Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes |
Firewall Mechanism in a User Centric Smart Card Ownership Model. |
CARDIS |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Jefferson Tan, David Abramson 0001, Colin Enticott |
Firewall Traversal in the Grid Architecture. |
HPCC |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Achim D. Brucker, Lukas Brügger, Paul J. Kearney, Burkhart Wolff |
Verified Firewall Policy Transformations for Test Case Generation. |
ICST |
2010 |
DBLP DOI BibTeX RDF |
model-based testing, security testing |
15 | Saeed Ezzati, Hamid Reaza Naji, Amir Chegini, Payam Habibimehr |
A new method of hardware firewall implementation on SOC. |
ICITST |
2010 |
DBLP BibTeX RDF |
|
15 | Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni |
FAME: a firewall anomaly management environment. |
SafeConfig |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Tugkan Tuglular, Gurcan Gercek |
Feedback Control Based Test Case Instantiation for Firewall Testing. |
COMPSAC Workshops |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Aniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri 0002 |
An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats. |
BWCCA |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Zhimin Yang, Lixiang Qiao, Chang Liu 0001, Chi Yang, Guangming Wan |
A collaborative trust model of firewall-through based on Cloud Computing. |
CSCWD |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Satoshi Matsumoto, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano, Yusuke Shomura, Kenichi Yoshida |
A Method for Analyzing Network Traffic Using Cardinality Information in Firewall Logs. |
SAINT |
2010 |
DBLP DOI BibTeX RDF |
Network Monitoring, Cardinality |
15 | Mohammad Sajjad Hossain, Vijay Raghunathan |
AEGIS: A Lightweight Firewall for Wireless Sensor Networks. |
DCOSS |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Jiacheng Hong, Ning Liu, Ping Yi, Futai Zou, Qiang Zhai |
Securing Wireless Mesh Network with Mobile Firewall. |
WCSP |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Igor Nai Fovino, Andrea Carcano, Alessio Coletta, Michele Guglielmi, Marcelo Masera, Alberto Trombetta |
State-Based Firewall for Industrial Protocols with Critical-State Prediction Monitor. |
CRITIS |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Subana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi |
An Improved Conflict Detection System with Periodic Cycle Treatment for Time-Based Firewall Policies. |
ICCCN |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Hrishikesh B. Acharya, Aditya Joshi, Mohamed G. Gouda |
Firewall modules and modular firewalls. |
ICNP |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Yi Yin, Xiaodong Xu, Yoshiaki Katayama, Naohisa Takahashi |
Inconsistency Detection System for Security Policy and Firewall Policy. |
ICNC |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Miroslav Svéda, Ondrej Rysavý, Gayan de Silva, Petr Matousek, Jaroslav Ráb |
Static Analysis of Routing and Firewall Policy Configurations. |
ICETE (Selected Papers) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Timothy Nelson 0001, Christopher Barratt, Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi |
The Margrave Tool for Firewall Analysis. |
LISA |
2010 |
DBLP BibTeX RDF |
|
15 | Fei Chen 0001, Alex X. Liu, JeeHyun Hwang, Tao Xie 0001 |
First Step Towards Automatic Correction of Firewall Policy Faults. |
LISA |
2010 |
DBLP BibTeX RDF |
|
15 | Chung-Hsin Liu, Wu-Fan Hsu |
The study of H.26x frame through firewall security. |
ICIS |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Zeeshan Ahmed, Abdessamad Imine, Michaël Rusinowitch |
Safe and Efficient Strategies for Updating Firewall Policies. |
TrustBus |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Jianhua Sun 0002, Hao Chen 0002, Chunmei Niu |
A New Database Firewall Based on Anomaly Detection. |
PDCAT |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Ho-Yu Lam, Donghan (Jarod) Wang, H. Jonathan Chao |
A traffic-aware top-N firewall ruleset approximation algorithm. |
ANCS |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Rüdiger Weis, Brian Schüler, Stefan A. Flemming |
Towards Secure and Reliable Firewall Systems based on MINIX3. |
Sicherheit |
2010 |
DBLP BibTeX RDF |
|
15 | Andrew Blyth |
