The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for firewall with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-1996 (22) 1997-1998 (22) 1999 (21) 2000 (23) 2001 (28) 2002 (33) 2003 (59) 2004 (63) 2005 (82) 2006 (78) 2007 (91) 2008 (93) 2009 (65) 2010 (52) 2011 (54) 2012 (36) 2013 (32) 2014 (37) 2015 (44) 2016 (55) 2017 (40) 2018 (47) 2019 (40) 2020 (35) 2021 (29) 2022 (40) 2023 (33) 2024 (6)
Publication types (Num. hits)
article(294) book(2) incollection(12) inproceedings(941) phdthesis(11)
Venues (Conferences, Journals, ...)
CoRR(38) ACSAC(17) ICC(13) Comput. Secur.(10) LISA(10) Security and Management(10) AINA(9) IEEE Access(9) ICDCS(8) ICICS(8) INFOCOM(8) ISCC(8) POLICY(8) DSN(7) ICNP(7) login Usenix Mag.(7) More (+10 of total 665)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 762 occurrences of 447 keywords

Results
Found 1260 publication records. Showing 1260 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Saurabh Raje, Shyamal Vaderia, Neil Wilson, Rudrakh Panigrahi Decentralised firewall for malware detection. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
15Amina Saâdaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula FARE: FDD-based firewall anomalies resolution tool. Search on Bibsonomy J. Comput. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Alex X. Liu, Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Dan Pei, Jia Wang 0001 Firewall Fingerprinting and Denial of Firewalling Attacks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Achim D. Brucker, Lukas Brügger, Burkhart Wolff Formal Network Models and Their Application to Firewall Policies. Search on Bibsonomy Arch. Formal Proofs The full citation details ... 2017 DBLP  BibTeX  RDF
15Qi Lu, Zhiping Huang, Jiaqi Lu 基于深度包检测的防火墙系统设计 (System Design of Firewall Based on Deep Packet Inspection). Search on Bibsonomy 计算机科学 The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Ehab S. Elmallah, Mohamed G. Gouda Hardness of Firewall Analysis. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Yi Yin, Yuichiro Tateiwa, Yun Wang, Yoshiaki Katayama, Naohisa Takahashi Inconsistency Analysis of Time-Based Security Policy and Firewall Policy. Search on Bibsonomy ICFEM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Yi Yin, Yuichiro Tateiwa, Yun Wang, Yoshiaki Katayama, Naohisa Takahashi An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solver. Search on Bibsonomy ICCCS (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Dai Suzuki, Satoshi Imai, Toru Katagiri A new index of hidden workload for firewall rule processing on virtual machine. Search on Bibsonomy ICNC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Nitin Naik, Paul Jenkins, Roger Cooke, David Ball, Arthur Foster, Yaochu Jin Augmented windows fuzzy firewall for preventing denial of service attack. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Nitin Naik, Ren Diao, Changjing Shang, Qiang Shen 0001, Paul Jenkins D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Fahad Nife, Zbigniew Kotulski Multi-level Stateful Firewall Mechanism for Software Defined Networks. Search on Bibsonomy CN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Naman Gupta, Vinayak Naik, Srishti Sengupta A firewall for Internet of Things. Search on Bibsonomy COMSNETS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Hyungseok Kim, Sukjun Ko, Dong Seong Kim 0001, Huy Kang Kim Firewall ruleset visualization analysis tool based on segmentation. Search on Bibsonomy VizSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Amina Saâdaoui, Nihel Ben Youssef, Adel Bouhoula Automatic detection and correction of firewall misconfigurations- A formal approach. Search on Bibsonomy SCSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15James Gill, Kazi Zunnurhain Determining the Penetration Threshold for an ASA 5500 Firewall. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Mathis Steichen, Stefan Hommes, Radu State ChainGuard - A firewall for blockchain applications using SDN with OpenFlow. Search on Bibsonomy IPTComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Juan Deng, Hongda Li 0002, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao 0001, Wonkyu Han On the Safety and Efficiency of Virtual Firewall Elasticity Control. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
15Syed Rizvi 0001, Jonathan Willett, Donte Perino, Tyler Vasbinder, Seth Marasco Protecting an automobile network using distributed firewall system. Search on Bibsonomy ICC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Najim Ammari, Almokhtar Ait El Mrabti, Anas Abou El Kalam, Abdellah Ait Ouahman Securing the mobile environment: firewall anti-leak of sensitive data on smartphone. Search on Bibsonomy ICC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Ayhan Akbal, Erhan Akbal Digital forensic analysis through Firewall for detection of information crimes in hospital networks. Search on Bibsonomy MIPRO The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Hongda Li 0002, Juan Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao 0001, Wonkyu