Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes |
Firewall Mechanism in a User Centric Smart Card Ownership Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings, pp. 118-132, 2010, Springer, 978-3-642-12509-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Jefferson Tan, David Abramson 0001, Colin Enticott |
Firewall Traversal in the Grid Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: 12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010, 1-3 September 2010, Melbourne, Australia, pp. 189-196, 2010, IEEE, 978-0-7695-4214-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Achim D. Brucker, Lukas Brügger, Paul J. Kearney, Burkhart Wolff |
Verified Firewall Policy Transformations for Test Case Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICST ![In: Third International Conference on Software Testing, Verification and Validation, ICST 2010, Paris, France, April 7-9, 2010, pp. 345-354, 2010, IEEE Computer Society, 978-0-7695-3990-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
model-based testing, security testing |
15 | Saeed Ezzati, Hamid Reaza Naji, Amir Chegini, Payam Habibimehr |
A new method of hardware firewall implementation on SOC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-7, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni |
FAME: a firewall anomaly management environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010, pp. 17-26, 2010, ACM, 978-1-4503-0093-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Tugkan Tuglular, Gurcan Gercek |
Feedback Control Based Test Case Instantiation for Firewall Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC Workshops ![In: Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, COMPSAC Workshops 2010, Seoul, Korea, 19-23 July 2010, pp. 202-207, 2010, IEEE Computer Society, 978-0-7695-4105-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Aniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri 0002 |
An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BWCCA ![In: Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference), pp. 475-481, 2010, IEEE Computer Society, 978-0-7695-4236-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Zhimin Yang, Lixiang Qiao, Chang Liu 0001, Chi Yang, Guangming Wan |
A collaborative trust model of firewall-through based on Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2010, April 14-16, 2010, Fudan University, Shanghai, China, pp. 329-334, 2010, IEEE, 978-1-4244-6763-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Satoshi Matsumoto, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano, Yusuke Shomura, Kenichi Yoshida |
A Method for Analyzing Network Traffic Using Cardinality Information in Firewall Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Tenth Annual International Symposium on Applications and the Internet, SAINT 2010, Seoul, Korea, 19-23 July, 2010, Proceedings, pp. 241-244, 2010, IEEE Computer Society, 978-1-4244-7526-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Network Monitoring, Cardinality |
15 | Mohammad Sajjad Hossain, Vijay Raghunathan |
AEGIS: A Lightweight Firewall for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCOSS ![In: Distributed Computing in Sensor Systems, 6th IEEE International Conference, DCOSS 2010, Santa Barbara, CA, USA, June 21-23, 2010. Proceedings, pp. 258-272, 2010, Springer, 978-3-642-13650-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Jiacheng Hong, Ning Liu, Ping Yi, Futai Zou, Qiang Zhai |
Securing Wireless Mesh Network with Mobile Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCSP ![In: International Conference on Wireless Communications and Signal Processing, WCSP 2010, Suzhou, China, 21-23 October, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-7556-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Igor Nai Fovino, Andrea Carcano, Alessio Coletta, Michele Guglielmi, Marcelo Masera, Alberto Trombetta |
State-Based Firewall for Industrial Protocols with Critical-State Prediction Monitor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security - 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papers, pp. 116-127, 2010, Springer, 978-3-642-21693-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Subana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi |
An Improved Conflict Detection System with Periodic Cycle Treatment for Time-Based Firewall Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 19th International Conference on Computer Communications and Networks, IEEE ICCCN 2010, Zürich, Switzerland, August 2-5, 2010, pp. 1-8, 2010, IEEE, 978-1-4244-7115-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Hrishikesh B. Acharya, Aditya Joshi, Mohamed G. Gouda |
Firewall modules and modular firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the 18th annual IEEE International Conference on Network Protocols, ICNP 2010, Kyoto, Japan, 5-8 October, 2010, pp. 174-182, 2010, IEEE Computer Society, 978-1-4244-8644-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Yi Yin, Xiaodong Xu, Yoshiaki Katayama, Naohisa Takahashi |