An Architecture for An XML Enabled Firewall. |
Int. J. Netw. Secur. |
2009 |
DBLP BibTeX RDF |
|
15 | Alex X. Liu |
Firewall policy verification and troubleshooting. |
Comput. Networks |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Ralf Spenneberg |
Webserver-Sicherheit mit mod_security - OpenSource Web-Application-Firewall (WAF). |
Datenschutz und Datensicherheit |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Jyh-Win Huang, Ting-Wei Hou |
A controllable and accountable state-oriented Card-Aided Firewall. |
Comput. Stand. Interfaces |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Sergio Pozo, Rafael Ceballos, Rafael M. Gasca |
A Heuristic Process for Local Inconsistency Diagnosis in Firewall Rule Sets. |
J. Networks |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul |
Extending Firewall Session Table to Accelerate NAT, QoS Classification and Routing |
CoRR |
2009 |
DBLP BibTeX RDF |
|
15 | Avishai Wool |
Firewall Configuration Errors Revisited |
CoRR |
2009 |
DBLP BibTeX RDF |
|
15 | Abdelkader Lahmadi, Olivier Festor |
SecSip: A Stateful Firewall for SIP-based Networks |
CoRR |
2009 |
DBLP BibTeX RDF |
|
15 | Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca |
Model-Based Development of firewall rule sets: Diagnosing model inconsistencies. |
Inf. Softw. Technol. |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu, Alessandra Russo |
Using argumentation logic for firewall configuration management. |
Integrated Network Management |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Abdelkader Lahmadi, Olivier Festor |
SecSip: A stateful firewall for SIP-based networks. |
Integrated Network Management |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Jeong-Oog Lee, Doo-Kwon Baik |
A Database Firewall Server Using Data Masking. |
Security and Management |
2009 |
DBLP BibTeX RDF |
|
15 | Vladimir S. Zaborovsky, Anton Titov |
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy. |
Security and Management |
2009 |
DBLP BibTeX RDF |
|
15 | Andrzej Bialas |
Validation of the Specification Means Ontology on the Simple Firewall Case. |
Security and Management |
2009 |
DBLP BibTeX RDF |
|
15 | Cristian Varas, Thomas Hirsch |
Self Protection through Collaboration Using D-CAF: A Distributed Context-Aware Firewall. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Participative Measurement, Denial of Service, Autonomic Communication, Intrusion Prevention, Flash crowds |
15 | Shaun P. Morrissey, Georges G. Grinstein |
Visualizing firewall configurations using created voids. |
VizSEC |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca, Rafael Ceballos |
Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLs. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
15 | Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez |
An Anomaly-based Web Application Firewall. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
15 | Kavin Tantipongsakul, Akharin Khunkitti |
Dynamic Policy-Based Routing Using Firewall Rules. |
EMS |
2009 |
DBLP DOI BibTeX RDF |
|
15 | George-Christian Pranschke, Barry Irwin, Richard J. Barnett |
Automated Firewall Rule Set Generation Through Passive Traffic Inspection. |
ISSA |
2009 |
DBLP BibTeX RDF |
|
15 | Wei Li 0025 |
A Space-Efficient Approach to Consistency Check of Firewall Rules. |
CAINE |
2009 |
DBLP BibTeX RDF |
|
15 | Qian Ma, Yingxu Lai, Guangzhi Jiang |
Design and Implementation of Distributed Intelligent Firewall Based on IPv6. |
ISDA |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Ashish Tapdiya, Errin W. Fulp |
Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs. |
ICCCN |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Alan Jeffrey, Taghrid Samak |
Model Checking Firewall Policy Configurations. |
POLICY |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Jan Wiebelitz, Christopher Kunz, Stefan Piger, Christian Grimm |
TCP-AuthN: An Approach to Dynamic Firewall Operation in Grid Environments. |
ICNS |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Egon Grünter, Markus Meier, Ralph Niederberger, Thomas Oistrez |
Ein zuverlässiger und schneller Dateitransfer mit dynamischer Firewall-Konfiguration für Grid-Systeme. |
DFN-Forum Kommunikationstechnologien |
2009 |
DBLP BibTeX RDF |
|
15 | Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez |
A Self-learning Anomaly-Based Web Application Firewall. |
CISIS |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Sergio Pozo Hidalgo, Rafael M. Gasca, Fernando de la Rosa Troyano |
Efficient Data Structures for Local Inconsistency Detection in Firewall ACL Updates. |
ICEIS (3) |
2009 |
DBLP BibTeX RDF |
|
15 | Lionel Saliou |
Network firewall dynamic performance evaluation and formalisation. |
|
2009 |
RDF |
|
15 | Isaac Lee, Ray Hunt |
A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks. |
Int. J. Internet Protoc. Technol. |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Lee J. White, Khaled Jaber, Brian Robinson, Václav Rajlich |
Extended firewall for regression testing: an experience report. |
J. Softw. Maintenance Res. Pract. |
2008 |
DBLP DOI BibTeX RDF |
|
15 | John Govaerts, Arosha K. Bandara, Kevin Curran |
A formal logic approach to firewall packet filtering analysis and generation. |
Artif. Intell. Rev. |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Ghassan Misherghi, Lihua Yuan, Zhendong Su 0001, Chen-Nee Chuah, Hao Chen 0003 |
A general framework for benchmarking firewall optimization techniques. |
IEEE Trans. Netw. Serv. Manag. |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Vadim Zaliva |
Platform-Independent Firewall Policy Representation |
CoRR |
2008 |
DBLP BibTeX RDF |
|
15 | Adel Bouhoula, Zouheir Trabelsi, Ezedin Barka, Mohammed Anis Benelbahri |
Firewall filtering rules analysis for anomalies detection. |
Int. J. Secur. Networks |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy |
Formal modelling and analysis of XML firewall for service-oriented systems. |
Int. J. Secur. Networks |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Martin Stiemerling, Jürgen Quittek, Lars Eggert |
NAT and Firewall Traversal Issues of Host Identity Protocol (HIP) Communication. |
RFC |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Ryma Abassi, Sihem Guemara El Fatmi |
An Automated Validation Method for Security Policies: The Firewall Case. |
IAS |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Ryma Abassi, Sihem Guemara El Fatmi |
Towards an automated firewall security policies validation process. |
CRiSIS |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Abhinay Reddyreddy, Haiping Xu |
Securing Service-oriented Systems Using State-Based XML Firewall. |
SEKE |
2008 |
DBLP BibTeX RDF |
|
15 | Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca |
A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
15 | Richard E. Newman, Ira S. Moskowitz |
Practical Covert Channel Implementation through a Timed Mix-Firewall. |
IPCCC |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Thomas Oistrez, Egon Grünter, Markus Meier, Ralph Niederberger |
A Reliable and Fast Data Transfer for Grid Systems Using a Dynamic Firewall Configuration. |
Euro-Par Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Yi-Hsuan Feng, Nen-Fu Huang, Yen-Min Wu |
Evaluation of TCP State Replication Methods for High-Availability Firewall Clusters. |
GLOBECOM |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Sergio Pozo, Rafael Ceballos, Rafael M. Gasca |
Firewall Rule Set Inconsistency Characterization by Clustering. |
WOSIS |
2008 |
DBLP BibTeX RDF |
|
15 | Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-Chun Chou, Tsung-Che Yang |
Safeguard Intranet Using Embedded and Distributed Firewall System. |
FGCN (1) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Senda Hammouda, Lilia Maalej, Zouheir Trabelsi |
Towards Optimized TCP/IP Covert Channels Detection, IDS and Firewall Integration. |
NTMS |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Dai-Rui Lin, Chih-I Wang, D. J. Guan |
An Efficiently Online/Offline Signcryption for Firewall. |
ISDA (3) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Cássio Ditzel Kropiwiec, Edgard Jamhour, Manoel Camillo Penna, Guy Pujolle |
Multi-constraint Security Policies for Delegated Firewall Administration. |
DSOM |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Hae-Yong Yang, Kyung-Hoon Lee, Sung-Jea Ko |
Communication quality of voice over TCP used for firewall traversal. |
ICME |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Alex X. Liu, Fei Chen 0001 |
Collaborative enforcement of firewall policies in virtual private networks. |
