Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Xiu-Ru Liang, Huei-Tang Li, Chiung-Ying Huang, Wei-An Chen, Yi-Feng Chen, Zhi-Jia Gao, Meng-Wei Sun, Hao-Cheng Chia |
Outlier-based Anomaly Detection in Firewall Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCCI ![In: International Conference on Communications, Computing, Cybersecurity, and Informatics, CCCI 2023, Chongqing, China, October 18-20, 2023, pp. 1-10, 2023, IEEE, 979-8-3503-0256-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Adrian Komadina, Ivan Kovacevic, Bruno Stengl, Stjepan Gros |
Detecting Anomalies in Firewall Logs Using Artificially Generated Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ConTEL ![In: 17th International Conference on Telecommunications, ConTEL 2023, Graz, Austria, July 11-13, 2023, pp. 1-8, 2023, IEEE, 979-8-3503-0223-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac, Radu Tarabuta |
Distributed Firewall Traffic Filtering and Intrusion Detection Using Snort on pfSense Firewalls with Random Forest Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TSP ![In: 46th International Conference on Telecommunications and Signal Processing, TSP 2023, Prague, Czech Republic, July 12-14, 2023, pp. 101-104, 2023, IEEE, 979-8-3503-0396-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | G. Yashwanth Kiran, Koganti Sri Sai Harshith, A. M. Abhishek Sai, Kalla Likhit Sai Eswar, Lekha S. Nair |
SDN-based Firewall using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023, Delhi, India, July 6-8, 2023, pp. 1-8, 2023, IEEE, 979-8-3503-3509-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Jeongkeun Shin, L. Richard Carley, Geoffrey B. Dobson, Kathleen M. Carley |
Modeling and Simulation of the Human Firewall Against Phishing Attacks in Small and Medium-Sized Businesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANNSIM ![In: Annual Modeling and Simulation Conference, ANNSIM 2023, Hamilton, ON, Canada, May 23-26, 2023, pp. 369-380, 2023, IEEE, 978-1-71-387328-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Tia Rahmawati, Rama Wijaya Shiddiq, Mochamad Rizal Sumpena, Shendy Setiawan, Nyoman Bogi Aditya Karna, Sofia Naning Hertiana |
Web Application Firewall Using Proxy and Security Information and Event Management (SIEM) for OWASP Cyber Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IoTaIS ![In: IEEE International Conference on Internet of Things and Intelligence Systems, IoTaIS 2023, Bali, Indonesia, November 28-30, 2023, pp. 280-285, 2023, IEEE, 979-8-3503-1904-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Amit Praseed, P. Santhi Thilagam |
HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 65, pp. 103090, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Cengiz Togay, Ahmet Kasif, Cagatay Catal, Bedir Tekinerdogan |
A Firewall Policy Anomaly Detection Framework for Reliable Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 71(1), pp. 339-347, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Daniele Bringhenti, Fulvio Valenza |
Optimizing distributed firewall reconfiguration transients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 215, pp. 109183, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan |
Cloud Firewall Under Bursty and Correlated Data Traffic: A Theoretical Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cloud Comput. ![In: IEEE Trans. Cloud Comput. 10(3), pp. 1620-1633, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Zhiming Lin, Zhiqiang Yao |
Firewall Anomaly Detection Based on Double Decision Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 14(12), pp. 2668, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Jesús Lázaro 0001, Unai Bidarte, Leire Muguira, Armando Astarloa, Jaime Jiménez |
Embedded firewall for on-chip bus transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 98, pp. 107707, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Marco Häberle, Benjamin Steinert, Michael Menth |
Firewall-as-a-Service for Campus Networks Based on P4-SFC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commun. Eur. Assoc. Softw. Sci. Technol. ![In: Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Adam Hamilton, Matthew Roughan, Giang T. Nguyen 0003 |
Boolean Expressions in Firewall Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.04210, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Marija Schufrin, Hendrik Lücke-Tieke, Jörn Kohlhammer |
Visual Firewall Log Analysis - At the Border Between Analytical and Appealing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.03702, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Felix Klement, Henrich C. Pöhls, Stefan Katzenbeisser 0001 |
Man-in-the-OBD: A modular, protocol agnostic firewall for automotive dongles to enhance privacy and security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.08281, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Ivan Kovacevic, Bruno Stengl, Stjepan Gros |
Systematic review of automatic translation of high-level security policy into firewall rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.03645, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Shreya Rajkumar |
Implementing Software Defined Load Balancer and Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.15735, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Keigo Taga, Junjun Zheng, Koichi Mouri, Shoichi Saito, Eiji Takimoto |
