The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for firewalls with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1996 (15) 1997-1998 (18) 1999 (17) 2000 (18) 2001 (26) 2002 (39) 2003 (51) 2004 (68) 2005 (69) 2006 (76) 2007 (86) 2008 (70) 2009 (39) 2010 (24) 2011-2012 (26) 2013-2014 (29) 2015 (17) 2016 (18) 2017-2018 (20) 2019 (16) 2020 (16) 2021 (16) 2022-2023 (28) 2024 (1)
Publication types (Num. hits)
article(172) book(9) incollection(14) inproceedings(605) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 741 occurrences of 469 keywords

Results
Found 803 publication records. Showing 803 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
9Sébastien Jourdain, Julien Forest, Christophe Mouton, Bernard Nouailhas, Gerard Moniot, Franck Kolb, Sophie Chabridon, Michel Simatic, Zied Abid, Laurent Mallet ShareX3D, a scientific collaborative 3D viewer over HTTP. Search on Bibsonomy Web3D The full citation details ... 2008 DBLP  DOI  BibTeX  RDF web networking, collaboration, scientific visualization, X3D, Web3D, postprocessing
9Rafael Bosse Brinhosa, Carlos Becker Westphall, Carla Merkle Westphall A Security Framework for Input Validation. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, Angel Jesus Varela-Vaca Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Daniel Lorenz 0001, Peter Buchholz 0002, Christian Uebing, Wolfgang Walkowiak, Roland Wismüller Secure Communication for Computational Steering of Grid Jobs. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Communication, Interactivity, Grid, Computational Steering
9Simon N. Foley, William M. Fitzgerald Semantic Web and firewall alignment. Search on Bibsonomy ICDE Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Tich Phuoc Tran, Pohsiang Tsai, Tony Jan A Multi-expert Classification Framework with Transferable Voting for Intrusion Detection. Search on Bibsonomy ICMLA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Sourour Meharouech, Adel Bouhoula, Tarek Abbes Collaboration between Security Devices toward improving Network Defense. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collaboration between Security Devices, vulnerability scanner, Network Security, Firewall, Honeypot, IPS
9Maverson Eduardo Schulze Rosa, Aldo Nascimento, Luciano Sytnifc, Elias Procópio Duarte Jr. JXTA PEER SNMP: An SNMP peer for inter-domain management. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF consistency, diagnosis, firewall, conflict, acl, rule set
9Navya Sidharth, Jigang Liu Intrusion Resistant SOAP Messaging with IAPF. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Eli Brosh, Salman Baset, Dan Rubenstein, Henning Schulzrinne The delay-friendliness of TCP. Search on Bibsonomy SIGMETRICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TDP congestion control, performance modeling, VoIP, live video streaming
9Vineet Chadha, David Wolinsky, Renato J. O. Figueiredo Provisioning of virtual environments for wide area desktop grids through redirect-on-write distributed file system. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Xin Li NSIS-Based Firewall Detection in Mobile IPv6. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Next Steps in Signaling (NSIS), Firewall Detection, Firewall Traversal, Mobile IPv6
9Hung Xuan Nguyen, Daniel R. Figueiredo 0001, Matthias Grossglauser, Patrick Thiran Balanced Relay Allocation on Heterogeneous Unstructured Overlays. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Jean-Chrysostome Bolot, Marc Lelarge A New Perspective on Internet Security using Insurance. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Thomas Fieseler, Wolfgang Gürich Operation of the Core D-Grid Infrastructure. Search on Bibsonomy CCGRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF grid operation, grid middleware, grid infrastructure
9Mirco Marchetti, Michele Colajanni Adaptive traffic filtering for efficient and secure IP-mobility. Search on Bibsonomy Q2SWinet The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dynamic firewall reconfiguration, egress filtering, mobile IP
9Humphrey Waita Njogu, Xiehua Li Combating TCP Based Attacks on Mobile Devices. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Yiwen Liang, Wenjun Deng Verify Consistency between Security Policy and Firewall Policy with Answer Set Programming. Search on Bibsonomy CSSE (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Irfan A. Siddavatam, Jayant Gadge Comprehensive test mechanism to detect attack on Web Services. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Hideo Saito, Ken Hironaka, Kenjiro Taura A scalable high-performance communication library for wide-area environments. Search on Bibsonomy GRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Mohammad Mehdi Gilanian Sadeghi, Borhanuddin Mohd Ali, Hossein Pedram, Mehdi Dehghan 0001, Masoud Sabaei A New Method for Creating Efficient Security Policies in Virtual Private Network. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IPsec policies, security policy, security requirement, virtual private network
