The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Firewall with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-1996 (22) 1997-1998 (22) 1999 (21) 2000 (23) 2001 (28) 2002 (33) 2003 (59) 2004 (63) 2005 (82) 2006 (78) 2007 (91) 2008 (93) 2009 (65) 2010 (52) 2011 (54) 2012 (36) 2013 (32) 2014 (37) 2015 (44) 2016 (55) 2017 (40) 2018 (47) 2019 (40) 2020 (35) 2021 (29) 2022 (40) 2023 (33) 2024 (6)
Publication types (Num. hits)
article(294) book(2) incollection(12) inproceedings(941) phdthesis(11)
Venues (Conferences, Journals, ...)
CoRR(38) ACSAC(17) ICC(13) Comput. Secur.(10) LISA(10) Security and Management(10) AINA(9) IEEE Access(9) ICDCS(8) ICICS(8) INFOCOM(8) ISCC(8) POLICY(8) DSN(7) ICNP(7) login Usenix Mag.(7) More (+10 of total 665)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 762 occurrences of 447 keywords

Results
Found 1260 publication records. Showing 1260 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15JeeHyun Hwang, Tao Xie 0001, Fei Chen 0001, Alex X. Liu Systematic Structural Testing of Firewall Policies. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Fei Chen 0001, Alex X. Liu, JeeHyun Hwang, Tao Xie 0001 First step towards automatic correction of firewall policy faults. Search on Bibsonomy ACM Trans. Auton. Adapt. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Ehsan Saboori, Shafigh Parsazad, Yasaman Sanatkhani Automatic firewall rules generator for anomaly detection systems with Apriori algorithm Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
15Harleen Kaur, Omid Mahdi Ebadati E., Mohd. Afshar Alam Implementation of Portion Approach in Distributed Firewall Application for Network Security Framework Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
15Philipp Winter, Jedidiah R. Crandall The Great Firewall of China: How It Blocks Tor and Why It Is Hard to Pinpoint. Search on Bibsonomy login Usenix Mag. The full citation details ... 2012 DBLP  BibTeX  RDF
15Qi Liao 0002, Zhen Li 0025, Aaron Striegel Could firewall rules be public - a game theoretical perspective. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Sergio Pozo, Rafael M. Gasca, Antonia M. Reina Quintero, Angel Jesus Varela-Vaca CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Toshikazu Samura, Hatsuo Hayashi Directional spike propagation in a recurrent network: Dynamical firewall as anisotropic recurrent inhibition. Search on Bibsonomy Neural Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Linquan Xie, Fei Yu 0001, Chen Xu Distributed Firewall with Intrusion Detection System. Search on Bibsonomy J. Comput. The full citation details ... 2012 DBLP  BibTeX  RDF
15Alex X. Liu Firewall policy change-impact analysis. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni Detecting and Resolving Firewall Policy Anomalies. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Yakkala V. Naga Manikanta, Anjali Sardana Protecting web applications from SQL injection attacks by using framework and database firewall. Search on Bibsonomy ICACCI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Muhammad Mahmoud, Sonia Chiasson, Ashraf Matrawy Does context influence responses to firewall warnings? Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Yordanos Beyene, Michalis Faloutsos, Harsha V. Madhyastha SyFi: A Systematic Approach for Estimating Stateful Firewall Performance. Search on Bibsonomy PAM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Tarik Moataz, Xavier Rimasson Handling Stateful Firewall Anomalies. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Bassam Khorchani, Sylvain Hallé, Roger Villemaire Firewall anomaly detection with a model checker for visibility logic. Search on Bibsonomy NOMS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Leonardo Maccari, Renato Lo Cigno Privacy in the pervasive era: A distributed firewall approach. Search on Bibsonomy WONS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Florian Mansmann, Timo Göbel, William R. Cheswick Visual analysis of complex firewall configurations. Search on Bibsonomy VizSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Zouheir Trabelsi, Safaa Zeidan Multilevel early packet filtering technique based on traffic statistics and splay trees for firewall performance improvement. Search on Bibsonomy ICC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Leonardo Maccari A Collaborative Firewall for Wireless Ad-Hoc Social Networks. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
15Lingfang Huang The Firewall Technology Study of Network Perimeter Security. Search on Bibsonomy APSCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Philipp Winter, Stefan Lindskog How the Great Firewall of China is Blocking Tor. Search on Bibsonomy FOCI The full citation details ... 2012 DBLP  BibTeX  RDF