Inconsistency Detection System for Security Policy and Firewall Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC ![In: First International Conference on Networking and Computing, ICNC 2010, Higashi Hiroshima, Japan, November 17-19, 2010. Proceedings, pp. 294-297, 2010, IEEE Computer Society, 978-0-7695-4277-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Miroslav Svéda, Ondrej Rysavý, Gayan de Silva, Petr Matousek, Jaroslav Ráb |
Static Analysis of Routing and Firewall Policy Configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (Selected Papers) ![In: e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers, pp. 39-53, 2010, Springer, 978-3-642-25205-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Timothy Nelson 0001, Christopher Barratt, Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi |
The Margrave Tool for Firewall Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Uncovering the Secrets of System Administration: Proceedings of the 24th Large Installation System Administration Conference, LISA 2010, San Jose, CA, USA, November 7-12, 2010, 2010, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Fei Chen 0001, Alex X. Liu, JeeHyun Hwang, Tao Xie 0001 |
First Step Towards Automatic Correction of Firewall Policy Faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Uncovering the Secrets of System Administration: Proceedings of the 24th Large Installation System Administration Conference, LISA 2010, San Jose, CA, USA, November 7-12, 2010, 2010, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Chung-Hsin Liu, Wu-Fan Hsu |
The study of H.26x frame through firewall security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 3rd International Conference on Information Sciences and Interaction Sciences (ICIS 2010), Chengdu, China, June 23-25, 2010, pp. 377-380, 2010, IEEE, 978-1-4244-7386-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Zeeshan Ahmed, Abdessamad Imine, Michaël Rusinowitch |
Safe and Efficient Strategies for Updating Firewall Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings, pp. 45-57, 2010, Springer, 978-3-642-15151-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Jianhua Sun 0002, Hao Chen 0002, Chunmei Niu |
A New Database Firewall Based on Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: 2010 International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2010, Wuhan, China, 8-11 December, 2010, pp. 399-404, 2010, IEEE Computer Society, 978-0-7695-4287-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Ho-Yu Lam, Donghan (Jarod) Wang, H. Jonathan Chao |
A traffic-aware top-N firewall ruleset approximation algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2010 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, ANCS 2010, San Diego, California, USA, October 25-26, 2010, pp. 9, 2010, ACM, 978-1-4503-0379-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Rüdiger Weis, Brian Schüler, Stefan A. Flemming |
Towards Secure and Reliable Firewall Systems based on MINIX3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sicherheit ![In: Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin., pp. 85-92, 2010, GI, 978-3-88579-264-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Andrew Blyth |
An Architecture for An XML Enabled Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 8(1), pp. 31-36, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Alex X. Liu |
Firewall policy verification and troubleshooting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 53(16), pp. 2800-2809, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Ralf Spenneberg |
Webserver-Sicherheit mit mod_security - OpenSource Web-Application-Firewall (WAF). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 33(3), pp. 155-160, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Jyh-Win Huang, Ting-Wei Hou |
A controllable and accountable state-oriented Card-Aided Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 31(1), pp. 66-76, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Sergio Pozo, Rafael Ceballos, Rafael M. Gasca |
A Heuristic Process for Local Inconsistency Diagnosis in Firewall Rule Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Networks ![In: J. Networks 4(8), pp. 698-710, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul |
Extending Firewall Session Table to Accelerate NAT, QoS Classification and Routing ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0911.4033, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Avishai Wool |
Firewall Configuration Errors Revisited ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0911.1240, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Abdelkader Lahmadi, Olivier Festor |
SecSip: A Stateful Firewall for SIP-based Networks ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0907.3045, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca |
Model-Based Development of firewall rule sets: Diagnosing model inconsistencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Softw. Technol. ![In: Inf. Softw. Technol. 51(5), pp. 894-915, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu, Alessandra Russo |
