Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | JeeHyun Hwang, Tao Xie 0001, Fei Chen 0001, Alex X. Liu |
Systematic Structural Testing of Firewall Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 9(1), pp. 1-11, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Fei Chen 0001, Alex X. Liu, JeeHyun Hwang, Tao Xie 0001 |
First step towards automatic correction of firewall policy faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Auton. Adapt. Syst. ![In: ACM Trans. Auton. Adapt. Syst. 7(2), pp. 27:1-27:24, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Ehsan Saboori, Shafigh Parsazad, Yasaman Sanatkhani |
Automatic firewall rules generator for anomaly detection systems with Apriori algorithm ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1209.0852, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
15 | Harleen Kaur, Omid Mahdi Ebadati E., Mohd. Afshar Alam |
Implementation of Portion Approach in Distributed Firewall Application for Network Security Framework ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1201.4555, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
15 | Philipp Winter, Jedidiah R. Crandall |
The Great Firewall of China: How It Blocks Tor and Why It Is Hard to Pinpoint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 37(6), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
15 | Qi Liao 0002, Zhen Li 0025, Aaron Striegel |
Could firewall rules be public - a game theoretical perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 5(2), pp. 197-210, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Sergio Pozo, Rafael M. Gasca, Antonia M. Reina Quintero, Angel Jesus Varela-Vaca |
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 85(2), pp. 425-457, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Toshikazu Samura, Hatsuo Hayashi |
Directional spike propagation in a recurrent network: Dynamical firewall as anisotropic recurrent inhibition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Networks ![In: Neural Networks 33, pp. 236-246, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Linquan Xie, Fei Yu 0001, Chen Xu |
Distributed Firewall with Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. ![In: J. Comput. 7(12), pp. 3110-3115, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
15 | Alex X. Liu |
Firewall policy change-impact analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 11(4), pp. 15:1-15:24, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni |
Detecting and Resolving Firewall Policy Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 9(3), pp. 318-331, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Yakkala V. Naga Manikanta, Anjali Sardana |
Protecting web applications from SQL injection attacks by using framework and database firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACCI ![In: 2012 International Conference on Advances in Computing, Communications and Informatics, ICACCI '12, Chennai, India, August 3-5, 2012, pp. 609-613, 2012, ACM, 978-1-4503-1196-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Muhammad Mahmoud, Sonia Chiasson, Ashraf Matrawy |
Does context influence responses to firewall warnings? ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: 2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA, October 23-24, 2012, pp. 1-10, 2012, IEEE, 978-1-4673-2544-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Yordanos Beyene, Michalis Faloutsos, Harsha V. Madhyastha |
SyFi: A Systematic Approach for Estimating Stateful Firewall Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAM ![In: Passive and Active Measurement - 13th International Conference, PAM 2012, Vienna, Austria, March 12-14th, 2012. Proceedings, pp. 74-84, 2012, Springer, 978-3-642-28536-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Tarik Moataz, Xavier Rimasson |
Handling Stateful Firewall Anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 174-186, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Bassam Khorchani, Sylvain Hallé, Roger Villemaire |
Firewall anomaly detection with a model checker for visibility logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: 2012 IEEE Network Operations and Management Symposium, NOMS 2012, Maui, HI, USA, April 16-20, 2012, pp. 466-469, 2012, IEEE, 978-1-4673-0267-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Leonardo Maccari, Renato Lo Cigno |
Privacy in the pervasive era: A distributed firewall approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WONS ![In: 9th Annual Conference on Wireless On-demand Network Systems and Services, WONS 2012, Courmayeur, Italy, January 9-11, 2012, pp. 23-26, 2012, IEEE, 978-1-4577-1721-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Florian Mansmann, Timo Göbel, William R. Cheswick |
Visual analysis of complex firewall configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012, pp. 1-8, 2012, ACM, 978-1-4503-1413-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Safaa Zeidan |
Multilevel early packet filtering technique based on traffic statistics and splay trees for firewall performance improvement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012, pp. 1074-1078, 2012, IEEE, 978-1-4577-2052-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Leonardo Maccari |
A Collaborative Firewall for Wireless Ad-Hoc Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 290-295, 2012, SciTePress, 978-989-8565-24-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
15 | Lingfang Huang |