Han Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. Search on Bibsonomy SACMAT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Zhan Wang, Ning Ling, Donghui Hu, Xiaoxia Hu, Tao Zhang, Zhong-Qiu Zhao Image Firewall for Filtering Privacy or Sensitive Image Content Based on Joint Sparse Representation. Search on Bibsonomy ICIC (3) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Nora Cuppens, Salaheddine Zerkane, Yanhuang Li, David Espes, Philippe Le Parc, Frédéric Cuppens Firewall Policies Provisioning Through SDN in the Cloud. Search on Bibsonomy DBSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Yicong Zhang, Jie Li 0002, Lin Chen 0002, Yusheng Ji, Feilong Tang A novel method against the firewall bypass threat in OpenFlow networks. Search on Bibsonomy WCSP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Luciano Antonio Mendes, Thiago Schaedler Uhlmann, Dani Juliano Czelusniak Using cloud web services to intermediate communication in ISA / ELSA: Circumventing the firewall in single user and collaborative remote experimentation. Search on Bibsonomy exp.at The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Shunhao Lin, Ding Zhang, Yuqing Fu, Shuxian Wang A design of the ethernet firewall based on FPGA. Search on Bibsonomy CISP-BMEI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Diogo Sampaio, Jorge Bernardino Evaluation of Firewall Open Source Software. Search on Bibsonomy WEBIST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Nicholas Gray, Claas Lorenz, Alexander Müssig, Steffen Gebert, Thomas Zinner, Phuoc Tran-Gia A priori state synchronization for fast failover of stateful firewall VNFs. Search on Bibsonomy NetSys The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Hicham Toumi, Bouchra Marzak, Yassine Khazri, Amal Talea, Ahmed Eddaoui, Mohamed Talea Mobiles Agents and Virtual Firewall to Secure the Shared Network for Virtual Machines in IaaS cloud. Search on Bibsonomy BDCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Florian Heimgaertner, Mark Schmidt 0002, David Morgenstern, Michael Menth A software-defined firewall bypass for congestion offloading. Search on Bibsonomy CNSM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Shan-Jung Fu, Huai-Wen Hsu, Yi-Chih Kao, Shi-Chun Tsai, Chien-Chao Tseng An autoblocking mechanism for firewall service. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Amina Saâdaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula A New FDD-Based Method for Distributed Firewall Misconfigurations Resolution. Search on Bibsonomy EMCIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Wyatt Yost, Chetan Jaiswal MalFire: Malware firewall for malicious content detection and protection. Search on Bibsonomy UEMCON The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Antonis Papagrigoriou, Polydoros Petrakis, Miltos D. Grammatikakis A firewall module resolving rules consistency. Search on Bibsonomy WISES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Tytus Kurek, Marcin Niemiec, Artur Lason Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch Detection of firewall configuration errors with updatable tree. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Suchart Khummanee, Kitt Tientanopajai The Policy Mapping Algorithm for High-speed Firewall Policy Verifying. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2016 DBLP  BibTeX  RDF
15Miyoung Kang, Jin-Young Choi, Inhye Kang, Hee-Hwan Kwak, So Jin Ahn, Myung-Ki Shin A Verification Method of SDN Firewall Applications. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Andy Applebaum, Zimi Li, Karl N. Levitt, Simon Parsons, Jeff Rowe, Elizabeth I. Sklar Firewall configuration: An application of multiagent metalevel argumentation. Search on Bibsonomy Argument Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Dinesha Ranathunga, Matthew Roughan, Hung X. Nguyen, Phil Kernick, Nickolas J. G. Falkner Case Studies of SCADA Firewall Configurations and the Implications for Best Practices. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Andrew Prout, William Arcand, David Bestor, Bill Bergeron, Chansup Byun, Vijay Gadepally, Matthew Hubbell, Michael Houle 0001, Michael Jones 0001, Peter Michaleas, Lauren Milechin, Julie Mullen, Antonio Rosa, Siddharth Samsi, Albert Reuther, Jeremy Kepner Enhancing HPC Security with a User-Based Firewall. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
15Arief Wicaksana, Arif Sasongko Fast and reconfigurable packet classification engine in FPGA-based firewall. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
15Cornelius Diekmann, Lars Hupel, Georg Carle Semantics-Preserving Simplification of Real-World Firewall Rule Sets. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
15Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
15Rongmao Chen, Yi Mu 0001, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
15Cornelius Diekmann, Julius Michaelis, Max W. Haslbeck Simple Firewall. Search on Bibsonomy Arch. Formal Proofs The full citation details ... 2016 DBLP  BibTeX  RDF
