheau-Dong Lang Locality-based Profile Analysis for Secondary Intrusion Detection. Search on Bibsonomy ISPAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Se-Chang Son, Matthew Farrellee, Miron Livny A Generic Proxy Mechanism for Secure Middlebox Traversal. Search on Bibsonomy CLUSTER The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Xinyou Zhang, Chengzhong Li, Wenbin Zheng Intrusion Prevention System Design. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Sherif M. Khattab, Chatree Sangpachatanaruk, Daniel Mossé, Rami G. Melhem, Taieb Znati Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Miyoung Kim, Misun Kim, Youngsong Mun Design and Implementation of the HoneyPot System with Focusing on the Session Redirection. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Lu Yan Via Firewalls. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19C. Edward Chow, Paul J. Fong, Ganesh Godavari An Exercise in Constructing Secure Mobile Ad hoc Network (SMANET). Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Voravud Santiraveewan, Yongyuth Permpoontanalarp A Graph-based Methodology for Analyzing IP Spoofing Attack. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IP spoofing and Formal Method for Network Security, Network Security, Firewalls
19Eun-Ser Lee, Sun-myoung Hwang Software Design Method Enhanced by Appended Security Requirements. Search on Bibsonomy PCM (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège A Formal Approach to Specify and Deploy a Network Security Policy. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19David Lim, Christopher E. Neely, Christopher K. Zuver, John W. Lockwood Internet-based Tool for System-on-Chip Integration. Search on Bibsonomy MSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Miyoung Kim, Misun Kim, Hyewon K. Lee, Youngsong Mun Design of Active HoneyPot System. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith The STRONGMAN Architecture. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Anindya Datta, Kaushik Dutta, Helen M. Thomas, Debra E. VanderMeer, Suresha, Krithi Ramamritham Proxy-based acceleration of dynamically generated content on the world wide web: an approach and implementation. Search on Bibsonomy SIGMOD Conference The full citation details ... 2002 DBLP  DOI  BibTeX  RDF proxy-based caching, dynamic content, edge caching
19Rocky K. C. Chang, King P. Fung Transport layer proxy for stateful UDP packet filtering. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Anindya Datta, Kaushik Dutta, Helen M. Thomas, Debra E. VanderMeer, Krithi Ramamritham, Suresha A Proxy-Based Approach for Dynamic Content Acceleration on the WWW. Search on Bibsonomy WECWIS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Hee Suk Seo, Tae Ho Cho Modeling and Simulation for Detecting a Distributed Denial of Service Attack. Search on Bibsonomy Australian Joint Conference on Artificial Intelligence The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Asuman Dogac, M. Ezbiderli, Yusuf Tambag, C. Icdem, Arif Tumer, Nesime Tatbul, N. Hamali, Catriel Beeri The MARIFlow Workflow Management System. Search on Bibsonomy ICDE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Internet, Agent, Workflow, Web
19Paola Dotti, Owen Rees Protecting the Hosted Application Server. Search on Bibsonomy WETICE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
19John T. McHenry, Patrick W. Dowd, Frank A. Pellegrino, Todd M. Carrozzi, W. B. Cocks An FPGA-based coprocessor for ATM firewalls. Search on Bibsonomy FCCM The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
19Hermann Kopetz, Roman Nossal Temporal firewalls in large distributed real-time systems. Search on Bibsonomy FTDCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF large distributed real-time systems, temporal firewalls, autonomous subsystems, stable control-free interfaces, encapsulated subsystem, static properties, controlled object, real-time systems, complexity, abstraction, error propagation, system partitioning
16Paulo Sousa 0001, Alysson Neves Bessani, Miguel Correia 0001, Nuno Ferreira Neves, Paulo Veríssimo Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF reactive recovery, firewall, Intrusion tolerance, proactive recovery
16Feng Liu 0016, Weiping Guo, Zhi Qiang Zhao, Wu Chou SaaS Integration for Software Cloud. Search on Bibsonomy IEEE CLOUD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF web services, SOA, Firewall, SaaS
16Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov, Kellogg S. Booth Investigating an appropriate design for personal firewalls. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2010 DBLP  DOI  BibTeX  RDF personal firewall, usable security
16Hrishikesh B. Acharya, Mohamed G. Gouda Projection and Division: Linear-Space Verification of Firewalls. Search on Bibsonomy ICDCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF firewall verification, projection, division
16Jefferson Tan, David Abramson 0001, Colin Enticott A Virtual Connectivity Layer for Grids. Search on Bibsonomy eScience The full citation details ... 2009 DBLP  DOI  BibTeX  RDF firewall virtualization, Grid, tunneling
16Jan Wiebelitz, Christopher Kunz, Stefan Piger, Christian Grimm TCP-AuthN: TCP Inline Authentication to Enhance Network Security in Grid Environments. Search on Bibsonomy ISPDC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Authentication, Grid, Firewall
16Jad Naous, Ryan Stutsman, David Mazières, Nick McKeown, Nickolai Zeldovich Delegating network security with more information. Search on Bibsonomy WREN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network policy, network security, network management, firewall, ident
16Bing-Heng Peng, Huai-Jen Liu, Huan-Yun Wei Performance Improvement over Linux Layer-7 Content Filtering. Search on Bibsonomy MSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF L7filter, firewall, content filter, Netfilter
16Young H. Cho, William H. Mangione-Smith Deep network packet filter design for reconfigurable devices. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF string filter, Firewall, worm, network intrusion detection, virus
16Adam Barth, Collin Jackson, John C. Mitchell Robust defenses for cross-site request forgery. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cross-site request forgery, http referer header, web application firewall, same-origin policy
16Sourour Meharouech, Adel Bouhoula, Tarek Abbes Collaboration between Security Devices toward improving Network Defense. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collaboration between Security Devices, vulnerability scanner, Network Security, Firewall, Honeypot, IPS
16Olalekan Adeyinka Internet Attack Methods and Internet Security Technology. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy, Cryptography, Integrity, Intrusion Detection Systems (IDS), Confidentiality, Firewall, Worms, Virus
16Baba Piprani, Denise Ernst A Model for Data Quality Assessment. Search on Bibsonomy OTM Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data Quality Assessment, Data Quality Firewall, Data Quality filter, Type Instance, Data lineage
16Steve Harris, Jeremy Gibbons, Jim Davies, Andrew Tsui, Charles Crichton Semantic technologies in electronic government. Search on Bibsonomy ICEGOV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ISO 11179, SKOS, application firewall, ontology, XML, semantic web, interoperability, metadata, OWL, RDF, SPARQL, XMI, SAWSDL, semantic markup
16Mirco Marchetti, Michele Colajanni Adaptive traffic filtering for efficient and secure IP-mobility. Search on Bibsonomy Q2SWinet The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dynamic firewall reconfiguration, egress filtering, mobile IP
16José Carlos Brustoloni Laboratory experiments for network security instruction. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle
16Pablo Neira Ayuso, Laurent Lefèvre, Rafael M. Gasca High Availability support for the design of stateful networking equipments. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF OpenSource, Security, Firewall, High Availability, Stateful
16Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu Hacking Tricks Toward Security on Network Environments. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing
16John G. Levine, Julian B. Grizzard, Henry L. Owen Using Honeynets to Protect Large Enterprise Networks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF firewall, honeypot, honeynet
16 User Confidence-and the Software Developer. Search on Bibsonomy IEEE Softw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF keylogger, trust, firewall, virus, spyware, adware
16Matthew Fuchs Adapting Web Services in a Heterogeneous Environment. Search on Bibsonomy ICWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XML Firewall, Operation Reusability, XML, Management, WSDL, Web Services Security