9Fedor V. Yarochkin, Shih-Yao Dai, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo Towards Adaptive Covert Communication System. Search on Bibsonomy PRDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Hamid Tabatabaee Yazdi, Amin Milani Fard, Mohammad R. Akbarzadeh-Totonchi Cooperative criminal face recognition in distributed web environment. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Eric Osterweil, Michael Ryan, Daniel Massey, Lixia Zhang 0001 Quantifying the operational status of the DNSSEC deployment. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF internet-scale security, measurement, metrics, dnssec
9JeeHyun Hwang, Tao Xie 0001, Fei Chen 0001, Alex X. Liu Systematic Structural Testing of Firewall Policies. Search on Bibsonomy SRDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Linda Wilbanks Cybersecurity: Welcome to My World. Search on Bibsonomy IT Prof. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Simon Liu, Larry Holt, Bruce Cheng A Practical Vulnerability Assessment Program. Search on Bibsonomy IT Prof. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Jean-Philippe Martin-Flatin, Gabriel Jakobson, Lundy Lewis Event Correlation in Integrated Management: Lessons Learned and Outlook. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Event-based management, Rule-based reasoning systems, Case-based reasoning systems, Network management, Service management, System management, Self-organizing systems, Event correlation, Self-adaptive systems, Integrated management
9Songqing Chen, Bo Shen 0003, Susie J. Wee, Xiaodong Zhang 0001 SProxy: A Caching Infrastructure to Support Internet Streaming. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Elizabeth A. Nichols, Gunnar Peterson A Metrics Framework to Drive Application Security Improvement. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato J. O. Figueiredo WOW: Self-organizing Wide Area Overlay Networks of Virtual Workstations. Search on Bibsonomy J. Grid Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Clusters, Grid computing, Networks, P2P, Virtual
9Jacob Gorm Hansen, Eske Christiansen, Eric Jul Evil twins: two models for TCB reduction in HPC clusters. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Ram Dantu, João W. Cangussu, Sudeep Patwardhan Fast Worm Containment Using Feedback Control. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF general, network-level security and protection, Computer systems organization, computer systems organization, process control systems, special-purpose and application-based systems, communication/networking and information technology
9Andrew G. Miklas, Kiran K. Gollu, Kelvin K. W. Chan, Stefan Saroiu, P. Krishna Gummadi, Eyal de Lara Exploiting Social Interactions in Mobile Systems. Search on Bibsonomy UbiComp The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Vukasin Pejovic, Slobodan Bojanic, Carlos Carreras Adding Value to TCP/IP Based Information exchange Security by Specialized Hardware. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna Multi-module vulnerability analysis of web-based applications. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-step attacks, static analysis, web applications, dynamic analysis, vulnerability analysis
9Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh Protecting browsers from dns rebinding attacks. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF spam, firewall, dns, same-origin policy, click fraud
9Jeongseok Seo, Sung Deok Cha Masquerade detection based on SVM and sequence-based user commands profile. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF user commands profile, support vector machine (SVM), anomaly detection, masquerade detection
9Lawrence Teo, Gail-Joon Ahn Managing heterogeneous network environments using an extensible policy framework. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang 0020 Hierarchical Trustworthy Authentication for Pervasive Computing. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Rhiannon Weaver, M. Patrick Collins Fishing for phishes: applying capture-recapture methods to estimate phishing populations. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia Management of Exceptions on Access Control Policies. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Feng Cheng 0002, Christian Wolter, Christoph Meinel A Simple, Smart and Extensible Framework for Network Security Measurement. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Emanuel P. Freire, Ronaldo M. Salles, Artur Ziviani On Metrics to Distinguish Skype flows from HTTP traffic. Search on Bibsonomy LANOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Henry Haverinen, Jonne Siren, Pasi Eronen Energy Consumption of Always-On Applications in WCDMA Networks. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Tonio Triebel, Benjamin Guthier, Wolfgang Effelsberg Skype4Games. Search on Bibsonomy NETGAMES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed interactive applications, peer-to-peer, Skype