The Firewall Technology Study of Network Perimeter Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: 2012 IEEE Asia-Pacific Services Computing Conference, APSCC 2012, Guilin, China, December 6-8, 2012, pp. 410-413, 2012, IEEE Computer Society, 978-1-4673-4825-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Philipp Winter, Stefan Lindskog |
How the Great Firewall of China is Blocking Tor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCI ![In: 2nd USENIX Workshop on Free and Open Communications on the Internet, FOCI '12, Bellevue, WA, USA, August 6, 2012, 2012, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
15 | Ping Yi, Ting Zhu 0001, Qingquan Zhang, Yue Wu 0010, Jianhua Li 0001 |
Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: 2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, USA, December 3-7, 2012, pp. 3037-3042, 2012, IEEE, 978-1-4673-0920-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Urjita Thakar, Lalit Purohit, Akhilesh Pahade |
An approach to improve performance of a packet-filtering firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOCN ![In: Ninth International Conference on Wireless and Optical Communications Networks, WOCN 2012, Indore, India, September 20-22, 2012, pp. 1-5, 2012, IEEE, 978-1-4673-1988-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Hishem El Sayed, Safaa Zeidan |
Firewall packet matching optimization using network traffic behavior and packet matching statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMNET ![In: Third International Conference on Communications and Networking, COMNET 2012, Hammamet, Tunisia, March 29 - April 1, 2012, pp. 1-7, 2012, IEEE, 978-1-4673-1007-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Andy Applebaum, Karl N. Levitt, Jeff Rowe, Simon Parsons |
Arguing About Firewall Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMMA ![In: Computational Models of Argument - Proceedings of COMMA 2012, Vienna, Austria, September 10-12, 2012, pp. 91-102, 2012, IOS Press, 978-1-61499-110-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex X. Liu, Dan Pei, Jia Wang 0001 |
Firewall fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, pp. 1728-1736, 2012, IEEE, 978-1-4673-0773-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Amjad Gawanmeh, Sofiène Tahar |
Novel algorithm for detecting conflicts in firewall rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: 25th IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2012, Montreal, QC, Canada, April 29 - May 2, 2012, pp. 1-4, 2012, IEEE, 978-1-4673-1431-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Zahra Tavakoli, Sebastian Meier, Alexander Vensmer |
A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUNICE ![In: Information and Communication Technologies - 18th EUNICE/ IFIP WG 6.2, 6.6 International Conference, EUNICE 2012, Budapest, Hungary, August 29-31, 2012. Proceedings, pp. 41-51, 2012, Springer, 978-3-642-32807-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Zhiyun Qian, Zhuoqing Morley Mao |
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA, pp. 347-361, 2012, IEEE Computer Society, 978-0-7695-4681-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Jorge Lobo 0001, Massimo Marchi, Alessandro Provetti |
Firewall Configuration Policies for the Specification and Implementation of Private Zones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2012, Chapel Hill, NC, USA, July 16-18, 2012, pp. 78-85, 2012, IEEE Computer Society, 978-1-4673-1993-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Liren Zhang, Safaa Zeidan |
Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings, pp. 81-92, 2012, Springer, 978-3-642-34128-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | George P. Corser |
A tale of two CTs: IP packets rejected by a firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 16-20, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Niels Provos |
Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 471-474, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | |
Firewall Policy Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 474, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Paul A. Henry |
Firewall Architectures: Viruses and Worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Paul A. Henry |
Firewall Architectures: Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Paul A. Henry |
Firewall Architectures: Other Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Paul A. Henry |
Firewall Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Per Thorsheim |
Firewall Technologies: Comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Steve Gold |
The future of the firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2011(2), pp. 13-15, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Michael Hamelin |
Preparing for a firewall audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2011(2), pp. 18-19, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Cássio Ditzel Kropiwiec, Edgard Jamhour, Manoel Camillo Penna, Guy Pujolle |
Multi-constraint security policies for delegated firewall administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Manag. ![In: Int. J. Netw. Manag. 21(6), pp. 469-493, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Kenro Yatake, Takuya Katayama |
An executable object-oriented semantics and its application to firewall verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Syst. Model. ![In: Softw. Syst. Model. 10(4), pp. 515-536, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Alex X. Liu, Fei Chen 0001 |
