The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Firewall with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-1996 (22) 1997-1998 (22) 1999 (21) 2000 (23) 2001 (28) 2002 (33) 2003 (59) 2004 (63) 2005 (82) 2006 (78) 2007 (91) 2008 (93) 2009 (65) 2010 (52) 2011 (54) 2012 (36) 2013 (32) 2014 (37) 2015 (44) 2016 (55) 2017 (40) 2018 (47) 2019 (40) 2020 (35) 2021 (29) 2022 (40) 2023 (33) 2024 (6)
Publication types (Num. hits)
article(294) book(2) incollection(12) inproceedings(941) phdthesis(11)
Venues (Conferences, Journals, ...)
CoRR(38) ACSAC(17) ICC(13) Comput. Secur.(10) LISA(10) Security and Management(10) AINA(9) IEEE Access(9) ICDCS(8) ICICS(8) INFOCOM(8) ISCC(8) POLICY(8) DSN(7) ICNP(7) login Usenix Mag.(7) More (+10 of total 665)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 762 occurrences of 447 keywords

Results
Found 1260 publication records. Showing 1260 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Firewall Mechanism in a User Centric Smart Card Ownership Model. Search on Bibsonomy CARDIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Jefferson Tan, David Abramson 0001, Colin Enticott Firewall Traversal in the Grid Architecture. Search on Bibsonomy HPCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Achim D. Brucker, Lukas Brügger, Paul J. Kearney, Burkhart Wolff Verified Firewall Policy Transformations for Test Case Generation. Search on Bibsonomy ICST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF model-based testing, security testing
15Saeed Ezzati, Hamid Reaza Naji, Amir Chegini, Payam Habibimehr A new method of hardware firewall implementation on SOC. Search on Bibsonomy ICITST The full citation details ... 2010 DBLP  BibTeX  RDF
15Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni FAME: a firewall anomaly management environment. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Tugkan Tuglular, Gurcan Gercek Feedback Control Based Test Case Instantiation for Firewall Testing. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Aniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri 0002 An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats. Search on Bibsonomy BWCCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Zhimin Yang, Lixiang Qiao, Chang Liu 0001, Chi Yang, Guangming Wan A collaborative trust model of firewall-through based on Cloud Computing. Search on Bibsonomy CSCWD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Satoshi Matsumoto, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano, Yusuke Shomura, Kenichi Yoshida A Method for Analyzing Network Traffic Using Cardinality Information in Firewall Logs. Search on Bibsonomy SAINT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Network Monitoring, Cardinality
15Mohammad Sajjad Hossain, Vijay Raghunathan AEGIS: A Lightweight Firewall for Wireless Sensor Networks. Search on Bibsonomy DCOSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Jiacheng Hong, Ning Liu, Ping Yi, Futai Zou, Qiang Zhai Securing Wireless Mesh Network with Mobile Firewall. Search on Bibsonomy WCSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Igor Nai Fovino, Andrea Carcano, Alessio Coletta, Michele Guglielmi, Marcelo Masera, Alberto Trombetta State-Based Firewall for Industrial Protocols with Critical-State Prediction Monitor. Search on Bibsonomy CRITIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Subana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi An Improved Conflict Detection System with Periodic Cycle Treatment for Time-Based Firewall Policies. Search on Bibsonomy ICCCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Hrishikesh B. Acharya, Aditya Joshi, Mohamed G. Gouda Firewall modules and modular firewalls. Search on Bibsonomy ICNP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Yi Yin, Xiaodong Xu, Yoshiaki Katayama, Naohisa Takahashi Inconsistency Detection System for Security Policy and Firewall Policy. Search on Bibsonomy ICNC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Miroslav Svéda, Ondrej Rysavý, Gayan de Silva, Petr Matousek, Jaroslav Ráb Static Analysis of Routing and Firewall Policy Configurations. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Timothy Nelson 0001, Christopher Barratt, Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi The Margrave Tool for Firewall Analysis. Search on Bibsonomy LISA The full citation details ... 2010 DBLP  BibTeX  RDF
15Fei Chen 0001, Alex X. Liu, JeeHyun Hwang, Tao Xie 0001 First Step Towards Automatic Correction of Firewall Policy Faults. Search on Bibsonomy LISA The full citation details ... 2010 DBLP  BibTeX  RDF