15Wenli Shang, Quansheng Qiao, Ming Wan, Peng Zeng 0001 Design and Implementation of Industrial Firewall for Modbus/TCP. Search on Bibsonomy J. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Myo Thant, Kyaw Zaw Ye, Kyaw Myat Thu, Si Thu Thant Sin Development of Firewall Optimization Model Using by Packet Filter. Search on Bibsonomy UKSim The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Ahmed Bouhoula, Anis Yazidi A security Policy Query Engine for fully automated resolution of anomalies in firewall configurations. Search on Bibsonomy NCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Pengfule Ding, Zhihong Tian, Hongli Zhang 0001, Yong Wang, Liang Zhang, Sanchuan Guo Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall. Search on Bibsonomy DSC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens Software Defined Networking Reactive Stateful Firewall. Search on Bibsonomy SEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Ratish Mohan, Anis Yazidi, Boning Feng, B. John Oommen Dynamic Ordering of Firewall Rules Using a Novel Swapping Window-based Paradigm. Search on Bibsonomy ICCNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Daniel Csubak, Attila Kiss 0001 OpenStack Firewall as a Service Rule Analyser. Search on Bibsonomy HCI (20) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens A Proactive Stateful Firewall for Software Defined Networking. Search on Bibsonomy CRiSIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Hassan Takabi Firewall for brain: Towards a privacy preserving ecosystem for BCI applications. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Anisha Mazumder, Arunabha Sen On social network firewall selection. Search on Bibsonomy ICNC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Cornelius Diekmann, Julius Michaelis, Max W. Haslbeck, Georg Carle Verified iptables firewall analysis. Search on Bibsonomy Networking The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Nitin Naik, Paul Jenkins Fuzzy reasoning based Windows Firewall for preventing denial of service attack. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Pedro Adão, Riccardo Focardi, Joshua D. Guttman, Flaminia L. Luccio Localizing Firewall Security Policies. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Steffen Gebert, Alexander Müssig, Stanislav Lange, Thomas Zinner, Nicholas Gray, Phuoc Tran-Gia Processing Time Comparison of a Hardware-Based Firewall and Its Virtualized Counterpart. Search on Bibsonomy MONAMI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Oliver Farnan, Alexander Darer, Joss Wright Poisoning the Well: Exploring the Great Firewall's Poisoned DNS Responses. Search on Bibsonomy WPES@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
15Anna Giannakou, Louis Rilling, Jean-Louis Pazat, Christine Morin AL-SAFE: A Secure Self-Adaptable Application-Level Firewall for IaaS Clouds. Search on Bibsonomy CloudCom The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Sun-young Im, Seung-Hun Shin, Ki-Yeol Ryu, Byeong-Hee Roh Performance evaluation of network scanning tools with operation of firewall. Search on Bibsonomy ICUFN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Fineas-Lucian Lupaescu, Iustin-Alexandru Ivanciu, Eduard-Florentin Luchian, Virgil Dobrota A firewall application for performance evaluation of the pyretic controller in software-defined networks. Search on Bibsonomy RoEduNet The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Mahesh Nath Maddumala, Vijay Kumar 0002 Efficient Design of Firewall Temporal Policies. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Rongmao Chen, Yi Mu 0001, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner Malachite: Firewall policy comparison. Search on Bibsonomy ISCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian M. Molloy, Youngja Park Tri-Modularization of Firewall Policies. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Ultan Neville, Simon N. Foley Reasoning About Firewall Policies Through Refinement and Composition. Search on Bibsonomy DBSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Helton Molina Sapia, Rogério Eduardo Garcia, Celso Olivete Junior, Danillo Roberto Pereira, Kleber Manrique Trevisani Teaching-learning firewall configuration using a visual modeling web based tool: The SP2Model and its application to Computer Science course. Search on Bibsonomy FIE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan 0001 An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. Search on Bibsonomy Trustcom/BigDataSE/ISPA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Shadha Mohamed AlAmri, Lin Guan Exploring the Firewall Security Consistency in Cloud Computing during Live Migration. Search on Bibsonomy ICCCNT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Jarrod N. Bakker, Ian Welch, Winston K. G. Seah Network-wide virtual firewall using SDN/OpenFlow. Search on Bibsonomy NFV-SDN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Najim Ammari, Almokhtar Ait El Mrabti, Anas Abou El Kalam, Abdellah Ait Ouahman Firewall Anti-Leak of Sensitive Data. Search on Bibsonomy ANT/SEIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Baoliang Wang, Kaining Lu, Peng Chang Design and implementation of Linux firewall based on the frame of Netfilter/IPtable. Search on Bibsonomy ICCSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Josef Horalek, Vladimir Sobeslav IPv6 Firewall Functions Analysis. Search on Bibsonomy ICCCI (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Matthew Comb, Paul A. Watters Peeking behind the great firewall: Privacy on Chinese file sharing networks. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Nitin Naik, Paul Jenkins Enhancing Windows Firewall Security Using Fuzzy Reasoning. Search on Bibsonomy DASC/PiCom/DataCom/CyberSciTech The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Andrew Prout, William Arcand, David Bestor, Bill Bergeron, Chansup Byun, Vijay Gadepally, Matthew Hubbell, Michael Houle 0001, Michael Jones 0001, Peter Michaleas, Lauren Milechin, Julie Mullen, Antonio Rosa, Siddharth Samsi, Albert Reuther, Jeremy Kepner Enhancing HPC security with a user-based firewall. Search on Bibsonomy HPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Leopoldo Alexandre F. Mauricio, Marcelo G. Rubinstein, Otto Carlos M. B. Duarte Proposing and evaluating the performance of a firewall implemented as a virtualized network function. Search on Bibsonomy NOF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Shane Alcock, Jean-Pierre Möller, Richard Nelson Sneaking Past the Firewall: Quantifying the Unexpected Traffic on Major TCP and UDP Ports. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2016 DBLP  BibTeX  RDF
15Kangshun Li, Lu Xiong, Zhichao Wen An Improved Search Algorithm About Spam Firewall. Search on Bibsonomy BIC-TA (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Hualong Sheng, Lingbo Wei, Chi Zhang 0001, Xia Zhang Privacy-Preserving Cloud-Based Firewall for IaaS-based Enterprise. Search on Bibsonomy NaNA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Adam Czubak, Marcin Szymanek Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall. Search on Bibsonomy ISAT (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Matthias Wilhelm 0001 Feasibility and Applications of a Wireless Firewall. Search on Bibsonomy 2016   RDF
15Adem Tekerek Web tabanlı saldırı önleme amaçlı yeni bir gerçek zamanlı web uygulaması güvenlik duvarı algoritmasının gerçekleştirilmesi (Implemantation of a real time web-based intrusion prevention aimed web application firewall algoritm) Search on Bibsonomy 2016   RDF
15Thawatchai Chomsiri Tree rule firewall Search on Bibsonomy 2016   RDF
15Yuzhu Cheng, Weiping Wang 0003, Geyong Min, Jianxin Wang 0001 A new approach to designing firewall based on multidimensional matrix. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Yosr Jarraya, Arash Eghtesadi, Sahba Sadri, Mourad Debbabi, Makan Pourzandi Verification of firewall reconfiguration for virtual machines migrations in the cloud. Search on Bibsonomy Comput. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Roya Ensafi, Philipp Winter, Abdullah Mueen 0001, Jedidiah R. Crandall Analyzing the Great Firewall of China Over Space and Time. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Sylvain Kubler, Kary Främling, Andrea Buda A standardized approach to deal with firewall and mobility policies in the IoT. Search on Bibsonomy Pervasive Mob. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Meng Liu 0010, Wanchun Dou, Shui Yu 0001, Zhensheng Zhang A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Miltos D. Grammatikakis, Kyprianos Papadimitriou, Polydoros Petrakis, Antonis Papagrigoriou, George Kornaros, Ioannis Christoforakis, Othon Tomoutzoglou, George Tsamis, Marcello Coppola Security in MPSoCs: A NoC Firewall and an Evaluation Framework. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Ning Wang 0008, Xuemin Chen, Gangbing Song, Hamid R. Parsaei Using Node-HTTP-Proxy for Remote Experiment Data Transmission Traversing Firewall. Search on Bibsonomy Int. J. Online Eng. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Raik Niemann, Udo Pfingst, Richard Göbel Performance Evaluation of netfilter: A Study on the Performance Loss When Using netfilter as a Firewall. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
15Dirk Achenbach, Jörn Müller-Quade, Jochen Rill Universally Composable Firewall Architectures using Trusted Hardware. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
15Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud 0001, Kilani Ghoudi Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement. Search on Bibsonomy Comput. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Hicham Amellal, Abdelmajid Meslouhi, Yassine Hassouni, Morad El Baz A quantum optical firewall based on simple quantum devices. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Achim D. Brucker, Lukas Brügger, Burkhart Wolff Formal firewall conformance testing: an application of test and proof techniques. Search on Bibsonomy Softw. Test. Verification Reliab. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 1260 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license