Privacy Preserving Collaborative Enforcement of Firewall Policies in Virtual Private Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 22(5), pp. 887-895, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
privacy, network security, Virtual private networks |
15 | Afolayan Ayodele Obiniyi, Ezugwu E. Absalom, Mohammed Dikko |
Network Security and Firewall Technology: A Step to Safety of National IT Vision. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Dependable Trust. Inf. Syst. ![In: Int. J. Dependable Trust. Inf. Syst. 2(2), pp. 40-60, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Vadim Zaliva |
Applying static code analysis to firewall policies for the purpose of anomaly detection ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1102.1237, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
15 | Nenad Stojanovski, Marjan Gusev |
Architecture Of A Identity Based Firewall System ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1108.1344, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
15 | Wooram Park, Chanik Park |
Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Eng. ![In: J. Comput. Sci. Eng. 5(4), pp. 331-337, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Moath Hashim Alsafasfeh, Abdel Ilah Alshbatat |
Configuring Snort as a Firewall on Windows 7 Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ubiquitous Syst. Pervasive Networks ![In: J. Ubiquitous Syst. Pervasive Networks 3(2), pp. 73-77, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Subana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi |
Design and Implementation of Conflict Detection System for Time-Based Firewall Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Next Gener. Inf. Technol. ![In: J. Next Gener. Inf. Technol. 2(4), pp. 24-39, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Chi-Shih Chao, Stephen Jen-Hwa Yang |
A novel three-tiered visualization approach for firewall rule validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Vis. Lang. Comput. ![In: J. Vis. Lang. Comput. 22(6), pp. 401-414, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Rossouw von Solms, Matthew J. Warren |
Towards the Human Information Security Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cyber Warf. Terror. ![In: Int. J. Cyber Warf. Terror. 1(2), pp. 10-17, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Subana Thanasegaran, Yi Yin, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi |
A Topology-Based Conflict Detection System for Firewall Policies using Bit-Vector-Based Spatial Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Netw. Syst. Sci. ![In: Int. J. Commun. Netw. Syst. Sci. 4(11), pp. 683-695, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Thierry Bessis, Vijay K. Gurbani, Ashwin Rana |
Session Initiation Protocol firewall for the IP Multimedia Subsystem core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bell Labs Tech. J. ![In: Bell Labs Tech. J. 15(4), pp. 169-187, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Saleem-Ullah Lar, Xiaofeng Liao 0001, Aqeel-ur Rehman, Ma Qinglu |
Proactive Security Mechanism and Design for Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Information Security ![In: J. Information Security 2(3), pp. 122-130, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Haiping Xu, Abhinay Reddyreddy, Daniel F. Fitch |
Defending Against XML-Based Attacks Using State-Based XML Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. ![In: J. Comput. 6(11), pp. 2395-2407, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Mahmoud Mostafa, Anas Abou El Kalam, Dragos Minuta, Christian Fraboul |
QoS-aware Firewall Session Table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRiSIS ![In: CRiSIS 2011, Proceedings of the Sixth International Conference on Risks and Security of Internet and Systems, Timișoara, Romania, September 26-28, 2011, pp. 55-61, 2011, IEEE Computer Society, 978-1-4577-1889-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Safaa Zeidan |
Splay trees based early packet rejection mechanism against DoS traffic targeting firewall default security rule. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIFS ![In: 2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011, pp. 1-6, 2011, IEEE Computer Society, 978-1-4577-1017-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Gertjan P. Halkes, Johan A. Pouwelse |
UDP NAT and Firewall Puncturing in the Wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking (2) ![In: NETWORKING 2011 - 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part II, pp. 1-12, 2011, Springer, 978-3-642-20797-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Arief Wicaksana, Arif Sasongko |
Fast and reconfigurable packet classification engine in FPGA-based firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEEI ![In: International Conference on Electrical Engineering and Informatics, ICEEI 2011, Bandung, Indonesia, 17-19 July, 2011, pp. 1-6, 2011, IEEE, 978-1-4577-0753-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Hassina Bensefia, Nacira Ghoualmi-Zine |
An Intelligent System for Decision Making in Firewall Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DICTAP (1) ![In: Digital Information and Communication Technology and Its Applications - International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings, Part I, pp. 470-484, 2011, Springer, 978-3-642-21983-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Nihel Ben Youssef, Adel Bouhoula |
