Author:
Abedin Muhammad,Nessa Syeda,Khan Latifur,Thuraisingham Bhavani
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Al-Shaer, E., Hamed, H.: Design and implementation of firewall policy advisor tools. Technical Report CTI-techrep0801, School of Computer Science Telecommunications and Information Systems, DePaul University (August 2002)
2. Al-Shaer, E., Hamed, H.: Firewall policy advisor for anomaly detection and rule editing. In: IEEE/IFIP Integrated Management Conference (IM 2003) (March 2003)
3. Al-Shaer, E., Hamed, H.: Discovery of policy anomalies in distributed firewalls. In: Proc. 23rd Conf. IEEE Communications Soc. (INFOCOM 2004), vol. 23(1), pp. 2605–2616 (March 2004)
4. Al-Shaer, E., Hamed, H.: Taxonomy of conflicts in network security policies. IEEE Communications Magazine 44(3) (March 2006)
5. Al-Shaer, E., Hamed, H., Boutaba, R., Hasan, M.: Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications (JSAC) 23(10) (October 2005)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Implementing the principle of least administrative privilege on operating systems: challenges and perspectives;Annals of Telecommunications;2024-05-16
2. Implementing the Principle of Least Privilege Using Linux Capabilities: Challenges and Perspectives;2023 7th Cyber Security in Networking Conference (CSNet);2023-10-16
3. Anomaly detection of policies in distributed firewalls using data log analysis;The Journal of Supercomputing;2023-05-29
4. A Survey on Firewall for cloud security with Anomaly detection in Firewall Policy;2023 International Conference on Artificial Intelligence and Smart Communication (AISC);2023-01-27
5. Firewall Management: Rapid Anomaly Detection;2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2022-12