15Ping Yi, Ting Zhu 0001, Qingquan Zhang, Yue Wu 0010, Jianhua Li 0001 Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network. Search on Bibsonomy GLOBECOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Urjita Thakar, Lalit Purohit, Akhilesh Pahade An approach to improve performance of a packet-filtering firewall. Search on Bibsonomy WOCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Zouheir Trabelsi, Hishem El Sayed, Safaa Zeidan Firewall packet matching optimization using network traffic behavior and packet matching statistics. Search on Bibsonomy COMNET The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Andy Applebaum, Karl N. Levitt, Jeff Rowe, Simon Parsons Arguing About Firewall Policy. Search on Bibsonomy COMMA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex X. Liu, Dan Pei, Jia Wang 0001 Firewall fingerprinting. Search on Bibsonomy INFOCOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Amjad Gawanmeh, Sofiène Tahar Novel algorithm for detecting conflicts in firewall rules. Search on Bibsonomy CCECE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Zahra Tavakoli, Sebastian Meier, Alexander Vensmer A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment. Search on Bibsonomy EUNICE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Zhiyun Qian, Zhuoqing Morley Mao Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Jorge Lobo 0001, Massimo Marchi, Alessandro Provetti Firewall Configuration Policies for the Specification and Implementation of Private Zones. Search on Bibsonomy POLICY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Zouheir Trabelsi, Liren Zhang, Safaa Zeidan Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test. Search on Bibsonomy ICICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15George P. Corser A tale of two CTs: IP packets rejected by a firewall. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Niels Provos Firewall. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15 Firewall Policy Analysis. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Paul A. Henry Firewall Architectures: Viruses and Worms. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Paul A. Henry Firewall Architectures: Platforms. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Paul A. Henry Firewall Architectures: Other Issues. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Paul A. Henry Firewall Architectures. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Per Thorsheim Firewall Technologies: Comparison. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Steve Gold The future of the firewall. Search on Bibsonomy Netw. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Michael Hamelin Preparing for a firewall audit. Search on Bibsonomy Netw. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Cássio Ditzel Kropiwiec, Edgard Jamhour, Manoel Camillo Penna, Guy Pujolle Multi-constraint security policies for delegated firewall administration. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Kenro Yatake, Takuya Katayama An executable object-oriented semantics and its application to firewall verification. Search on Bibsonomy Softw. Syst. Model. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Alex X. Liu, Fei Chen 0001 Privacy Preserving Collaborative Enforcement of Firewall Policies in Virtual Private Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF privacy, network security, Virtual private networks
15Afolayan Ayodele Obiniyi, Ezugwu E. Absalom, Mohammed Dikko Network Security and Firewall Technology: A Step to Safety of National IT Vision. Search on Bibsonomy Int. J. Dependable Trust. Inf. Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Vadim Zaliva Applying static code analysis to firewall policies for the purpose of anomaly detection Search on Bibsonomy CoRR The full citation details ... 2011 DBLP  BibTeX  RDF
15Nenad Stojanovski, Marjan Gusev Architecture Of A Identity Based Firewall System Search on Bibsonomy CoRR The full citation details ... 2011 DBLP  BibTeX  RDF
