Author:
Chomsiri Thawatchai,He Xiangjian,Nanda Priyadarsi
Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Al-Shaer, E., Hamed, H.: Firewall Policy Advisor for anomaly Detection and Rule Editing. In: IEEE/IFIP Integrated Management, IM 2003 (March 2003)
2. Al-Shaer, E., Hamed, H., Boutaba, R., Hasan, M.: Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications (JSAC) 23(10), 2069–2084 (2005)
3. Haded, H., Al-Shaer, E.: Taxonomy of conflicts in network security policies. IEEE Communications Magazine 44(3), 134–141 (2006)
4. Hazelhusrt, S.: Algorithms for Analyzing Firewall and Router Access Lists. Technical Report TR-WitsCS-1999, Department of Computer Science, University of the Witwatersrand, South Africa (July 1999)
5. Eronen, P., Zitting, J.: An Expert System for Analyzing Firewall Rules. In: Proceedings of 6th Nordic Workshop on Secure IT-Systems (NordSec 2001), pp. 100–107 (2001)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Malicious traffic analysis using Markov chain;Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry;2022-09-21
2. Hybrid Tree-Rule Firewall for High Speed Data Transmission;IEEE Transactions on Cloud Computing;2020-10-01
3. An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay;IEEE TRUST BIG;2016
4. A Stateful Mechanism for the Tree-Rule Firewall;2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications;2014-09
5. Improving cloud network security using the Tree-Rule firewall;Future Generation Computer Systems;2014-01