Author:
Govaerts John,Bandara Arosha,Curran Kevin
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Linguistics and Language,Language and Linguistics
Reference68 articles.
1. Abdennadher S (2001) Rule-based constraint programming, Habilitationsschrift, Ludwig-Maximilians- Universität, München, Germany, 15 July 2001
2. Acharya S, Wang J, Ge Z, Znati T, Greenberg A (2006) Simulation study of firewalls to aid improved performance. In: Proceedings of the 39th Annual Simulation Symposium (ANSS’06), Huntsville, 2–6 April 2006
3. Al-Shaer E, Hamed H (2003) Firewall policy advisor for anomaly detection and rule editing. IEEE/IFIP Integrated Management(IM’2003), Colorado Springs, pp 17–30, 24–28 March 2003
4. Al-Shaer E, Hamed H (2004) Discovery of policy anomalies in distributed firewalls. In: Proceedings of IEEE INFOCOM, Hong Kong, pp 2605–2616, 7–12 March 2004
5. Al-Tawil K, Al-Kaltham I (1999) Evaluation and testing of internet firewalls. In: Int J Netw Manage 9: 135–149, Wiley
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Two-Fold Traffic Flow Model for Network Security Management;IEEE Transactions on Network and Service Management;2024-08
2. Automation for Network Security Configuration: State of the Art and Research Trends;ACM Computing Surveys;2023-10-05
3. Hyron: A New Approach for Automating the Network ACL Delivery Pipeline;2023 32nd International Conference on Computer Communications and Networks (ICCCN);2023-07
4. Towards Security Automation in Virtual Networks;2023 IEEE 9th International Conference on Network Softwarization (NetSoft);2023-06-19
5. Automated Firewall Configuration in Virtual Networks;IEEE Transactions on Dependable and Secure Computing;2023-03-01