Firewall Traversal Method by Pseudo-TCP Encapsulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 105-D(1), pp. 105-115, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta |
Can my firewall system enforce this policy? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 117, pp. 102683, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Senthil Prabakaran, Ramalakshmi Ramar, Irshad Hussain, Balasubramanian Prabhu Kavin, Sultan S. Alshamrani, Ahmed Saeed Alghamdi, Abdullah Alshehri 0001 |
Predicting Attack Pattern via Machine Learning by Exploiting Stateful Firewall as Virtual Network Function in an SDN Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(3), pp. 709, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Jenny Heino, Antti Hakkala, Seppo Virtanen |
Study of methods for endpoint aware inspection in a next generation firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecur. ![In: Cybersecur. 5(1), pp. 25, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Yonggang Zhang |
Research and application of next-generation firewall technique in medical network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Methods Sci. Eng. ![In: J. Comput. Methods Sci. Eng. 22(5), pp. 1461-1476, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Towhidul Islam, Asif Ahmed, Raihan Tanvir, Rezwana Reaz |
Enforcing delay-aware fog-cloud based IoT firewall (Work In Progress). ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: 21st IEEE International Symposium on Network Computing and Applications, NCA 2022, Boston, MA, USA, December 14-16, 2022, pp. 307-309, 2022, IEEE, 979-8-3503-9730-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Shihao Wang, Ruiheng Liu, Xu Guo, Gaoda Wei |
Design of Web Application Firewall System through Convolutional Neural Network and Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIPAE ![In: International Conference on Computers, Information Processing and Advanced Education, CIPAE 2022, Ottawa, ON, Canada, August 26-28, 2022, pp. 454-457, 2022, IEEE, 978-1-6654-6812-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Ines Jemal, Mohamed Amine Haddar, Omar Cheikhrouhou, Adel Mahfoudhi |
SWAF: A Smart Web Application Firewall Based on Convolutional Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 15th International Conference on Security of Information and Networks, SIN 2022, Sousse, Tunisia, November 11-13, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-5465-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Sergey M. Staroletov |
Software Architecture for an Intelligent Firewall Based on Linux Netfilter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIN ![In: 25th Conference on Innovation in Clouds, Internet and Networks, ICIN 2022, Paris, France, March 7-10, 2022, pp. 160-162, 2022, IEEE, 978-1-7281-8688-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Lucia Seno, Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Adriano Valenzano |
Improving performance and cyber-attack resilience in multi-firewall industrial networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WFCS ![In: 18th IEEE International Conference on Factory Communication Systems, WFCS 2022, Pavia, Italy, April 27-29, 2022, pp. 1-8, 2022, IEEE, 978-1-6654-1086-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Felix Klement, Henrich C. Pöhls, Stefan Katzenbeisser 0001 |
Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADIoT ![In: Attacks and Defenses for the Internet-of-Things - 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers, pp. 143-164, 2022, Springer, 978-3-031-21310-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Yusei Katsura, Pranpariya Sakarin, Nariyoshi Yamai, Hiroyuki Kimiyama, Vasaka Visoottiviseth |
Quick Blocking Operation of Firewall System Cooperating with IDS and SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACT ![In: 24th International Conference on Advanced Communication Technology, ICACT 2022, Pyeongchang, Korea, February 13-16, 2022, pp. 393-398, 2022, IEEE, 979-11-88428-08-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Linyih Teng, Chi-Hsiang Hung, Charles H.-P. Wen |
P4SF: A High-Performance Stateful Firewall on Commodity P4-Programmable Switch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: 2022 IEEE/IFIP Network Operations and Management Symposium, NOMS 2022, Budapest, Hungary, April 25-29, 2022, pp. 1-5, 2022, IEEE, 978-1-6654-0601-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Marija Schufrin, Hendrik Lücke-Tieke, Jörn Kohlhammer |
Visual Firewall Log Analysis - At the Border Between Analytical and Appealing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSec ![In: IEEE Symposium on Visualization for Cyber Security, VizSec 2022, Oklahoma City, OK, USA, October 19, 2022, pp. 1-11, 2022, IEEE, 978-1-6654-6148-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Miguel Calvo, Marta Beltrán |
An Adaptive Web Application Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022., pp. 96-107, 2022, SCITEPRESS, 978-989-758-590-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Claas Lorenz, Bettina Schnor |
