The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Firewall with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-1996 (22) 1997-1998 (22) 1999 (21) 2000 (23) 2001 (28) 2002 (33) 2003 (59) 2004 (63) 2005 (82) 2006 (78) 2007 (91) 2008 (93) 2009 (65) 2010 (52) 2011 (54) 2012 (36) 2013 (32) 2014 (37) 2015 (44) 2016 (55) 2017 (40) 2018 (47) 2019 (40) 2020 (35) 2021 (29) 2022 (40) 2023 (33) 2024 (6)
Publication types (Num. hits)
article(294) book(2) incollection(12) inproceedings(941) phdthesis(11)
Venues (Conferences, Journals, ...)
CoRR(38) ACSAC(17) ICC(13) Comput. Secur.(10) LISA(10) Security and Management(10) AINA(9) IEEE Access(9) ICDCS(8) ICICS(8) INFOCOM(8) ISCC(8) POLICY(8) DSN(7) ICNP(7) login Usenix Mag.(7) More (+10 of total 665)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 762 occurrences of 447 keywords

Results
Found 1260 publication records. Showing 1260 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Konstantinos Demertzis, Lazaros S. Iliadis Evolving Smart URL Filter in a Zone-Based Policy Firewall for Detecting Algorithmically Generated Malicious Domains. Search on Bibsonomy SLDS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula Automated and Optimized FDD-Based Method to Fix Firewall Misconfigurations. Search on Bibsonomy NCA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. Search on Bibsonomy ACIS The full citation details ... 2015 DBLP  BibTeX  RDF
15Hailu Tegenaw, Mesfin Kifle Application aware firewall architecture to enhance performance of enterprise network. Search on Bibsonomy AFRICON The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Wenli Shang, Ming Wan, Peng Zeng 0001, Quansheng Qiao Research on self-learning method on generation and optimization of industrial firewall rules. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Simon N. Foley, Ultan Neville A firewall algebra for OpenStack. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Lin Zhang, Mengxing Huang A Firewall Rules Optimized Model Based on Service-Grouping. Search on Bibsonomy IEEE WISA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Cornelius Diekmann, Lars Hupel, Georg Carle Semantics-Preserving Simplification of Real-World Firewall Rule Sets. Search on Bibsonomy FM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Michael LeMay, Carl A. Gunter Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. Search on Bibsonomy Logic, Rewriting, and Concurrency The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Ferney A. Maldonado-Lopez, Eusebi Calle, Yezid Donoso Detection and prevention of firewall-rule conflicts on software-defined networking. Search on Bibsonomy RNDM@WMNC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Haining Chen, Omar Chowdhury, Jing Chen 0005, Ninghui Li, Robert W. Proctor Towards quantification of firewall policy complexity. Search on Bibsonomy HotSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Zhenfang Wang, ZhiHui Lu 0002, Jie Wu 0003, Kang Fan CPFirewall: A Novel Parallel Firewall Scheme for FWaaS in the Cloud Environment. Search on Bibsonomy APSCC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Dennis Appelt, Cu Duy Nguyen, Lionel C. Briand Behind an Application Firewall, Are We Safe from SQL Injection Attacks? Search on Bibsonomy ICST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Fouad Amine Guenane Network security management using a novel firewall Cloud-based service. Search on Bibsonomy CFIP/NOTERE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Jozef Filipek, Ladislav Hudec Distributed firewall using PKI in mobile Ad Hoc networks. Search on Bibsonomy CompSysTech The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Stefan Prandl, Mihai M. Lazarescu, Duc-Son Pham 0001 A Study of Web Application Firewall Solutions. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Tomokazu Otsuka, Gada, Nariyoshi Yamai, Kiyohiko Okayama, Yong Jin Design and Implementation of Client IP Notification Feature on DNS for Proactive Firewall System. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Thuy Vinh Tran, Heejune Ahn A network topology-aware selectively distributed firewall control in SDN. Search on Bibsonomy ICTC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Kazunori Kamiya, Kazufumi Aoki, Kensuke Nakata, Toru Sato, Hiroshi Kurakami, Masaki Tanikawa The method of detecting malware-infected hosts analyzing firewall and proxy logs. Search on Bibsonomy APSITT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15A. Fairuzullah, Ahmad Noraziah, Wan Maseri Binti Wan Mohd, Tutut Herawan A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall. Search on Bibsonomy DaEng The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Simeon Miteff, Scott Hazelhurst NFShunt: A Linux firewall with OpenFlow-enabled hardware bypass. Search on Bibsonomy NFV-SDN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner Towards Standardising Firewall Reporting. Search on Bibsonomy CyberICS/WOS-CPS@ESORICS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Ladislav Balik, Josef