15Chung-Hsin Liu, Wu-Fan Hsu The study of H.26x frame through firewall security. Search on Bibsonomy ICIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Zeeshan Ahmed, Abdessamad Imine, Michaël Rusinowitch Safe and Efficient Strategies for Updating Firewall Policies. Search on Bibsonomy TrustBus The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Jianhua Sun 0002, Hao Chen 0002, Chunmei Niu A New Database Firewall Based on Anomaly Detection. Search on Bibsonomy PDCAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Ho-Yu Lam, Donghan (Jarod) Wang, H. Jonathan Chao A traffic-aware top-N firewall ruleset approximation algorithm. Search on Bibsonomy ANCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Rüdiger Weis, Brian Schüler, Stefan A. Flemming Towards Secure and Reliable Firewall Systems based on MINIX3. Search on Bibsonomy Sicherheit The full citation details ... 2010 DBLP  BibTeX  RDF
15Andrew Blyth An Architecture for An XML Enabled Firewall. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2009 DBLP  BibTeX  RDF
15Alex X. Liu Firewall policy verification and troubleshooting. Search on Bibsonomy Comput. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Ralf Spenneberg Webserver-Sicherheit mit mod_security - OpenSource Web-Application-Firewall (WAF). Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Jyh-Win Huang, Ting-Wei Hou A controllable and accountable state-oriented Card-Aided Firewall. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Sergio Pozo, Rafael Ceballos, Rafael M. Gasca A Heuristic Process for Local Inconsistency Diagnosis in Firewall Rule Sets. Search on Bibsonomy J. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul Extending Firewall Session Table to Accelerate NAT, QoS Classification and Routing Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
15Avishai Wool Firewall Configuration Errors Revisited Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
15Abdelkader Lahmadi, Olivier Festor SecSip: A Stateful Firewall for SIP-based Networks Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
15Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca Model-Based Development of firewall rule sets: Diagnosing model inconsistencies. Search on Bibsonomy Inf. Softw. Technol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu, Alessandra Russo Using argumentation logic for firewall configuration management. Search on Bibsonomy Integrated Network Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Abdelkader Lahmadi, Olivier Festor SecSip: A stateful firewall for SIP-based networks. Search on Bibsonomy Integrated Network Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Jeong-Oog Lee, Doo-Kwon Baik A Database Firewall Server Using Data Masking. Search on Bibsonomy Security and Management The full citation details ... 2009 DBLP  BibTeX  RDF
15Vladimir S. Zaborovsky, Anton Titov Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy. Search on Bibsonomy Security and Management The full citation details ... 2009 DBLP  BibTeX  RDF
15Andrzej Bialas Validation of the Specification Means Ontology on the Simple Firewall Case. Search on Bibsonomy Security and Management The full citation details ... 2009 DBLP  BibTeX  RDF
15Cristian Varas, Thomas Hirsch Self Protection through Collaboration Using D-CAF: A Distributed Context-Aware Firewall. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Participative Measurement, Denial of Service, Autonomic Communication, Intrusion Prevention, Flash crowds
15Shaun P. Morrissey, Georges G. Grinstein Visualizing firewall configurations using created voids. Search on Bibsonomy VizSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca, Rafael Ceballos Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLs. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
15Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez An Anomaly-based Web Application Firewall. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
15Kavin Tantipongsakul, Akharin Khunkitti Dynamic Policy-Based Routing Using Firewall Rules. Search on Bibsonomy EMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15George-Christian Pranschke, Barry Irwin, Richard J. Barnett Automated Firewall Rule Set Generation Through Passive Traffic Inspection. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
15Wei Li 0025 A Space-Efficient Approach to Consistency Check of Firewall Rules. Search on Bibsonomy CAINE The full citation details ... 2009 DBLP  BibTeX  RDF
15Qian Ma, Yingxu Lai, Guangzhi Jiang Design and Implementation of Distributed Intelligent Firewall Based on IPv6. Search on Bibsonomy ISDA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Ashish Tapdiya, Errin W. Fulp Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs. Search on Bibsonomy ICCCN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Alan Jeffrey, Taghrid Samak Model Checking Firewall Policy Configurations. Search on Bibsonomy POLICY The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Jan Wiebelitz, Christopher Kunz, Stefan Piger, Christian Grimm TCP-AuthN: An Approach to Dynamic Firewall Operation in Grid Environments. Search on Bibsonomy ICNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Egon Grünter, Markus Meier, Ralph Niederberger, Thomas Oistrez Ein zuverlässiger und schneller Dateitransfer mit dynamischer Firewall-Konfiguration für Grid-Systeme. Search on Bibsonomy DFN-Forum Kommunikationstechnologien The full citation details ... 2009 DBLP  BibTeX  RDF
15Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez A Self-learning Anomaly-Based Web Application Firewall. Search on Bibsonomy CISIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Sergio Pozo Hidalgo, Rafael M. Gasca, Fernando de la Rosa Troyano Efficient Data Structures for Local Inconsistency Detection in Firewall ACL Updates. Search on Bibsonomy ICEIS (3) The full citation details ... 2009 DBLP  BibTeX  RDF
15Lionel Saliou Network firewall dynamic performance evaluation and formalisation. Search on Bibsonomy 2009   RDF
15Isaac Lee, Ray Hunt A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks. Search on Bibsonomy Int. J. Internet Protoc. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Lee J. White, Khaled Jaber, Brian Robinson, Václav Rajlich Extended firewall for regression testing: an experience report. Search on Bibsonomy J. Softw. Maintenance Res. Pract. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15John Govaerts, Arosha K. Bandara, Kevin Curran A formal logic approach to firewall packet filtering analysis and generation. Search on Bibsonomy Artif. Intell. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Ghassan Misherghi, Lihua Yuan, Zhendong Su 0001, Chen-Nee Chuah, Hao Chen 0003 A general framework for benchmarking firewall optimization techniques. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Vadim Zaliva Platform-Independent Firewall Policy Representation Search on Bibsonomy CoRR The full citation details ... 2008 DBLP  BibTeX  RDF
15Adel Bouhoula, Zouheir Trabelsi, Ezedin Barka, Mohammed Anis Benelbahri Firewall filtering rules analysis for anomalies detection. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy Formal modelling and analysis of XML firewall for service-oriented systems. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Martin Stiemerling, Jürgen Quittek, Lars Eggert NAT and Firewall Traversal Issues of Host Identity Protocol (HIP) Communication. Search on Bibsonomy RFC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Ryma Abassi, Sihem Guemara El Fatmi An Automated Validation Method for Security Policies: The Firewall Case. Search on Bibsonomy IAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Ryma Abassi, Sihem Guemara El Fatmi Towards an automated firewall security policies validation process. Search on Bibsonomy CRiSIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Abhinay Reddyreddy, Haiping Xu Securing Service-oriented Systems Using State-Based XML Firewall. Search on Bibsonomy SEKE The full citation details ... 2008 DBLP  BibTeX  RDF
15Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
15Richard E. Newman, Ira S. Moskowitz Practical Covert Channel Implementation through a Timed Mix-Firewall. Search on Bibsonomy IPCCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Thomas Oistrez, Egon Grünter, Markus Meier, Ralph Niederberger A Reliable and Fast Data Transfer for Grid Systems Using a Dynamic Firewall Configuration. Search on Bibsonomy Euro-Par Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Yi-Hsuan Feng, Nen-Fu Huang, Yen-Min Wu Evaluation of TCP State Replication Methods for High-Availability Firewall Clusters. Search on Bibsonomy GLOBECOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Sergio Pozo, Rafael Ceballos, Rafael M. Gasca Firewall Rule Set Inconsistency Characterization by Clustering. Search on Bibsonomy WOSIS The full citation details ... 2008 DBLP  BibTeX  RDF
15Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-Chun Chou, Tsung-Che Yang Safeguard Intranet Using Embedded and Distributed Firewall System. Search on Bibsonomy FGCN (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Senda Hammouda, Lilia Maalej, Zouheir Trabelsi Towards Optimized TCP/IP Covert Channels Detection, IDS and Firewall Integration. Search on Bibsonomy NTMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Dai-Rui Lin, Chih-I Wang, D. J. Guan An Efficiently Online/Offline Signcryption for Firewall. Search on Bibsonomy ISDA (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Cássio Ditzel Kropiwiec, Edgard Jamhour, Manoel Camillo Penna, Guy Pujolle Multi-constraint Security Policies for Delegated Firewall Administration. Search on Bibsonomy DSOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Hae-Yong Yang, Kyung-Hoon Lee, Sung-Jea Ko Communication quality of voice over TCP used for firewall traversal. Search on Bibsonomy ICME The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Alex X. Liu, Fei Chen 0001 Collaborative enforcement of firewall policies in virtual private networks. Search on Bibsonomy PODC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Yevgeniy Yeryomin, Florian Evers, Jochen Seitz 0001 Solving the firewall and NAT traversal issues for SIP-based VoIP. Search on Bibsonomy ICT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Kleber Manrique Trevisani, Rogério Eduardo Garcia SPML: A Visual Approach for Modeling Firewall Configurations. Search on Bibsonomy MODSEC@MoDELS The full citation details ... 2008 DBLP  BibTeX  RDF