Dealing with Stateful Firewall Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DICTAP (1) ![In: Digital Information and Communication Technology and Its Applications - International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings, Part I, pp. 493-507, 2011, Springer, 978-3-642-21983-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Nihel Ben Youssef, Adel Bouhoula |
A Fully Automatic Approach for Fixing Firewall Misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 11th IEEE International Conference on Computer and Information Technology, CIT 2011, Pafos, Cyprus, 31 August-2 September 2011, pp. 461-466, 2011, IEEE Computer Society, 978-0-7695-4388-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Dariusz Palka, Marek Zachara |
Learning Web Application Firewall - Benefits and Caveats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings, pp. 295-308, 2011, Springer, 978-3-642-23299-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Hironao Takahashi, Hafiz Farooq Ahmad, Kinji Mori |
Application for Autonomous Decentralized Multi Layer Cache System to Web Application Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISADS ![In: 10th International Symposium on Autonomous Decentralized Systems, ISADS 2011, Tokyo & Hiroshima, Japan, March 23-17, 2011, pp. 113-120, 2011, IEEE Computer Society, 978-1-61284-213-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Amjad Gawanmeh, Sofiène Tahar |
Modeling and verification of firewall configurations using domain restriction method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011, pp. 642-647, 2011, IEEE, 978-1-908320-00-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
15 | Tugkan Tuglular, Gurcan Gercek |
Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 157-164, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Saeed Al-Haj, Ehab Al-Shaer |
Measuring Firewall Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Matthias Wilhelm 0001, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders |
WiFire: a firewall for wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Toronto, ON, Canada, August 15-19, 2011, pp. 456-457, 2011, ACM, 978-1-4503-0797-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Ui-Hyong Kim, Jung-Min Kang, Jae-Sung Lee, Hyong-Shik Kim |
Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITCS ![In: Proceedings of the International Conference on IT Convergence and Security, ICITCS 2011, Suwon, Korea, December 14-16, 2011, pp. 629-639, 2011, Springer, 978-94-007-2910-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Raouf Ajami, Anh Dinh |
Embedded Network Firewall on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Eighth International Conference on Information Technology: New Generations, ITNG 2011, Las Vegas, Nevada, USA, 11-13 April 2011, pp. 1041-1043, 2011, IEEE Computer Society, 978-0-7695-4367-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Liren Zhang, Safaa Zeidan |
Packet flow histograms to improve firewall efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: 8th International Conference on Information, Communications & Signal Processing, ICICS 2011, Singapore, Singapore, December 13-16, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0029-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Wang, Konstantin Beznosov |
Promoting a physical security mental model for personal firewall warnings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the International Conference on Human Factors in Computing Systems, CHI 2011, Extended Abstracts Volume, Vancouver, BC, Canada, May 7-12, 2011, pp. 1585-1590, 2011, ACM, 978-1-4503-0268-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Johann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger |
Privacy Protection for Smartphones: An Ontology-Based Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings, pp. 371-380, 2011, Springer, 978-3-642-21039-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Elias P. Duarte Jr., Kleber Vieira Cardoso, Micael O. M. C. de Mello, João G. G. Borges |
Transparent Communications for Applications behind NAT/Firewall over any Transport Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 17th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2011, Tainan, Taiwan, December 7-9, 2011, pp. 935-940, 2011, IEEE Computer Society, 978-1-4577-1875-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Hrishikesh B. Acharya, Mohamed G. Gouda |
Firewall verification and redundancy checking are equivalent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China, pp. 2123-2128, 2011, IEEE, 978-1-4244-9921-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Fei Chen 0001, Bezawada Bruhadeshwar, Alex X. Liu |
A cross-domain privacy-preserving protocol for cooperative firewall optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China, pp. 2903-2911, 2011, IEEE, 978-1-4244-9921-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Clement Wang, Konstantin Beznosov |
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Symposium On Usable Privacy and Security, SOUPS '11, Pittsburgh, PA, USA - July 20 - 22, 2011, pp. 1, 2011, ACM, 978-1-4503-0911-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Chi-Shih Chao |
A flexible and feasible anomaly diagnosis system for Internet firewall rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: 13th Asia-Pacific Network Operations and Management Symposium, APNOMS 2011, Taipei, Taiwan, September 21-23, 2011, pp. 1-8, 2011, IEEE, 978-1-4577-1668-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Hyeonwoo Kim, Hongtaek Ju |