Using argumentation logic for firewall configuration management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2009. 11th IFIP/IEEE International Symposium on Integrated Network Management, Hofstra University, Long Island, NY, USA, June 1-5, 2009, pp. 180-187, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Abdelkader Lahmadi, Olivier Festor |
SecSip: A stateful firewall for SIP-based networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2009. 11th IFIP/IEEE International Symposium on Integrated Network Management, Hofstra University, Long Island, NY, USA, June 1-5, 2009, pp. 172-179, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Jeong-Oog Lee, Doo-Kwon Baik |
A Database Firewall Server Using Data Masking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2009 International Conference on Security & Management, SAM 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes, pp. 291-296, 2009, CSREA Press, 1-60132-126-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Vladimir S. Zaborovsky, Anton Titov |
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2009 International Conference on Security & Management, SAM 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes, pp. 603-608, 2009, CSREA Press, 1-60132-126-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Andrzej Bialas |
Validation of the Specification Means Ontology on the Simple Firewall Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2009 International Conference on Security & Management, SAM 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes, pp. 278-284, 2009, CSREA Press, 1-60132-126-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Cristian Varas, Thomas Hirsch |
Self Protection through Collaboration Using D-CAF: A Distributed Context-Aware Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 179-184, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Participative Measurement, Denial of Service, Autonomic Communication, Intrusion Prevention, Flash crowds |
15 | Shaun P. Morrissey, Georges G. Grinstein |
Visualizing firewall configurations using created voids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009, pp. 75-79, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca, Rafael Ceballos |
Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 42-53, 2009, INSTICC Press, 978-989-674-005-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez |
An Anomaly-based Web Application Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 23-28, 2009, INSTICC Press, 978-989-674-005-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Kavin Tantipongsakul, Akharin Khunkitti |
Dynamic Policy-Based Routing Using Firewall Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMS ![In: EMS 2009, Third UKSim European Symposium on Computer Modeling and Simulation, 25-27 November 2009, Athens, Greece, pp. 540-545, 2009, IEEE Computer Society, 978-0-7695-3886-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | George-Christian Pranschke, Barry Irwin, Richard J. Barnett |
Automated Firewall Rule Set Generation Through Passive Traffic Inspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSA ![In: Information Security South Africa Conference 2009, School of Tourism & Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings ISSA2009, pp. 243-252, 2009, ISSA, Pretoria, South Africa, 978-1-86854-740-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Wei Li 0025 |
A Space-Efficient Approach to Consistency Check of Firewall Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAINE ![In: Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, CAINE 2009, November 4-6, 2009, Hilton San Francisco Fisherman's Wharf, San Francisco, California, USA, pp. 19-24, 2009, ISCA, 978-1-880843-73-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Qian Ma, Yingxu Lai, Guangzhi Jiang |
Design and Implementation of Distributed Intelligent Firewall Based on IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA ![In: Ninth International Conference on Intelligent Systems Design and Applications, ISDA 2009, Pisa, Italy , November 30-December 2, 2009, pp. 703-707, 2009, IEEE Computer Society, 978-0-7695-3872-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Ashish Tapdiya, Errin W. Fulp |
Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 18th International Conference on Computer Communications and Networks, IEEE ICCCN 2009, San Francisco, California, USA, August 3-6, 2009, pp. 1-6, 2009, IEEE Computer Society, 978-1-4244-4581-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Alan Jeffrey, Taghrid Samak |
Model Checking Firewall Policy Configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 60-67, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Jan Wiebelitz, Christopher Kunz, Stefan Piger, Christian Grimm |
TCP-AuthN: An Approach to Dynamic Firewall Operation in Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: The Fifth International Conference on Networking and Services, ICNS 2009, 20-25 April 2009, Valencia, Spain, pp. 481-486, 2009, IEEE Computer Society, 978-0-7695-3586-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Egon Grünter, Markus Meier, Ralph Niederberger, Thomas Oistrez |