15Edmo Lopes Filho, Gilberto Tadayoshi Hashimoto, Pedro Frosi Rosa A High Availability Firewall Model Based on SCTP Protocol. Search on Bibsonomy ICSNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Jin-hua Wu, Xiao-Su Chen, Yi-Zhu Zhao, Jun Ni A Flexible Policy-Based Firewall Management Framework. Search on Bibsonomy CW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Hang Zhao, Chi-Kin Chau, Steven M. Bellovin ROFL: routing as the firewall layer. Search on Bibsonomy NSPW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Wei Wang, Jun Li 0003 An XML Firewall on Embedded Network Processor. Search on Bibsonomy ICNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Soutaro Matsumoto, Adel Bouhoula Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements. Search on Bibsonomy CISIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Niklas Steinleitner Firewall traversal in mobile IPv6 networks. Search on Bibsonomy 2008   RDF
15Per Thorsheim Comparing Firewall Technologies. Search on Bibsonomy Information Security Management Handbook, 6th ed. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Paul A. Henry An Examination of Firewall Architectures. Search on Bibsonomy Information Security Management Handbook, 6th ed. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo Comparing and debugging firewall rule tables. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Sujan Maskey, Brittany Jansen, Dennis Guster, Charles Hall A Basic Firewall Configuration Strategy for the Protection of Development-related Computer Networks and Subnetworks. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Sebastian Kiesel, Michael Scharf Modeling and performance evaluation of transport protocols for firewall control. Search on Bibsonomy Comput. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Mohamed G. Gouda, Alex X. Liu Structured firewall design. Search on Bibsonomy Comput. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Peter Langendörfer, Krzysztof Piotrowski, Steffen Peter, Martin Lehmann 0001 Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices. Search on Bibsonomy Comput. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Gregorio Martínez Pérez, Félix J. García Clemente, Antonio Fernandez Gómez-Skarmeta Managing semantic-aware policies in a distributed firewall scenario. Search on Bibsonomy Internet Res. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Robert M. Marmorstein, Phil Kearns Debugging a Firewall Policy with Policy Mapping. Search on Bibsonomy login Usenix Mag. The full citation details ... 2007 DBLP  BibTeX  RDF
15Tomás E. Uribe, Steven Cheung Automatic analysis of firewall and network intrusion detection system configurations. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Liang Zhao 0013, A. Shimae, Hiroshi Nagamochi Linear-tree rule structure for firewall optimization. Search on Bibsonomy Communications, Internet, and Information Technology The full citation details ... 2007 DBLP  BibTeX  RDF
15Przemyslaw Krekora An approach to change availability of the service by adding forecasting module to firewall. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Shen Li, Vijay Sivaraman, Alex Krumm-Heller, Craig Russell A Dynamic Stateful Multicast Firewall. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15MyungKeun Yoon 0001, Shigang Chen, Zhan Zhang Reducing the Size of Rule Set in a Firewall. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Michael Roe Reconciling Multiple IPsec and Firewall Policies (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Tuomas Aura, Moritz Becker, Michael Roe, Piotr Zielinski Reconciling Multiple IPsec and Firewall Policies. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Victor A. Clincy, Jose Garrido, Yusuf Nzibo A Firewall Simulation Study. Search on Bibsonomy Communications in Computing The full citation details ... 2007 DBLP  BibTeX  RDF
15Deepak Dayama Emulating an Embedded Firewall. Search on Bibsonomy DETER The full citation details ... 2007 DBLP  BibTeX  RDF
Displaying result #801 - #900 of 1260 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license