Firewall Management: Rapid Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC/DSS/SmartCity/DependSys ![In: 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application, HPCC/DSS/SmartCity/DependSys 2022, Hainan, China, December 18-20, 2022, pp. 1465-1472, 2022, IEEE, 979-8-3503-1993-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Chen Zhang, Dong Mao, Lin Cui, Jiasai Sun, Fan Yang, Cong Cao |
Research on Power Border Firewall Policy Import and Optimization Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartCom ![In: Smart Computing and Communication - 7th International Conference, SmartCom 2022, New York City, NY, USA, November 18-20, 2022, Proceedings, pp. 535-545, 2022, Springer, 978-3-031-28123-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Andrei-Daniel Tudosi, Adrian Graur, Doru Gabriel Balan, Alin Dan Potorac |
Network Congestion Solution for FTP Services Based on Distributed Firewall and Snort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RoEduNet ![In: 21st RoEduNet Conference: Networking in Education and Research, RoEduNet 2022, Sovata, Romania, September 15-16, 2022, pp. 1-4, 2022, IEEE, 978-1-6654-5528-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Adrian Komadina, Mihael Marovic, Stjepan Gros |
Detecting network applications using firewall logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIPRO ![In: 45th Jubilee International Convention on Information, Communication and Electronic Technology, MIPRO 2022, Opatija, Croatia, May 23-27, 2022, pp. 1069-1075, 2022, IEEE, 978-953-233-103-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Ivan Kovacevic, Bruno Stengl, Stjepan Gros |
Systematic review of automatic translation of high-level security policy into firewall rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIPRO ![In: 45th Jubilee International Convention on Information, Communication and Electronic Technology, MIPRO 2022, Opatija, Croatia, May 23-27, 2022, pp. 1063-1068, 2022, IEEE, 978-953-233-103-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Fabian Schwarz |
TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: 25th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2022, Limassol, Cyprus, October 26-28, 2022, pp. 56-71, 2022, ACM, 978-1-4503-9704-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Yafei Li, Liejun Wang |
Routing network traffic predict based on firewall logs using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RICAI ![In: Proceedings of the 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2022, Dongguan, China, December 16-18, 2022., pp. 833-840, 2022, ACM, 978-1-4503-9834-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Ryo Iijima, Tatsuya Takehisa, Tatsuya Mori |
Cyber-physical firewall: monitoring and controlling the threats caused by malicious analog signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CF ![In: CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17 - 22, 2022, pp. 296-304, 2022, ACM, 978-1-4503-9338-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo, Antonio Maci |
A Novel Genetic Algorithm Approach for Firewall Policy Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITASEC ![In: Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), Rome, Italy, June 20-23, 2022., pp. 236-248, 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
15 | Akihiro Takai, Nariyoshi Yamai, Rei Nakagawa |
Fast Blocking of Malicious Traffic by Excluding Benign Flow Monitoring in IDS/SDN Cooperative Firewall Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINTEC ![In: Proceedings of the 17th Asian Internet Engineering Conference, AINTEC 2022, Hiroshima, Japan, December 19-21, 2022, pp. 62-69, 2022, ACM, 978-1-4503-9981-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Felix Klement, Henrich C. Pöhls, Stefan Katzenbeisser 0001 |
Change Your Car's Filters: Efficient Concurrent and Multi-Stage Firewall for OBD-II Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAMAD ![In: 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2022, Paris, France, November 2-3, 2022, pp. 19-25, 2022, IEEE, 978-1-6654-6129-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Junyan Liang, Yoohwan Kim |
Evolution of Firewalls: Toward Securer Network Using Next Generation Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCWC ![In: 12th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2022, Las Vegas, NV, USA, January 26-29, 2022, pp. 752-759, 2022, IEEE, 978-1-6654-8303-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Kenan Baysal |
Derin öğrenme temelli yeni nesil güvenlik duvarının tasarlanması (Designing a deep learning based next generation firewall) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
15 | Claudio Marques, Silvestre Malta, João Magalhães |
DNS Firewall Based on Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 13(12), pp. 309, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Taeyong Kim, Taewoong Kwon, Jun Lee, Jungsuk Song 0001 |
F/Wvis: Hierarchical Visual Approach for Effective Optimization of Firewall Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 105989-106004, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Hyunjung Lee, Suryeon Lee, Kyounggon Kim, Huy Kang Kim |
HSViz: Hierarchy Simplified Visualizations for Firewall Policy Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 71737-71753, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Jae-Kook Lee, Taeyoung Hong, Guohua Li |