Ein zuverlässiger und schneller Dateitransfer mit dynamischer Firewall-Konfiguration für Grid-Systeme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFN-Forum Kommunikationstechnologien ![In: 2. DFN-Forum Kommunikationstechnologien Verteilte Systeme im Wissenschaftsbereich, 27.05. - 28.05.2009 in München, pp. 35-42, 2009, GI, 978-3-88579-243-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez |
A Self-learning Anomaly-Based Web Application Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: Computational Intelligence in Security for Information Systems - CISIS'09, 2nd International Workshop, Burgos, Spain, 23-26 September 2009 Proceedings, pp. 85-92, 2009, Springer, 978-3-642-04090-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Sergio Pozo Hidalgo, Rafael M. Gasca, Fernando de la Rosa Troyano |
Efficient Data Structures for Local Inconsistency Detection in Firewall ACL Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS (3) ![In: ICEIS 2009 - Proceedings of the 11th International Conference on Enterprise Information Systems, Volume ISAS, Milan, Italy, May 6-10, 2009, pp. 176-181, 2009, 978-989-8111-86-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Lionel Saliou |
Network firewall dynamic performance evaluation and formalisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2009 |
RDF |
|
15 | Isaac Lee, Ray Hunt |
A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Internet Protoc. Technol. ![In: Int. J. Internet Protoc. Technol. 3(2), pp. 128-135, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Lee J. White, Khaled Jaber, Brian Robinson, Václav Rajlich |
Extended firewall for regression testing: an experience report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Softw. Maintenance Res. Pract. ![In: J. Softw. Maintenance Res. Pract. 20(6), pp. 419-433, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | John Govaerts, Arosha K. Bandara, Kevin Curran |
A formal logic approach to firewall packet filtering analysis and generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Rev. ![In: Artif. Intell. Rev. 29(3-4), pp. 223-248, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Ghassan Misherghi, Lihua Yuan, Zhendong Su 0001, Chen-Nee Chuah, Hao Chen 0003 |
A general framework for benchmarking firewall optimization techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 5(4), pp. 227-238, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Vadim Zaliva |
Platform-Independent Firewall Policy Representation ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0805.1886, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Adel Bouhoula, Zouheir Trabelsi, Ezedin Barka, Mohammed Anis Benelbahri |
Firewall filtering rules analysis for anomalies detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 3(3), pp. 161-172, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy |
Formal modelling and analysis of XML firewall for service-oriented systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 3(3), pp. 147-160, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Martin Stiemerling, Jürgen Quittek, Lars Eggert |
NAT and Firewall Traversal Issues of Host Identity Protocol (HIP) Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5207, pp. 1-13, April 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Ryma Abassi, Sihem Guemara El Fatmi |
An Automated Validation Method for Security Policies: The Firewall Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy, pp. 291-294, 2008, IEEE Computer Society, 978-0-7695-3324-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Ryma Abassi, Sihem Guemara El Fatmi |
Towards an automated firewall security policies validation process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRiSIS ![In: CRiSIS '08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008, pp. 267-272, 2008, IEEE, 978-1-4244-3309-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Abhinay Reddyreddy, Haiping Xu |
Securing Service-oriented Systems Using State-Based XML Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEKE ![In: Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), San Francisco, CA, USA, July 1-3, 2008, pp. 512-518, 2008, Knowledge Systems Institute Graduate School, 1-891706-22-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca |
A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 430-441, 2008, INSTICC Press, 978-989-8111-59-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Richard E. Newman, Ira S. Moskowitz |
Practical Covert Channel Implementation through a Timed Mix-Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: 2008 IEEE International Performance, Computing and Communications Conference, IPCCC 2008, Austin, TX, USA, December 7-9, 2008, pp. 433-438, 2008, IEEE Computer Society, 978-1-4244-3368-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Thomas Oistrez, Egon Grünter, Markus Meier, Ralph Niederberger |