Horalek, Ondrej Hornig, Vladimir Sobeslav, Rafael Dolezal, Kamil Kuca Endpoint Firewall for Local Security Hardening in Academic Research Environment. Search on Bibsonomy ICCCI (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Kangshun Li, Zhichao Wen The Privacy Protection Search of Spam Firewall. Search on Bibsonomy ISICA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Burkhard Wiegel Securing Enterprise Email Communication on both Sides of the Firewall. Search on Bibsonomy ISSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Ruud Koolen, Julien Schmaltz Formal Methods for MILS: Formalisations of the GWV Firewall. Search on Bibsonomy MILS@HiPEAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Yong Hu, Daniel Müller-Gritschneder, Martha Johanna Sepúlveda, Guy Gogniat, Ulf Schlichtmann Automatic ILP-based Firewall Insertion for Secure Application-Specific Networks-on-Chip. Search on Bibsonomy INA-OCMC@HiPEAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Herny Ramadhani Mohd Husny Hamid, Megat Ahmad Izzat bin Megat Ahmad Kamil, Norhaiza Ya Abdullah Portable Toolkit for Penetration Testing and Firewall Configuration. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Om Prakash Patel, Aruna Tiwari, Vikram Patel, Ojas Gupta Quantum Based Neural Network Classifier and Its Application for Firewall to Detect Malicious Web Request. Search on Bibsonomy SSCI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Miltos D. Grammatikakis, Polydoros Petrakis, Antonis Papagrigoriou, George Kornaros, Marcello Coppola High-level security services based on a hardware NoC Firewall module. Search on Bibsonomy WISES The full citation details ... 2015 DBLP  BibTeX  RDF
15Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson Examining How the Great Firewall Discovers Hidden Circumvention Servers. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Zouheir Trabelsi, Liren Zhang, Safaa Zeidan Dynamic rule and rule-field optimisation for improving firewall performance and security. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Ui-Hyong Kim, Jung-Min Kang, Jae-Sung Lee, Hyong-Shik Kim, Soon-Young Jung Practical firewall policy inspection using anomaly detection and its visualization. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Zubair Nabi A $35 Firewall for the Developing World. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Michael LeMay, Carl A. Gunter Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Roya Ensafi, Philipp Winter, Abdullah Mueen 0001, Jedidiah R. Crandall Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Xiangjian He, Thawatchai Chomsiri, Priyadarsi Nanda, Zhiyuan Tan 0001 Improving cloud network security using the Tree-Rule firewall. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Muhammad Qasim Ali, Ehab Al-Shaer, Taghrid Samak Firewall Policy Reconnaissance: Techniques and Analysis. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Harsh Taneja, Angela Xiao Wu Does the Great Firewall Really Isolate the Chinese? Integrating Access Blockage With Cultural Factors to Explain Web User Behavior. Search on Bibsonomy Inf. Soc. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Wei-Ming Chen, Hsin-Hung Chiang, Kai-Di Chang, Han-Chieh Chao, Jiann-Liang Chen Backup routing firewall mechanism in P2P environment. Search on Bibsonomy Peer-to-Peer Netw. Appl. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Qinghua Yang, Yu Liu What's on the other side of the great firewall? Chinese Web users' motivations for bypassing the Internet censorship. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Ehab Al-Shaer Automated Firewall Analytics - Design, Configuration and Optimization Search on Bibsonomy 2014   DOI  RDF
15Ashok Singh Sairam, Rahul Kumar, Pratima Biswas Implementation of an Adaptive Traffic-aware Firewall. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Pedro Adão, Claudio Bozzato, G. Dei Rossi, Riccardo Focardi, Flaminia L. Luccio Mignis: A Semantic Based Tool for Firewall Configuration. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Meng Liu 0010, Wan-Chun Dou, Shui Yu 0001, Zhensheng Zhang A clusterized firewall framework for cloud computing. Search on Bibsonomy ICC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Casimer M. DeCusatis, Peter Mueller Virtual Firewall Performance as a Waypoint on a Software Defined Overlay Network. Search on Bibsonomy HPCC/CSS/ICESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Hammad Kabir, Raimo Kantola, Jesus Llorente Santos Security Mechanisms for a Cooperative Firewall. Search on Bibsonomy HPCC/CSS/ICESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Miltos D. Grammatikakis, Kyprianos Papadimitriou, Polydoros Petrakis, Antonis Papagrigoriou, George Kornaros, Ioannis Christoforakis, Marcello Coppola Security Effectiveness and a Hardware Firewall for MPSoCs. Search on Bibsonomy HPCC/CSS/ICESS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Hongxin Hu, Gail-Joon Ahn, Wonkyu Han, Ziming Zhao 0001 Towards a Reliable SDN Firewall. Search on Bibsonomy ONS The full citation details ... 2014 DBLP  BibTeX  RDF