9Grzegorz J. Nalepa Application of the XTT Rule-Based Model for Formal Design and Verification of Internet Security Systems. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Simone Ferraresi, Stefano Pesic, Livia Trazza, Andrea Baiocchi Automatic Conflict Analysis and Resolution of Traffic Filtering Policy for Firewall and Security Gateway. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia Aggregating and Deploying Network Access Control Policies. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Eduardo B. Fernández Security patterns and secure systems design. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Sapon Tanachaiwiwat, Ahmed Helmy On the performance evaluation and prediction of encounter-based worm interactions based on node characteristics. Search on Bibsonomy Challenged Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encounter-based worms, delay-tolerant networks, worm
9Golnaz Elahi, Eric S. K. Yu A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs. Search on Bibsonomy ER The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security Trade-offs, Goal Model Evaluation, Goal Modeling, Trade-off Analysis
9Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. Search on Bibsonomy SpringSim (3) The full citation details ... 2007 DBLP  BibTeX  RDF privacy, network security, DDoS, wireless security
9Vera Marinova-Boncheva Applying a data mining method for intrusion detection. Search on Bibsonomy CompSysTech The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data mining, classification tree, misuse detection
9K. Sivakumar, K. Garg Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure code, PHP Vulnerabilities, CWE, CVE, Web Security, XSS
9J. Mark Pullen Network educationware demonstration. Search on Bibsonomy ITiCSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF internet distance education, accessibility, wider access
9Gustavo Marfia, Claudio E. Palazzi, Giovanni Pau 0001, Mario Gerla, Medy Sanadidi, Marco Roccetti Balancing video on demand flows over links with heterogeneous delays. Search on Bibsonomy MobiMedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RTT-fairness, TCP, video on demand
9Håvard Espeland, Carl Henrik Lunde, Håkon Kvale Stensland, Carsten Griwodz, Pål Halvorsen Transparent protocol translation for streaming. Search on Bibsonomy ACM Multimedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Arijit Ganguly, David Wolinsky, P. Oscar Boykin, Renato J. O. Figueiredo Decentralized Dynamic Host Configuration in Wide-Area Overlays of Virtual Workstations. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Almut Herzog, Nahid Shahmehri User help techniques for usable security. Search on Bibsonomy CHIMIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF on-line help, safe staging, user help, usable security, social navigation, wizard
9Tetsuo Imai, Hideaki Goto, Hideaki Sone A Policy-Based, Secure Access Control Mechanism for Network Roaming Infrastructures. Search on Bibsonomy SAINT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Shervin Erfani Tutorial 4: Wireless and Wireline Security Management. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Mohammed Anis Benelbahri, Adel Bouhoula Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Julien Bourgeois, Abdoul Karim Ganame, Igor V. Kotenko, Alexander Ulanov Software Environment for Simulation and Evaluation of a Security Operation Center. Search on Bibsonomy IF&GIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security modeling and simulation, intrusion detection, DDoS, infrastructure security
9Paul Z. Kolano Mesh: secure, lightweight grid middleware using existing SSH infrastructure. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, distributed systems, authentication, access control, middleware, grids, authorization, delegation, single sign-on, SSH
9Jérôme François, Radu State, Olivier Festor Botnets for Scalable Management. Search on Bibsonomy DSOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Kathy Dang Nguyen, P. S. Thiagarajan, Weng-Fai Wong A UML-Based Design Framework for Time-Triggered Applications. Search on Bibsonomy RTSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Eduardo B. Fernández Security Patterns and Secure Systems Design. Search on Bibsonomy LADC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Arunabha Mukhopadhyay, Binay Bhushan, Debashis Saha, Ambuj Mahanti E-Risk Management through Self Insurance: An Option Model. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF e-risk, option model, self-insurance, e-commerce, security breach
9A. Vartak, S. Ahmad, K. N. Gopinath An Experimental Evaluation of Over-The-Air (OTA) Wireless Intrusion Prevention Techniques. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Yudith Cardinale, Carlos Figueira GiPS: A Grid Portal for Executing Java Applications on Globus-Based Grids. Search on Bibsonomy ISPA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Portal Development Kit, Java Execution Model, Grid Computing, Grid Security, Grid Portals
9Vesselin Tzvetkov Fast detection of disconnection using adaptive Fuzzy Logic. Search on Bibsonomy ICNSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Jia Ni, Chuang Lin 0002, Zhen Chen 0001, Peter D. Ungsunan A Fast Multi-pattern Matching Algorithm for Deep Packet Inspection on a Network Processor. Search on Bibsonomy ICPP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Harshawardhan Gadgil, Geoffrey C. Fox, Shrideep Pallickara, Marlon E. Pierce Scalable, fault-tolerant management in a service oriented architecture. Search on Bibsonomy HPDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF service oriented achitecture, web services, fault-tolerance, scalable
9Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch A Traffic Classification Algorithm for Intrusion Detection. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Vesselin Tzvetkov Optimization of update intervals in Dead-Peer-Detection using adaptive Fuzzy Logic. Search on Bibsonomy AINA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Sourour Meharouech, Adel Bouhoula, Tarek Abbes A Stateful Real Time Intrusion Detection System for high-speed network. Search on Bibsonomy AINA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Tiantian Qin, Judee K. Burgoon An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li An Automated Framework for Validating Firewall Policy Enforcement. Search on Bibsonomy POLICY The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Sapon Tanachaiwiwat, Ahmed Helmy Computer worm ecology in encounter-based networks. Search on Bibsonomy BROADNETS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Tong Liu, Chwan-Hwa John Wu Intrusion-resilient, DDoS-resistant and agent-assisted network security system. Search on Bibsonomy BROADNETS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Seong Joon Lee, Il Seok Ko, Min Wook Kil A User Interface for Controlling Information Appliances in Smart Homes. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9El-Sayed M. El-Alfy, Shokri Z. Selim On Optimal Firewall Rule Ordering. Search on Bibsonomy AICCSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Brandon Wagner, Stephen A. Renshaw, Kent Broadbent A multi-part lab exercise for analyzing the effect of peer-to-peer software on a university network. Search on Bibsonomy SIGITE Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network traffic monitoring, networking lab, peer-to-peer, campus network
9Ying Qiu, Feng Bao 0001, Jianying Zhou 0001 Firewall for Dynamic IP Address in Mobile IPv6. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobile IP6, Firewall
9Kirsti Simula Intelligent software agent framework for customized mobile services. Search on Bibsonomy Middleware (Doctoral Symposium) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF internet, mobile device, framework, software agents
9Alex Wun, Hans-Arno Jacobsen A Policy Management Framework for Content-Based Publish/Subscribe Middleware. Search on Bibsonomy Middleware The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Policy, Configurability, Publish/Subscribe
9Genevieve Bartlett, John S. Heidemann, Christos Papadopoulos Understanding passive and active service discovery. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network reconnaissance, service discovery, situational awareness, active measurement, passive monitoring
9Mark Wallis, Frans Henskens, Michael Hannaford A System for Robust Peer-to-Peer Communication with Dynamic Protocol Selection. Search on Bibsonomy PDCAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Alain J. Mayer, Avishai Wool, Elisha Ziskind Offline firewall analysis. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security anagment, Network Security, Internet Protocol (IP), Packet Filtering
9P. Ramasubramanian, Arputharaj Kannan A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system. Search on Bibsonomy Soft Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Database anomaly intrusion prediction, Genetic algorithms, Artificial neural networks, Database security, Intrusion prevention
9Gunnar Peterson, John Steven Defining Misuse within the Development Process. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9José Carlos Brustoloni Laboratory experiments for network security instruction. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle
9Paul Brebner, Wolfgang Emmerich Two Ways to Grid: The Contribution of Open Grid Services Architecture (OGSA) Mechanisms to Service-Centric and Resource-Centric Lifecycles. Search on Bibsonomy J. Grid Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF open Grid services architecture (OGSA) evaluation, service-oriented architecture (SOA) lifecycles
9Hazem H. Hamed, Ehab Al-Shaer Dynamic rule-ordering optimization for high-speed firewall filtering. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Mario Petrone, Roberto Zarrelli Enabling PVM to Build Parallel Multidomain Virtual Machines. Search on Bibsonomy PDP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, Raghu Ramakrishnan 0001 Toward a Query Language for Network Attack Data. Search on Bibsonomy ICDE Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Dalila Boughaci, Habiba Drias, Brahim Oubeka, Abdelkader Aissioui, Belaid Benhamou A Distributed Firewall using Autonomous Agents. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9A. A. Azeezunnisa, T. Srinivasan 0001, D. Vijayalakshmi PAFBV: A Novel Parallel Aggregated and Folded Bit Vector Packet Classification Scheme for IPv6 Routers. Search on Bibsonomy CIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 803 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license