15Wooram Park, Chanik Park Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment. Search on Bibsonomy J. Comput. Sci. Eng. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Moath Hashim Alsafasfeh, Abdel Ilah Alshbatat Configuring Snort as a Firewall on Windows 7 Environment. Search on Bibsonomy J. Ubiquitous Syst. Pervasive Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Subana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi Design and Implementation of Conflict Detection System for Time-Based Firewall Policies. Search on Bibsonomy J. Next Gener. Inf. Technol. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Chi-Shih Chao, Stephen Jen-Hwa Yang A novel three-tiered visualization approach for firewall rule validation. Search on Bibsonomy J. Vis. Lang. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Rossouw von Solms, Matthew J. Warren Towards the Human Information Security Firewall. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Subana Thanasegaran, Yi Yin, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi A Topology-Based Conflict Detection System for Firewall Policies using Bit-Vector-Based Spatial Calculus. Search on Bibsonomy Int. J. Commun. Netw. Syst. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Thierry Bessis, Vijay K. Gurbani, Ashwin Rana Session Initiation Protocol firewall for the IP Multimedia Subsystem core. Search on Bibsonomy Bell Labs Tech. J. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Saleem-Ullah Lar, Xiaofeng Liao 0001, Aqeel-ur Rehman, Ma Qinglu Proactive Security Mechanism and Design for Firewall. Search on Bibsonomy J. Information Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Haiping Xu, Abhinay Reddyreddy, Daniel F. Fitch Defending Against XML-Based Attacks Using State-Based XML Firewall. Search on Bibsonomy J. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Mahmoud Mostafa, Anas Abou El Kalam, Dragos Minuta, Christian Fraboul QoS-aware Firewall Session Table. Search on Bibsonomy CRiSIS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Zouheir Trabelsi, Safaa Zeidan Splay trees based early packet rejection mechanism against DoS traffic targeting firewall default security rule. Search on Bibsonomy WIFS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Gertjan P. Halkes, Johan A. Pouwelse UDP NAT and Firewall Puncturing in the Wild. Search on Bibsonomy Networking (2) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Arief Wicaksana, Arif Sasongko Fast and reconfigurable packet classification engine in FPGA-based firewall. Search on Bibsonomy ICEEI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Hassina Bensefia, Nacira Ghoualmi-Zine An Intelligent System for Decision Making in Firewall Forensics. Search on Bibsonomy DICTAP (1) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Nihel Ben Youssef, Adel Bouhoula Dealing with Stateful Firewall Checking. Search on Bibsonomy DICTAP (1) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Nihel Ben Youssef, Adel Bouhoula A Fully Automatic Approach for Fixing Firewall Misconfigurations. Search on Bibsonomy CIT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Dariusz Palka, Marek Zachara Learning Web Application Firewall - Benefits and Caveats. Search on Bibsonomy ARES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Hironao Takahashi, Hafiz Farooq Ahmad, Kinji Mori Application for Autonomous Decentralized Multi Layer Cache System to Web Application Firewall. Search on Bibsonomy ISADS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Amjad Gawanmeh, Sofiène Tahar Modeling and verification of firewall configurations using domain restriction method. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
15Tugkan Tuglular, Gurcan Gercek Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Saeed Al-Haj, Ehab Al-Shaer Measuring Firewall Security. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Matthias Wilhelm 0001, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders WiFire: a firewall for wireless networks. Search on Bibsonomy SIGCOMM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Ui-Hyong Kim, Jung-Min Kang, Jae-Sung Lee, Hyong-Shik Kim Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization. Search on Bibsonomy ICITCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Raouf Ajami, Anh Dinh Embedded Network Firewall on FPGA. Search on Bibsonomy ITNG The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Zouheir Trabelsi, Liren Zhang, Safaa Zeidan Packet flow histograms to improve firewall efficiency. Search on Bibsonomy ICICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Wang, Konstantin Beznosov Promoting a physical security mental model for personal firewall warnings. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Johann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger Privacy Protection for Smartphones: An Ontology-Based Firewall. Search on Bibsonomy WISTP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Elias P. Duarte Jr., Kleber Vieira Cardoso, Micael O. M. C. de Mello, João G. G. Borges Transparent Communications for Applications behind NAT/Firewall over any Transport Protocol. Search on Bibsonomy ICPADS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Hrishikesh B. Acharya, Mohamed G. Gouda Firewall verification and redundancy checking are equivalent. Search on Bibsonomy INFOCOM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Fei Chen 0001, Bezawada Bruhadeshwar, Alex X. Liu A cross-domain privacy-preserving protocol for cooperative firewall optimization. Search on Bibsonomy INFOCOM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Clement Wang, Konstantin Beznosov A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings. Search on Bibsonomy SOUPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Chi-Shih Chao A flexible and feasible anomaly diagnosis system for Internet firewall rules. Search on Bibsonomy APNOMS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Hyeonwoo Kim, Hongtaek Ju Efficient method for inferring a firewall policy. Search on Bibsonomy APNOMS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Sapan Bhatia, Andy C. Bavier, Larry L. Peterson, Soner Sevinc sfatables: A Firewall-like Policy Engine for Federated Systems. Search on Bibsonomy ICDCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Archana Mishra, Abhishek Agrawal, Rajeev Ranjan Artificial intelligent firewall. Search on Bibsonomy ACAI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Debmalya Biswas, Kathryn Bean, Florian Kerschbaum NAT/Firewall traversal cost model for publish-subscribe systems. Search on Bibsonomy ICPE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Raouf Ajami, Anh Dinh Design a hardware network firewall on FPGA. Search on Bibsonomy CCECE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Bin Zhang 0007, Ehab Al-Shaer On synthesizing distributed firewall configurations considering risk, usability and cost constraints. Search on Bibsonomy CNSM The full citation details ... 2011 DBLP  BibTeX  RDF
15Muhammad Abedin, Syeda Nessa, Latifur Khan, Ehab Al-Shaer, Mamoun Awad Analysis of firewall policy rules using traffic mining techniques. Search on Bibsonomy Int. J. Internet Protoc. Technol. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Prasad Calyam, Gregg Trueb, Nathan Howes Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems. Search on Bibsonomy Int. J. Internet Protoc. Technol. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Avishai Wool Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF risk sets, network security, firewalls
15Michael Hamelin Preventing firewall meltdowns. Search on Bibsonomy Netw. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Seong-Hwan Kim 0004, Sundar Vedantham, Pravin Pathak SMB gateway firewall implementation using a network processor. Search on Bibsonomy Netw. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Andreea Ancuta Onofrei, Yacine Rebahi, Thomas Magedanz Preventing Distributed Denial-of-Service Attacks on the IMS Emergency Services Support through Adaptive Firewall Pinholing Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
15Sugam Sharma, Hari Cohly, Tzusheng Pei On Generation of Firewall Log Status Reporter (SRr) Using Perl Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
15N. K. Sreelaja, G. A. Vijayalakshmi Pai Ant Colony Optimization based approach for efficient packet filtering in firewall. Search on Bibsonomy Appl. Soft Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Martin Stiemerling, Hannes Tschofenig, Cedric Aoun, Elwyn B. Davies NAT/Firewall NSIS Signaling Layer Protocol (NSLP). Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Alex X. Liu Firewall Design and Analysis Search on Bibsonomy 2010   DOI  RDF
15Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey Kouprienko, Oleg Zayats Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation. Search on Bibsonomy Security and Management The full citation details ... 2010 DBLP  BibTeX  RDF
15Anton Titov, Vladimir S. Zaborovsky Firewall Configuration based on Specifications of Access Policy and Network Environment. Search on Bibsonomy Security and Management The full citation details ... 2010 DBLP  BibTeX  RDF
15Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar Security Analysis of Firewall Rule Sets in Computer Networks. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Hironao Takahashi, Kinji Mori, Hafiz Farooq Ahmad Autonomous Short Latency System for Web Application Layer Firewall. Search on Bibsonomy SERVICES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF WAF, L3 Block cache, block I/O device, IOPS, Jmeter, Locality of reference
Displaying result #701 - #800 of 1260 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license