Traffic and overhead analysis of applied pre-filtering ACL firewall on HPC service network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Commun. Networks ![In: J. Commun. Networks 23(3), pp. 192-200, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Cemal Aktürk, Ceren Çubukçu |
A Decision Making Model Proposal for Firewall Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 15(10), pp. 3588-3607, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis |
How Great is the Great Firewall? Measuring China's DNS Censorship. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2106.02167, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Konrad Yuri Gbur, Florian Tschorsch |
A QUIC(K) Way Through Your Firewall? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2107.05939, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Luca Durante, Lucia Seno, Adriano Valenzano |
A Formal Model and Technique to Redistribute the Packet Filtering Load in Multiple Firewall Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 16, pp. 2637-2651, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Miltos D. Grammatikakis, Voula Piperaki, Antonis Papagrigoriou |
Multilayer NoC firewall services: case-study on e-health. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOCS ![In: NOCS '21: International Symposium on Networks-on-Chip, Virtual Event, October 14-15, 2021, pp. 75-81, 2021, ACM, 978-1-4503-9083-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Geng Li, Jianwei Liu 0001, Zongyang Zhang, Yanting Zhang 0002 |
UC-Secure Cryptographic Reverse Firewall-Guarding Corrupted Systems with the Minimum Trusted Module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers, pp. 85-110, 2021, Springer, 978-3-030-88322-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Yujie Jin, Qun Wang |
Firewall Filtering Technology and Application Based on Decision Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIS (2) ![In: Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II, pp. 202-215, 2021, Springer, 978-3-030-78611-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Soteris Constantinou, Andreas Konstantinidis 0002, Demetrios Zeinalipour-Yazti, Panos K. Chrysanthis |
The IoT Meta-Control Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: 37th IEEE International Conference on Data Engineering, ICDE 2021, Chania, Greece, April 19-22, 2021, pp. 2523-2534, 2021, IEEE, 978-1-7281-9184-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Teri Lenard, Roland Bolboaca |
A Statefull Firewall and Intrusion Detection System Enforced with Secure Logging for Controller Area Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EICC ![In: EICC '21: European Interdisciplinary Cybersecurity Conference, Virtual Event, Romania, November 10-11, 2021, pp. 39-45, 2021, ACM, 978-1-4503-9049-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Zachary Weinberg, Diogo Barradas, Nicolas Christin |
Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: WWW '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021., pp. 472-483, 2021, ACM / IW3C2, 978-1-4503-8312-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Mitali Sinha, Padmalochan Bera, Manoranjan Satpathy |
An Anomaly Free Distributed Firewall System for SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSA ![In: International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021, pp. 1-8, 2021, IEEE, 978-1-6654-2529-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Zhenhuan Liu, Yulong Chen, Rui Huang |
Influence and Simulation of transformer firewall device on audible noise propagation characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISCAE (ACM) ![In: ICISCAE 2021: 4th International Conference on Information Systems and Computer Aided Education, Dalian, China, September 24 - 26, 2021, pp. 1679-1682, 2021, ACM, 978-1-4503-9025-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis |
How Great is the Great Firewall? Measuring China's DNS Censorship. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, pp. 3381-3398, 2021, USENIX Association, 978-1-939133-24-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Sandeep Pai Kulyadi, Pavitra Mohandas, Sudesh Kumar Santhosh Kumar, M. J. Shankar Raman, V. S. Vasan |
Anomaly Detection using Generative Adversarial Networks on Firewall Log Message Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECAI ![In: 13th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2021, Pitesti, Romania, July 1-3, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-2534-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Tomohide Inoue, Hideo Masuda, Masayuki Mori, Takayuki Nagai |
Performance evaluation and effectiveness estimation of DNS server firewall based on OpenFlow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIT ![In: ACIT 2021: The 8th International Virtual Conference on Applied Computing & Information Technology, Kanazawa, Japan, June 20 - 22, 2021, pp. 56-61, 2021, ACM, 978-1-4503-8493-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano |
An Algorithm for Security Policy Migration in Multiple Firewall Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITASEC ![In: Proceedings of the Italian Conference on Cybersecurity, ITASEC 2021, All Digital Event, April 7-9, 2021., pp. 344-359, 2021, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Zhizhen Zhong, Manya Ghobadi, Maximilian Balandat, Sanjeevkumar Katti, Abbas Kazerouni, Jonathan Leach, Mark McKillop, Ying Zhang 0022 |