A Reliable and Fast Data Transfer for Grid Systems Using a Dynamic Firewall Configuration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par Workshops ![In: Euro-Par 2008 Workshops - Parallel Processing, VHPC 2008, UNICORE 2008, HPPC 2008, SGS 2008, PROPER 2008, ROIA 2008, and DPA 2008, Las Palmas de Gran Canaria, Spain, August 25-26, 2008, Revised Selected Papers, pp. 94-102, 2008, Springer, 978-3-642-00954-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Yi-Hsuan Feng, Nen-Fu Huang, Yen-Min Wu |
Evaluation of TCP State Replication Methods for High-Availability Firewall Clusters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December 2008, pp. 2018-2023, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Sergio Pozo, Rafael Ceballos, Rafael M. Gasca |
Firewall Rule Set Inconsistency Characterization by Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security in Information Systems, Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008, pp. 138-144, 2008, INSTICC Press, 978-989-8111-44-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-Chun Chou, Tsung-Che Yang |
Safeguard Intranet Using Embedded and Distributed Firewall System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (1) ![In: The Second International Conference on Future Generation Communication and Networking, FGCN 2008, Volume 1, Main Conference, Hainan Island, China, December 13-15, 2008, pp. 489-492, 2008, IEEE Computer Society, 978-0-7695-3431-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Senda Hammouda, Lilia Maalej, Zouheir Trabelsi |
Towards Optimized TCP/IP Covert Channels Detection, IDS and Firewall Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NTMS ![In: NTMS 2008, 2nd International Conference on New Technologies, Mobility and Security, November 5-7, 2008, Tangier, Morocco, pp. 1-5, 2008, IEEE, 978-2-9532443-0-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Dai-Rui Lin, Chih-I Wang, D. J. Guan |
An Efficiently Online/Offline Signcryption for Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA (3) ![In: Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, 26-28 November 2008, Kaohsiung, Taiwan, 3 Volumes, pp. 472-478, 2008, IEEE Computer Society, 978-0-7695-3382-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Cássio Ditzel Kropiwiec, Edgard Jamhour, Manoel Camillo Penna, Guy Pujolle |
Multi-constraint Security Policies for Delegated Firewall Administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Managing Large-Scale Service Deployment, 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings, pp. 123-135, 2008, Springer, 978-3-540-85999-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Hae-Yong Yang, Kyung-Hoon Lee, Sung-Jea Ko |
Communication quality of voice over TCP used for firewall traversal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, ICME 2008, June 23-26 2008, Hannover, Germany, pp. 29-32, 2008, IEEE Computer Society, 978-1-4244-2571-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Alex X. Liu, Fei Chen 0001 |
Collaborative enforcement of firewall policies in virtual private networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, PODC 2008, Toronto, Canada, August 18-21, 2008, pp. 95-104, 2008, ACM, 978-1-59593-989-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Yevgeniy Yeryomin, Florian Evers, Jochen Seitz 0001 |
Solving the firewall and NAT traversal issues for SIP-based VoIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICT ![In: 2008 International Conference on Telecommunications, ICT 2008, St. Petersburg, Russia, June 16-19, 2008, pp. 1-6, 2008, IEEE, 978-1-4244-2035-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Kleber Manrique Trevisani, Rogério Eduardo Garcia |
SPML: A Visual Approach for Modeling Firewall Configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MODSEC@MoDELS ![In: Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, France, September 28, 2008., 2008, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Edmo Lopes Filho, Gilberto Tadayoshi Hashimoto, Pedro Frosi Rosa |
A High Availability Firewall Model Based on SCTP Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: 3rd International Conference on Systems and Networks Communications, ICSNC 2008, Sliema, Malta, October 26-31, 2008, pp. 202-207, 2008, IEEE Computer Society, 978-0-7695-3371-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Jin-hua Wu, Xiao-Su Chen, Yi-Zhu Zhao, Jun Ni |
A Flexible Policy-Based Firewall Management Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: International Conference on Cyberworlds 2008, Hangzhou, China, 22-24 September 2008, Proceedings, pp. 192-194, 2008, IEEE Computer Society, 978-0-7695-3381-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Hang Zhao, Chi-Kin Chau, Steven M. Bellovin |
ROFL: routing as the firewall layer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008, pp. 23-31, 2008, ACM, 978-1-60558-341-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Wei Wang, Jun Li 0003 |
An XML Firewall on Embedded Network Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: Fourth International Conference on Networking and Services, ICNS 2008, 16-21 March 2008, Gosier, Guadeloupe, pp. 1-6, 2008, IEEE Computer Society, 978-0-7695-3094-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Soutaro Matsumoto, Adel Bouhoula |
Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, CISIS'08, Genova, Italy, October 23-24, 2008, pp. 123-130, 2008, Springer, 978-3-540-88180-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Niklas Steinleitner |
Firewall traversal in mobile IPv6 networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2008 |
RDF |
|
15 | Per Thorsheim |
Comparing Firewall Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Security Management Handbook, 6th ed. ![In: Information security management handbook, Sixth Edition., pp. 2123-2132, 2007, Auerbach Publ./CRC Press, 978-0-8493-7495-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Paul A. Henry |
An Examination of Firewall Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Security Management Handbook, 6th ed. ![In: Information security management handbook, Sixth Edition., pp. 1941-1996, 2007, Auerbach Publ./CRC Press, 978-0-8493-7495-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo |
Comparing and debugging firewall rule tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 1(4), pp. 143-151, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Sujan Maskey, Brittany Jansen, Dennis Guster, Charles Hall |
A Basic Firewall Configuration Strategy for the Protection of Development-related Computer Networks and Subnetworks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 16(5), pp. 281-290, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Sebastian Kiesel, Michael Scharf |
Modeling and performance evaluation of transport protocols for firewall control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 51(11), pp. 3232-3251, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Mohamed G. Gouda, Alex X. Liu |
Structured firewall design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 51(4), pp. 1106-1120, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Peter Langendörfer, Krzysztof Piotrowski, Steffen Peter, Martin Lehmann 0001 |
Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 30(7), pp. 1487-1497, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Gregorio Martínez Pérez, Félix J. García Clemente, Antonio Fernandez Gómez-Skarmeta |
Managing semantic-aware policies in a distributed firewall scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Res. ![In: Internet Res. 17(4), pp. 362-377, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Robert M. Marmorstein, Phil Kearns |
Debugging a Firewall Policy with Policy Mapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 32(1), 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
15 | Tomás E. Uribe, Steven Cheung |
Automatic analysis of firewall and network intrusion detection system configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 15(6), pp. 691-715, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Liang Zhao 0013, A. Shimae, Hiroshi Nagamochi |
Linear-tree rule structure for firewall optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications, Internet, and Information Technology ![In: Proceedings of the Sixth IASTED International Conference on Communications, Internet, and Information Technology, July 2-4, 2007, Banff, Alberta, Canada, pp. 67-72, 2007, IASTED/ACTA Press, 978-0-88986-674-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
15 | Przemyslaw Krekora |
An approach to change availability of the service by adding forecasting module to firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DepCoS-RELCOMEX ![In: 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), June 14-16, 2007, Szklarska Poreba, Poland, pp. 169-176, 2007, IEEE Computer Society, 0-7695-2850-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Shen Li, Vijay Sivaraman, Alex Krumm-Heller, Craig Russell |
A Dynamic Stateful Multicast Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 1280-1285, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | MyungKeun Yoon 0001, Shigang Chen, Zhan Zhang |
Reducing the Size of Rule Set in a Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 1274-1279, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Michael Roe |
Reconciling Multiple IPsec and Firewall Policies (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers, pp. 98-103, 2007, Springer, 978-3-642-17772-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Tuomas Aura, Moritz Becker, Michael Roe, Piotr Zielinski |
Reconciling Multiple IPsec and Firewall Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers, pp. 81-97, 2007, Springer, 978-3-642-17772-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Victor A. Clincy, Jose Garrido, Yusuf Nzibo |
A Firewall Simulation Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications in Computing ![In: Proceedings of the 2007 International Conference on Communications in Computing, CIC 2007, June 25-28, 2007, Las Vegas, Nevada, USA, pp. 16-22, 2007, CSREA Press, 1-60132-030-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
15 | Deepak Dayama |
Emulating an Embedded Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DETER ![In: DETER Community Workshop on Cyber Security Experimentation and Test 2007, Boston, Ma, USA, August 6-7, 2007, 2007, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|