15Zeyad S. Aaber, Richard M. Crowder, Victor I. Chang 0001, Nawfal F. Fadhel, Gary B. Wills Towards a Framework for Securing a Document outside an Organisational Firewall. Search on Bibsonomy CloudCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15 Towards a Comprehensive Picture of the Great Firewall's DNS Censorship. Search on Bibsonomy FOCI The full citation details ... 2014 DBLP  BibTeX  RDF
15Byoung-Koo Kim, Dong-Ho Kang, Jung-Chan Na, Beom-Hwan Chang, Tai-Myoung Chung Design of Industrial Firewall System Based on Multiple Access Control Filter. Search on Bibsonomy FCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Dong-Ho Kang, Byoung-Koo Kim, Jung-Chan Na, Kyoung-Son Jhang Whitelist Generation Technique for Industrial Firewall in SCADA Networks. Search on Bibsonomy FCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Mohammad M. Masud 0001, Umniya Mustafa, Zouheir Trabelsi A data driven firewall for faster packet filtering. Search on Bibsonomy COMNET The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Ahmed Khoumsi, Wadie Krombi, Mohammed Erradi A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Ehab S. Elmallah, Mohamed G. Gouda Hardness of Firewall Analysis. Search on Bibsonomy NETYS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Sebastian Biedermann, Jakub Szefer SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection. Search on Bibsonomy ISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Dirk Achenbach, Jörn Müller-Quade, Jochen Rill Universally Composable Firewall Architectures Using Trusted Hardware. Search on Bibsonomy BalkanCryptSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Zouheir Trabelsi, Umniya Mustafa A Web-based Firewall Simulator Tool for Information Security Education. Search on Bibsonomy ACE The full citation details ... 2014 DBLP  BibTeX  RDF
15Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan 0001 A Stateful Mechanism for the Tree-Rule Firewall. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Mohammad Ghoniem, Georgiy Shurkhovetskyy, Ahmed Bahey, Benoît Otjacques VAFLE: visual analytics of firewall log events. Search on Bibsonomy Visualization and Data Analysis The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Marco Cereia, Ivan Cibrario Bertolotti, Luca Durante, Adriano Valenzano Latency evaluation of a firewall for industrial networks based on the Tofino Industrial Security Solution. Search on Bibsonomy ETFA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yihuan Xing, Ford-Long Wong, Akash Kumar 0001 Lightweight Bare-Metal Stateful Firewall. Search on Bibsonomy PRDC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula Formal approach for managing firewall misconfigurations. Search on Bibsonomy RCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Nguyen Manh Hung, Vu Duy Nhat B-tree based two-dimensional early packet rejection technique against DoS traffic targeting firewall default security rule. Search on Bibsonomy CISDA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Sven Hager, Frank Winkler, Björn Scheuermann 0001, Klaus Reinhardt MPFC: Massively Parallel Firewall Circuits. Search on Bibsonomy LCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Stephan Windmüller Simplifying Firewall Setups by Using Offline Validation. Search on Bibsonomy J. Integr. Des. Process. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Kangbin Yim Database Security System for Applying Sophisticated Access Control via Database Firewall Server. Search on Bibsonomy Comput. Informatics The full citation details ... 2013 DBLP  BibTeX  RDF
15Kristián Valentín, Michal Malý Network Firewall using Artificial Neural Networks. Search on Bibsonomy Comput. Informatics The full citation details ... 2013 DBLP  BibTeX  RDF
15Qi Duan, Ehab Al-Shaer Traffic-aware dynamic firewall policy management: techniques and applications. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Leonardo Maccari, Renato Lo Cigno Waterwall: a cooperative, distributed firewall for wireless mesh networks. Search on Bibsonomy EURASIP J. Wirel. Commun. Netw. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Fei Chen 0001, Bezawada Bruhadeshwar, Alex X. Liu Cross-Domain Privacy-Preserving Cooperative Firewall Optimization. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Harsh Taneja, Angela Xiao Wu Does the Great Firewall really isolate the Chinese? Integrating access blockage with cultural factors to explain web user behavior. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
15Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Salvador Martínez Perez, Jordi Cabot Management of stateful firewall misconfiguration. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Zouheir Trabelsi, Liren Zhang, Safaa Zeidan, Kilani Ghoudi Dynamic traffic awareness statistical model for firewall performance enhancement. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Kasom Koht-Arsa, Surasak Sanguanpong A Centralized State Repository Approach to Highly Scalable and High-Availability Parallel Firewall. Search on Bibsonomy J. Comput. The full citation details ... 2013 DBLP  BibTeX  RDF