Efficient method for inferring a firewall policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: 13th Asia-Pacific Network Operations and Management Symposium, APNOMS 2011, Taipei, Taiwan, September 21-23, 2011, pp. 1-8, 2011, IEEE, 978-1-4577-1668-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Sapan Bhatia, Andy C. Bavier, Larry L. Peterson, Soner Sevinc |
sfatables: A Firewall-like Policy Engine for Federated Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 2011 International Conference on Distributed Computing Systems, ICDCS 2011, Minneapolis, Minnesota, USA, June 20-24, 2011, pp. 467-476, 2011, IEEE Computer Society, 978-0-7695-4364-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Archana Mishra, Abhishek Agrawal, Rajeev Ranjan |
Artificial intelligent firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACAI ![In: International Conference on Advances in Computing and Artificial Intelligence, ACAI '11, Rajpura/Punjab, India - July 21 - 22, 2011, pp. 204-207, 2011, ACM, 978-1-4503-0635-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Debmalya Biswas, Kathryn Bean, Florian Kerschbaum |
NAT/Firewall traversal cost model for publish-subscribe systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPE ![In: ICPE'11 - Second Joint WOSP/SIPEW International Conference on Performance Engineering, Karlsruhe, Germany, March 14-16, 2011, pp. 487-492, 2011, ACM, 978-1-4503-0519-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Raouf Ajami, Anh Dinh |
Design a hardware network firewall on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, CCECE 2011, Niagara Falls, Ontario, Canada, 8-11 May, 2011, pp. 674-678, 2011, IEEE, 978-1-4244-9788-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Bin Zhang 0007, Ehab Al-Shaer |
On synthesizing distributed firewall configurations considering risk, usability and cost constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSM ![In: 7th International Conference on Network and Service Management, CNSM 2011, Paris, France, October 24-28, 2011, pp. 1-8, 2011, IEEE, 978-1-4577-1588-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
15 | Muhammad Abedin, Syeda Nessa, Latifur Khan, Ehab Al-Shaer, Mamoun Awad |
Analysis of firewall policy rules using traffic mining techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Internet Protoc. Technol. ![In: Int. J. Internet Protoc. Technol. 5(1/2), pp. 3-22, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Prasad Calyam, Gregg Trueb, Nathan Howes |
Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Internet Protoc. Technol. ![In: Int. J. Internet Protoc. Technol. 5(1/2), pp. 32-43, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Avishai Wool |
Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 14(4), pp. 58-65, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
risk sets, network security, firewalls |
15 | Michael Hamelin |
Preventing firewall meltdowns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2010(6), pp. 15-16, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Seong-Hwan Kim 0004, Sundar Vedantham, Pravin Pathak |
SMB gateway firewall implementation using a network processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2010(8), pp. 10-15, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Andreea Ancuta Onofrei, Yacine Rebahi, Thomas Magedanz |
Preventing Distributed Denial-of-Service Attacks on the IMS Emergency Services Support through Adaptive Firewall Pinholing ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1003.5429, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Sugam Sharma, Hari Cohly, Tzusheng Pei |
On Generation of Firewall Log Status Reporter (SRr) Using Perl ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1004.0604, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | N. K. Sreelaja, G. A. Vijayalakshmi Pai |
Ant Colony Optimization based approach for efficient packet filtering in firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Soft Comput. ![In: Appl. Soft Comput. 10(4), pp. 1222-1236, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Martin Stiemerling, Hannes Tschofenig, Cedric Aoun, Elwyn B. Davies |
NAT/Firewall NSIS Signaling Layer Protocol (NSLP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5973, pp. 1-90, October 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Alex X. Liu |
Firewall Design and Analysis ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2010 |
DOI RDF |
|
15 | Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey Kouprienko, Oleg Zayats |
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes, pp. 30-35, 2010, CSREA Press, 1-60132-163-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Anton Titov, Vladimir S. Zaborovsky |
Firewall Configuration based on Specifications of Access Policy and Network Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes, pp. 146-151, 2010, CSREA Press, 1-60132-163-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar |
Security Analysis of Firewall Rule Sets in Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010, pp. 51-56, 2010, IEEE Computer Society, 978-1-4244-7517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Hironao Takahashi, Kinji Mori, Hafiz Farooq Ahmad |
Autonomous Short Latency System for Web Application Layer Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: 6th World Congress on Services, SERVICES 2010, Miami, Florida, USA, July 5-10, 2010, pp. 447-452, 2010, IEEE Computer Society, 978-0-7695-4129-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
WAF, L3 Block cache, block I/O device, IOPS, Jmeter, Locality of reference |