PODC |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Yevgeniy Yeryomin, Florian Evers, Jochen Seitz 0001 |
Solving the firewall and NAT traversal issues for SIP-based VoIP. |
ICT |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Kleber Manrique Trevisani, Rogério Eduardo Garcia |
SPML: A Visual Approach for Modeling Firewall Configurations. |
MODSEC@MoDELS |
2008 |
DBLP BibTeX RDF |
|
15 | Edmo Lopes Filho, Gilberto Tadayoshi Hashimoto, Pedro Frosi Rosa |
A High Availability Firewall Model Based on SCTP Protocol. |
ICSNC |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Jin-hua Wu, Xiao-Su Chen, Yi-Zhu Zhao, Jun Ni |
A Flexible Policy-Based Firewall Management Framework. |
CW |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Hang Zhao, Chi-Kin Chau, Steven M. Bellovin |
ROFL: routing as the firewall layer. |
NSPW |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Wei Wang, Jun Li 0003 |
An XML Firewall on Embedded Network Processor. |
ICNS |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Soutaro Matsumoto, Adel Bouhoula |
Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements. |
CISIS |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Niklas Steinleitner |
Firewall traversal in mobile IPv6 networks. |
|
2008 |
RDF |
|
15 | Per Thorsheim |
Comparing Firewall Technologies. |
Information Security Management Handbook, 6th ed. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Paul A. Henry |
An Examination of Firewall Architectures. |
Information Security Management Handbook, 6th ed. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo |
Comparing and debugging firewall rule tables. |
IET Inf. Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Sujan Maskey, Brittany Jansen, Dennis Guster, Charles Hall |
A Basic Firewall Configuration Strategy for the Protection of Development-related Computer Networks and Subnetworks. |
Inf. Secur. J. A Glob. Perspect. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Sebastian Kiesel, Michael Scharf |
Modeling and performance evaluation of transport protocols for firewall control. |
Comput. Networks |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Mohamed G. Gouda, Alex X. Liu |
Structured firewall design. |
Comput. Networks |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Peter Langendörfer, Krzysztof Piotrowski, Steffen Peter, Martin Lehmann 0001 |
Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices. |
Comput. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Gregorio Martínez Pérez, Félix J. García Clemente, Antonio Fernandez Gómez-Skarmeta |
Managing semantic-aware policies in a distributed firewall scenario. |
Internet Res. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Robert M. Marmorstein, Phil Kearns |
Debugging a Firewall Policy with Policy Mapping. |
login Usenix Mag. |
2007 |
DBLP BibTeX RDF |
|
15 | Tomás E. Uribe, Steven Cheung |
Automatic analysis of firewall and network intrusion detection system configurations. |
J. Comput. Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Liang Zhao 0013, A. Shimae, Hiroshi Nagamochi |
Linear-tree rule structure for firewall optimization. |
Communications, Internet, and Information Technology |
2007 |
DBLP BibTeX RDF |
|
15 | Przemyslaw Krekora |
An approach to change availability of the service by adding forecasting module to firewall. |
DepCoS-RELCOMEX |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Shen Li, Vijay Sivaraman, Alex Krumm-Heller, Craig Russell |
A Dynamic Stateful Multicast Firewall. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
15 | MyungKeun Yoon 0001, Shigang Chen, Zhan Zhang |
Reducing the Size of Rule Set in a Firewall. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Michael Roe |
Reconciling Multiple IPsec and Firewall Policies (Transcript of Discussion). |
Security Protocols Workshop |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Tuomas Aura, Moritz Becker, Michael Roe, Piotr Zielinski |
Reconciling Multiple IPsec and Firewall Policies. |
Security Protocols Workshop |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Victor A. Clincy, Jose Garrido, Yusuf Nzibo |
A Firewall Simulation Study. |
Communications in Computing |
2007 |
DBLP BibTeX RDF |
|
15 | Deepak Dayama |
Emulating an Embedded Firewall. |
DETER |
2007 |
DBLP BibTeX RDF |
|