15Sylvain Hallé, Eric Lunaud Ngoupe, Roger Villemaire, Omar Cherkaoui Distributed firewall anomaly detection through LTL model checking. Search on Bibsonomy IM The full citation details ... 2013 DBLP  BibTeX  RDF
15David Goergen, Thibault Cholez, Jérôme François, Thomas Engel 0001 A semantic firewall for Content-Centric Networking. Search on Bibsonomy IM The full citation details ... 2013 DBLP  BibTeX  RDF
15Miguel Garcia, Nuno Ferreira Neves, Alysson Bessani An intrusion-tolerant firewall design for protecting SIEM systems. Search on Bibsonomy DSN Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Mohammed Noraden Alsaleh, Saeed Al-Haj, Ehab Al-Shaer Objective metrics for firewall security: A holistic view. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Robert Benner, Victor T. E. Echeverria, Uzoma Onunkwo, Jay Patel, David Zage Harnessing many-core processors for scalable, highly efficient, and adaptable firewall solutions. Search on Bibsonomy ICNC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Ondrej Rysavý, Jaroslav Ráb, Miroslav Svéda Improving security in SCADA systems through firewall policy analysis. Search on Bibsonomy FedCSIS The full citation details ... 2013 DBLP  BibTeX  RDF
15Achim D. Brucker, Lukas Brügger, Burkhart Wolff hol-TestGen/fw - An Environment for Specification-Based Firewall Conformance Testing. Search on Bibsonomy ICTAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Wei Li 0025, Haishan Wan, Sheng Li An approach to the generalization of firewall rules. Search on Bibsonomy ICIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Shui Yu 0001, Robin Doss, Wanlei Zhou 0001, Song Guo 0001 A general cloud firewall framework with dynamic resource allocation. Search on Bibsonomy ICC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Vijender Kumar Solanki, Kumar Pal Singh, M. Venkatesan, Sudhanshu Raghuwanshi Securing Networks Using Situation-Based Firewall Policy Computations. Search on Bibsonomy ICACNI The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Umniya Mustafa, Mohammad M. Masud 0001, Zouheir Trabelsi, Timothy Wood 0001, Zainab Al Harthi Firewall performance optimization using data mining techniques. Search on Bibsonomy IWCMC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Heba A. Kurdi, Madeeha Enazi, Auhood Abdullah Alfaries Evaluating Firewall Models for Hybrid Clouds. Search on Bibsonomy EMS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Abdul Razzaq, Ali Hur, Sidra Shahbaz, Muddassar Masood, Hafiz Farooq Ahmad Critical analysis on web application firewall solutions. Search on Bibsonomy ISADS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Juan Wang 0006, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi, Longjie Zeng Towards a Security-Enhanced Firewall Application for OpenFlow Networks. Search on Bibsonomy CSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, Stephane Morucci Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Jun Long, Luda Wang, Zude Li Research and design of the firewall penetration technology serving to distributed cloud resource. Search on Bibsonomy Internetware The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Hyeonwoo Kim, Wooguil Pak, Hongtaek Ju Correlation analysis between inference accuracy and inference parameters for stateless firewall policy. Search on Bibsonomy APNOMS The full citation details ... 2013 DBLP  BibTeX  RDF
15Pritom Rajkhowa, Shyamanta M. Hazarika, Guillermo Ricardo Simari An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration. Search on Bibsonomy QSHINE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Sandeep Reddy Pedditi, Du Zhang, Chung-E. Wang FIEP: An initial design of a firewall information exchange protocol. Search on Bibsonomy IRI The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Seungjoon Lee, Manish Purohit, Barna Saha Firewall placement in cloud data centers. Search on Bibsonomy SoCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Yan Xu, Zhaoxia Wei, Qingrong Tang Efficient Algorithm for Detecting Firewall Rule Conflict. Search on Bibsonomy INCoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Erkan Ozhan Güvenlik duvarı günlüklerinin makine öğrenmesi yöntemleri ile analizi ve bir model çıkartılması (The analysis of the firewall diaries through machine learning methods and producing a model) Search on Bibsonomy 2013   RDF
15Annie Shebanow, Richard Perez, Caroline Howard The Effect of Firewall Testing Types on Cloud Security Policies. Search on Bibsonomy Int. J. Strateg. Inf. Technol. Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Rabiu Mukhtar, Ameer Al-Nemrat, Mamoun Alazab, Sitalakshmi Venkatraman, Hamid Jahankhani Analysis of firewall log-based detection scenarios for evidence in digital forensics. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 1260 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license