1. Lecture Notes in Computer Science;S. Preda,2010
2. Garcia-Alfaro, J., Boulahia-Cuppens, N., Cuppens, F.: Complete analysis of configuration rules to guarantee reliable network security policies. Int. J. Inf. Sec. 7(2), 103–122 (2008)
3. Adiseshu, H., Suri, S., Parulkar, G.: Detecting and Resolving Packet Filter Conflicts. In: INFOCOM, Tel Aviv, Israel, pp. 1203–1212 (2000)
4. Al-Shaer, E., Hamed, H.: Discovery of Policy Anomalies in Distributed Firewalls. In: INFOCOM, Hong Kong, China (2004)
5. Yuan, L., Mai, J., Su, Z., Chen, H., Chuah, C., Mohapatra, P.: FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. In: IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp. 199–213 (2006)