BOW: First Real-World Demonstration of a Firewall-based Bayesian Optimization System for Wavelength Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OFC ![In: Optical Fiber Communications Conference and Exhibition, OFC 2021, San Francisco, CA, USA, June 6-10, 2021, pp. 1-3, 2021, IEEE, 978-1-943580-86-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Emmanuel O. Igbekele, Ayodele Ariyo Adebiyi, Marion O. Adebiyi, B. Francis Osang |
Windows Firewall Bypassing Techniques: An Overview of HTTP Tunneling and Nmap Evasion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (9) ![In: Computational Science and Its Applications - ICCSA 2021 - 21st International Conference, Cagliari, Italy, September 13-16, 2021, Proceedings, Part IX, pp. 546-556, 2021, Springer, 978-3-030-87012-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Ghazal Rezaei, Massoud Reza Hashemi |
An SDN-based Firewall for Networks with Varying Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSICC ![In: 26th International Computer Conference, Computer Society of Iran, CSICC 2021, Tehran, Iran, March 3-4, 2021, pp. 1-7, 2021, IEEE, 978-1-6654-1241-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Wouter Louman, Mitchell Vernee, Danique de Bruijn, Babette van't Riet, Hani Alers |
Mobile Firewall applications: An analysis of usability and effectiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP ![In: 5th IEEE International Conference on Cryptography, Security and Privacy, CSP 2021, Zhuhai, China, January 8-10, 2021, pp. 148-152, 2021, IEEE, 978-1-7281-8621-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Li Chen, Qiongliang Chen, Renyi Xia |
A Portable Network Isolation Apparatus for Substation Maintenance Based on Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIIS ![In: ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28 - 30, 2021, pp. 148:1-148:5, 2021, ACM, 978-1-4503-9020-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Enkli Ylli, Igli Tafa, Flavia Marku |
Examining the Server's Load Average When Trying to Attack the Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICT (1) ![In: Proceedings of Sixth International Congress on Information and Communication Technology - ICICT 2021, London, UK, Volume 1, pp. 7-14, 2021, Springer, 978-981-16-2376-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Soteris Constantinou, Antonis Vasileiou, Andreas Konstantinidis 0002, Panos K. Chrysanthis, Demetrios Zeinalipour-Yazti |
IMCF: The IoT Meta-Control Firewall for Smart Buildings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Proceedings of the 24th International Conference on Extending Database Technology, EDBT 2021, Nicosia, Cyprus, March 23 - 26, 2021., pp. 658-661, 2021, OpenProceedings.org, 978-3-89318-084-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Manthan Patel, P. P. Amritha |
Binary Decision Tree Based Packet Queuing Schema for Next Generation Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACDS (1) ![In: Advances in Computing and Data Sciences - 5th International Conference, ICACDS 2021, Nashik, India, April 23-24, 2021, Revised Selected Papers, Part I, pp. 224-233, 2021, Springer, 978-3-030-81461-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Yubaraj Gautam, Kazuhiko Sato, Bishnu Prasad Gautam, Norio Shiratori |
Novel Firewall Application for Mitigating Flooding Attacks on an SDN Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NaNA ![In: 2021 International Conference on Networking and Network Applications, NaNA 2021, Lijiang City, China, October 29 - Nov. 1, 2021, pp. 449-455, 2021, IEEE, 978-1-6654-4158-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Hongpeng Zhu |
Online meta-learning firewall to prevent phishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 32(23), pp. 17137-17147, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Shijie Ding, Zhiwei Zhang, Jun Xie |
Network security defense model based on firewall and IPS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 39(6), pp. 8961-8969, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan 0001 |
Hybrid Tree-Rule Firewall for High Speed Data Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cloud Comput. ![In: IEEE Trans. Cloud Comput. 8(4), pp. 1237-1249, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Artem Voronkov, Leonardo A. Martucci, Stefan Lindskog |
Measuring the Usability of Firewall Rule Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 27106-27121, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Matan Kintzlinger, Aviad Cohen 0002, Nir Nissim, Moshe Rav-Acha, Vladimir Khalameizer, Yuval Elovici, Yuval Shahar, Amos Katz |
CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 48123-48140, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Sunghwan Kim 0004, Seunghyun Yoon 0001, Jargalsaikhan Narantuya, Hyuk Lim |
Secure Collecting, Optimizing, and Deploying of Firewall Rules in Software-Defined Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 15166-15177, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Chong Zhang |
Who bypasses the Great Firewall in China? ![Search on Bibsonomy](Pics/bibsonomy.png) |
First Monday ![In: First Monday 25(4), 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Na Lu, Ying Yang |