16Douglas E. Ennis, Divyangi Anchan, Mahmoud Pegah The front line battle against P2P. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IPTables, log parsing tool, log server, peer-to-peer software, snortsam, intrusion detection, firewall, router, snort
16Ludwin Fuchs, Steven E. Poltrock, Werner Geyer, Tom Frauenhofer, Shahrokh Daijavad, Heather A. Richter Enabling Inter-Company Team Collaboration. Search on Bibsonomy WETICE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Team collaboration, virtual meetings, firewall, security infrastructure
16Oliver Spatscheck, Jørgen S. Hansen, John H. Hartman, Larry L. Peterson Optimizing TCP forwarder performance. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF TCP, TCP/IP, firewall, router, proxy
16Samuel Patton, David Doss, William Yurcik Distributed Weakness in Virtual Private Networks. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF distributed weakness, corporate VPN, routing attack, VPN tunnel endpoints, coordinated filtering, corporate firewall, network security, transport protocols, packet switching, network topology, network topology, telecommunication network routing, authorisation, IP network, telecommunication networks, telecommunication security, Internet service, virtual private networks, business communication
16Mark Vandenwauver, Joris Claessens, Wim Moreau, Calin Vaduva, Robert Maier Why Enterprises Need More than Firewalls and Intrusion Detection Systems. Search on Bibsonomy WETICE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Active Content, Java, Intrusion Detection Systems, Firewall, JavaScript, Intranet
16Yinong Chen, Vashti Galpin, Scott Hazelhurst, Roger Mateer, Conrad Mueller Development of a Decentralized Virtual Service Redirector for Internet Applications. Search on Bibsonomy FTDCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF dependable computing, modeling, distributed system, verification, firewall
16I-Ling Yen Computer security: the good, the bad and the ugly. Search on Bibsonomy HASE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Trusted Computer Systems Evaluation Criteria, computer security, firewall, cost, security of data, data security, high assurance systems
15Rebecca Finster, Thomas Kronschläger, Linda Grogorick, Susanne Robra-Bissantz Ok, gegen Cupids Pfeil hilft keine Firewall - Sichere(s) Daten durch ganzheitlichen Kompetenzaufbau. Search on Bibsonomy HMD Prax. Wirtsch. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Hyunjung Lee, Suryeon Lee, Kyounggon Kim, Huy Kang Kim HSViz-II: Octet Layered Hierarchy Simplified Visualizations for Distributed Firewall Policy Analysis. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Xiuhong Zhou, Wenbing Shi Research on the optimisation of whitelisting technology for network firewall in industrial control system using genetic algorithm. Search on Bibsonomy Int. J. Commun. Networks Distributed Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Adrian Komadina, Ivan Kovacevic, Bruno Stengl, Stjepan Gros Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack Detection. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Akihiro Takai, Yusei Katsura, Nariyoshi Yamai, Rei Nakagawa, Vasaka Visoottiviseth Quick Blocking Operation of IDS/SDN Cooperative Firewall Systems by Reducing Communication Overhead. Search on Bibsonomy ICACT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Md Fahad Monir, Azwad Fawad Hasan Exploring SDN Based Firewall and NAPT: A Comparative Analysis with Iptables and OVS in Mininet. Search on Bibsonomy AINA (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Fahad M. Alotaibi, Vassilios G. Vassilakis Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Mohammed Abdulridha Hussein Proposed Multi-Layer Firewall to Improve the Security of Software Defined Networks. Search on Bibsonomy Int. J. Interact. Mob. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Daniele Bringhenti, Lucia Seno, Fulvio Valenza An Optimized Approach for Assisted Firewall Anomaly Resolution. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Jamal Kh-Madhloom, Zainab H. Noori, Sif K. Ebis, Oday A. Hassen, Saad M. Darwish An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets. Search on Bibsonomy Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Md Habibur Rahman, Taminul Islam, Md Masum Rana, Rehnuma Tasnim, Tanzina Rahman Mona, Md. Mamun Sakib Machine Learning Approach on Multiclass Classification of Internet Firewall Log Files. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15 Self-Deception: Reverse Penetrating the Semantic Firewall of Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15François De Keersmaeker, Ramin Sadre, Cristel Pelsser Supervising Smart Home Device Interactions: A Profile-Based Firewall Approach. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Wei-Yang Chiu, Weizhi Meng 0001 BlockFW - Towards Blockchain-based Rule-Sharing Firewall. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Abhijeet Sahu, Patrick Wlazlo, Nastassja Gaudet, Ana E. Goulart, Edmond Rogers, Katherine R. Davis 0001 A Firewall Optimization for Threat-Resilient Micro-Segmentation in Power System Networks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Mariusz Sepczuk Dynamic Web Application Firewall detection supported by Cyber Mimic Defense approach. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Yang Zhao, Yuwei Pang, Xingyu Ke, Bintao Wang, Guobin Zhu, Mingsheng Cao A metaverse-oriented CP-ABE scheme with cryptographic reverse firewall. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Lin Song, Shangwei Wu 0002 Walled cosmopolitanization: how China's Great Firewall mediates young urban gay men's lives. Search on Bibsonomy J. Comput. Mediat. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo An innovative two-stage algorithm to optimize Firewall rule ordering. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Babu R. Dawadi, Bibek Adhikari, Devesh Srivastava Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac Research on Security Weakness Using Penetration Testing in a Distributed Firewall. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov Automated Firewall Configuration in Virtual Networks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Abdelrahman Osman Elfaki, Amer Aljaedi Deep Analysis and Detection of Firewall Anomalies Using Knowledge Graph. Search on Bibsonomy ICPRAM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza A demonstration of VEREFOO: an automated framework for virtual firewall configuration. Search on Bibsonomy NetSoft The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Shingo Yamaguchi, Ryutaro Matsumoto Smallest Botnet Firewall Building Problem and a Girvan-Newman Algorithm-Based Heuristic Solution. Search on Bibsonomy ICCE-Taiwan The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Perakorn Nimitkul, Akihiro Takai, Nariyoshi Yamai, Rei Nakagawa, Songpon Teerakanok The Study on the Blocking Time Reduction of the IDS/SON Cooperative Firewall System. Search on Bibsonomy QRS Companion The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock 0001, Amir Houmansadr, Dave Levin, Eric Wustrow How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
15Agus Harya Maulana, I. G. P. Ari Suyasa, Erwan Kurniawan Analysis of the Demilitarized Zone Implementation in Java Madura Bali Electrical Systems to Increase the Level of IT/OT Cyber Security With the Dual DMZ Firewall Architecture Method. Search on Bibsonomy SmartNets The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Yi Yin, Yuichiro Tateiwa, Xiaojun Qian, Qian Gao, Lingling Shen, Guoqiang Zhang Inconsistency Detecting and Resolving for Security Policy and IPv6 Firewall Policy. Search on Bibsonomy CSAI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Shen Su, Yue Xue, Liansheng Lin, Chao Wang, Hui Lu 0005, Jing Qiu 0002, Yanbin Sun, Yuan Liu, Zhihong Tian Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects. Search on Bibsonomy GLOBECOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac Design and Implementation of a Distributed Firewall Management System for Improved Security. Search on Bibsonomy RoEduNet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Cong-Vu Trinh, Thien-Thanh Le, Minh-Khoi Le-Nguyen, Dinh-Thuan Le, Van-Hoa Nguyen, Khuong Nguyen-An An Efficient Machine Learning-Based Web Application Firewall with Deep Automated Pattern Categorization. Search on Bibsonomy FDSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Mads Solberg Collingwood Pyke, Weizhi Meng 0001, Brooke Lampe Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering. Search on Bibsonomy ML4CS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 1260 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license