1. (2006). Ospf design guide. (Tech. rep.) Available at url: http://www.cisco.com/warp/public/104/1.pdf .
2. Acharya, S., Wang, J., Ge, Z., Znati, T., & Greenberg, A. (2006). Simulation study of firewalls to aid improved performance. In 39th annual, simulation symposium, 2006 (p. 8).
3. Bartal, Y., Mayer, A., Nissim, K., & Wool, A. (1999). Firmato: a novel firewall management toolkit. In IEEE symposium on security and privacy (pp. 17–31). citeseer.ist.psu.edu/article/bartal99firmato.html .
4. Bera, P., Ghosh, S., & Dasgupta, P. (2009). Formal analysis of security policy implementations in enterprise networks. International Journal of Computer Networks and Communications, 1(2), 56–73.
5. Bera, P., Ghosh, S., & Dasgupta, P. (2009). Formal verification of security policy implementations in enterprise networks. In ICISS ’09: Proceedings of the 5th international conference on information systems security (pp. 117–131). Berlin: Springer.