Author:
He Xiangjian,Chomsiri Thawatchai,Nanda Priyadarsi,Tan Zhiyuan
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference30 articles.
1. The effect of firewall testing types on cloud security policies;Shebanow;International Journal of Strategic Information Technology and Applications,2012
2. A survey of intrusion detection techniques in cloud;Modi;Journal of Network and Computer Applications,2013
3. E. Al-Shaer, H. Hamed, Firewall policy advisor for anomaly detection and rule editing, in: Proceedings of the IEEE/IFIP Integrated Management, IM, 2003, pp. 17–30.
4. Conflict classification and analysis of distributed firewall policies;Al-Shaer;IEEE Journal on Selected Areas in Communications,2005
5. Taxonomy of conflicts in network security policies;Haded;IEEE Communications Magazine,2006
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献