Application of evolutionary algorithm in performance optimization of embedded network firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 76, pp. 103087, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Fulvio Valenza, Manuel Cheminod |
An Optimized Firewall Anomaly Resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Internet Serv. Inf. Secur. ![In: J. Internet Serv. Inf. Secur. 10(1), pp. 22-37, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Nguyen Manh Thang |
Improving Efficiency of Web Application Firewall to Detect Code Injection Attacks with Random Forest Method and Analysis Attributes HTTP Request. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Program. Comput. Softw. ![In: Program. Comput. Softw. 46(5), pp. 351-361, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Fahad Nife, Zbigniew Kotulski |
Application-Aware Firewall Mechanism for Software Defined Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 28(3), pp. 605-626, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | J. Jeya Praise, R. Joshua Samuel Raj, J. V. Bibal Benifa |
Development of Reinforcement Learning and Pattern Matching (RLPM) Based Firewall for Secured Cloud Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 115(2), pp. 993-1018, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Ziaur Rahman 0003, Asma Islam Swapna, Habibur Rahman Habib, Akramuzzaman Shaoun |
Performance Evaluation of Fuzzy Integrated Firewall Model for Hybrid Cloud based on Packet Utilization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.12736, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Sima Bagheri, Alireza Shameli-Sendi |
Dynamic Firewall Decomposition and Composition in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 15, pp. 3526-3539, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Latesh Kumar K. J, Leena H. U |
NGEN Firewall Security Augmentation using Brooks-Iyengar and Random Forest Classfier method: by Predicting Cyber Threats from: Darkweb/Deepweb Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Next Gener. Comput. ![In: Int. J. Next Gener. Comput. 11(1), 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov |
Introducing programmability and automation in the synthesis of virtual firewall rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetSoft ![In: 6th IEEE Conference on Network Softwarization, NetSoft 2020, Ghent, Belgium, June 29 - July 3, 2020, pp. 473-478, 2020, IEEE, 978-1-7281-5684-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Eder Ollora Zaballa, David Franco, Zifan Zhou, Michael S. Berger |
P4Knocking: Offloading host-based firewall functionalities to the network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIN ![In: 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops, ICIN 2020, Paris, France, February 24-27, 2020, pp. 7-12, 2020, IEEE, 978-1-7281-5127-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Artem Voronkov, Leonardo A. Martucci |
Natural vs. Technical Language Preference and Their Impact on Firewall Configuration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (30) ![In: HCI for Cybersecurity, Privacy and Trust - Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings, pp. 261-270, 2020, Springer, 978-3-030-50308-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Jian Li, Hao Jiang 0010, Wei Jiang, Jing Wu 0016, Wen Du |
SDN-based Stateful Firewall for Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BigDataSecurity/HPSC/IDS ![In: 6th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2020, Baltimore, MD, USA, May 25-27, 2020, pp. 157-161, 2020, IEEE, 978-1-7281-6873-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Ramon Barakat, Faruk Catal, Nikolay Tcholtchev, Yacine Rebahi, Ina Schieferdecker |
Industrial Grade Methodology for Firewall Simulation and Requirements Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020, pp. 1-7, 2020, IEEE, 978-1-7281-4973-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov |
Automated optimal firewall orchestration and configuration in virtualized networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020, pp. 1-7, 2020, IEEE, 978-1-7281-4973-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Antonio Matencio-Escolar, José M. Alcaraz Calero, Qi Wang 0001 |
Highly-Scalable Software Firewall Supporting One Million Rules for 5G NB-IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, June 7-11, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-5089-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Ryhan Uddin, Md Fahad Monir |
Evaluation of Four SDN Controllers with Firewall Modules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCA ![In: ICCA 2020: International Conference on Computing Advancements, Dhaka, Bangladesh, January 10-12, 2020, pp. 9:1-9:8, 2020, ACM, 978-1-4503-7778-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr |
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCI @ USENIX Security Symposium ![In: 10th USENIX Workshop on Free and Open Communications on the Internet, FOCI 2020, August 11, 2020., 2020, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Yu-Wei Chang 0005, Tsung-Nan Lin |
An Efficient Dynamic Rule Placement for Distributed Firewall in SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2020, Virtual Event, Taiwan, December 7-11, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-8298-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|