|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 762 occurrences of 447 keywords
|
|
|
Results
Found 1260 publication records. Showing 1260 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
203 | Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H. H. Ngu |
Firewall Queries. |
OPODIS |
2004 |
DBLP DOI BibTeX RDF |
Firewall Queries, Network Security, Firewalls |
188 | Alex X. Liu, Mohamed G. Gouda |
Firewall Policy Queries. |
IEEE Trans. Parallel Distributed Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
145 | Alex X. Liu, Eric Torng, Chad R. Meiners |
Firewall Compressor: An Algorithm for Minimizing Firewall Policies. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
142 | Kristen Accardi, Tony Bock, Frank T. Hady, Jon Krueger |
Network processor acceleration for a Linux* netfilter firewall. |
ANCS |
2005 |
DBLP DOI BibTeX RDF |
hybrid firewall, network firewall, prototype, throughput, network processor, netfilter |
134 | Mohamed G. Gouda, Alex X. Liu |
A Model of Stateful Firewalls and Its Properties. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
120 | Alex X. Liu |
Formal Verification of Firewall Policies. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
111 | Ehab Al-Shaer |
Managing firewall and network-edge security policies. |
NOMS (1) |
2004 |
DBLP DOI BibTeX RDF |
|
111 | Charles Payne, Tom Markham |
Architecture and Applications for a Distributed Embedded Firewall. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
101 | Alex X. Liu, Mohamed G. Gouda |
Diverse Firewall Design. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
|
101 | Mohamed G. Gouda, Alex X. Liu |
Firewall Design: Consistency, Completeness, and Compactness. |
ICDCS |
2004 |
DBLP DOI BibTeX RDF |
|
99 | Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne |
Domain and Type Enforcement Firewalls. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP |
98 | Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca |
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT. |
ICCSA (2) |
2009 |
DBLP DOI BibTeX RDF |
ruleset, framework, language, firewall, acl |
98 | Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool |
Firmato: A novel firewall management toolkit. |
ACM Trans. Comput. Syst. |
2004 |
DBLP DOI BibTeX RDF |
model definition language, visualization, management, Security policy, firewall |
92 | Sergio Pozo, Rafael Ceballos, Rafael M. Gasca |
AFPL, an Abstract Language Model for Firewall ACLs. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
ruleset, model, access control, language, firewalls, acl |
92 | Alain J. Mayer, Avishai Wool, Elisha Ziskind |
Offline firewall analysis. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Security anagment, Network Security, Internet Protocol (IP), Packet Filtering |
92 | Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab Al-Shaer |
Analysis of Firewall Policy Rules Using Data Mining Techniques. |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|
88 | Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov |
Revealing hidden context: improving mental models of personal firewall users. |
SOUPS |
2009 |
DBLP DOI BibTeX RDF |
configuration, firewall, mental model, usable security |
86 | Hrishikesh B. Acharya, Mohamed G. Gouda |
Linear-Time Verification of Firewalls. |
ICNP |
2009 |
DBLP DOI BibTeX RDF |
|
85 | Christoph L. Schuba, Eugene H. Spafford |
A Reference Model for Firewall Technology. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
firewall technology, technological aspect, specialized engineering solution, firewall systems, integrity assurance, centralized security policy, authentication, access control, audit, reference model, computer network management, networking technologies, communications security |
82 | Alex X. Liu, Mohamed G. Gouda |
Diverse Firewall Design. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
82 | Zobeideh Aliannezhadi, Mohammad Abdollahi Azgomi |
Modeling and Analysis of a Web Service Firewall Using Coloured Petri Nets. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
82 | Yiwen Liang, Wenjun Deng |
Verify Consistency between Security Policy and Firewall Policy with Answer Set Programming. |
CSSE (1) |
2008 |
DBLP DOI BibTeX RDF |
|
82 | Alex X. Liu |
Change-Impact Analysis of Firewall Policies. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
82 | Michael Ihde, William H. Sanders |
Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood Tolerance. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
82 | Niklas Steinleitner, Henning Peters, Xiaoming Fu 0001 |
Implementation and Performance Study of a New NAT/Firewall Signaling Protocol. |
ICDCS Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
82 | Errin W. Fulp |
An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper). |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
82 | Yuan-ni Guo, Renfa Li |
Design and Performance of Firewall System Based on Embedded Computing. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
82 | Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool |
Firmato: A Novel Firewall Management Toolkit. |
S&P |
1999 |
DBLP DOI BibTeX RDF |
|
79 | Baba Piprani |
Using ORM-Based Models as a Foundation for a Data Quality Firewall in an Advanced Generation Data Warehouse (Extended Version). |
J. Data Semantics |
2008 |
DBLP DOI BibTeX RDF |
data quality firewall, advanced generation data warehouse, data quality assessment, data quality threshold, conceptual schema, ORM |
79 | Bin Zhang 0007, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher |
Specifications of a high-level conflict-free firewall policy language for multi-domain networks. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
firewall, policy language, conflicts free |
79 | Jun Xu 0014, Mukesh Singhal |
Design of a High-Performance ATM Firewall. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
asynchronous transfer mode, TCP/IP, firewall, packet filtering, switch architecture |
76 | Robert N. Smith, Sourav Bhattacharya |
A Protocol and Simulation for Distributed Communicating Firewalls. |
COMPSAC |
1999 |
DBLP DOI BibTeX RDF |
Firewall Cascade, Firewall Leak, Simulation, Java, Fault-Tolerance, Network Security, Emulation, Firewall, Security Management |
75 | Xin Li |
NSIS-Based Firewall Detection in Mobile IPv6. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
Next Steps in Signaling (NSIS), Firewall Detection, Firewall Traversal, Mobile IPv6 |
75 | Lee J. White, Khaled Jaber, Brian Robinson |
Utilization of Extended Firewall for Object-Oriented Regression Testing. |
ICSM |
2005 |
DBLP DOI BibTeX RDF |
Firewall Regression Testing, Extended Firewall Testing, Object-Oriented Software Testing |
75 | Julie L. Connolly |
Operation chain link: the deployment of a firewall at Hanscom Air Force Base. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
operation chain link, Hanscom Air Force Base, Electronic Systems Center, unclassified network, Internet threats, network security assessments, hacker break-in, firewall development team, firewall deployment, security management, military computing |
73 | Yinong Chen, Zhongshi He |
Simulating Highly Dependable Applications in a Distributed Computing Environment. |
Annual Simulation Symposium |
2003 |
DBLP DOI BibTeX RDF |
Distributed system, load balancing, firewall, task allocation, queuing |
72 | Sven Ehlert, Ge Zhang, Thomas Magedanz |
Increasing SIP firewall performance by ruleset size limitation. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
72 | Jerry Cheng, Hao Yang 0004, Starsky H. Y. Wong, Petros Zerfos, Songwu Lu |
Design and Implementation of Cross-Domain Cooperative Firewall. |
ICNP |
2007 |
DBLP DOI BibTeX RDF |
|
72 | Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer |
FireCracker: A Framework for Inferring Firewall Policies using Smart Probing. |
ICNP |
2007 |
DBLP DOI BibTeX RDF |
|
72 | Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li |
An Automated Framework for Validating Firewall Policy Enforcement. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
72 | Weiping Wang 0006, Wenhui Chen, Zhepeng Li, Huaping Chen 0001 |
Comparison Model and Algorithm for Distributed Firewall Policy. |
ICIC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Yoshio Tanaka, Motonori Hirano, Mitsuhisa Sato, Hidemoto Nakada, Satoshi Sekiguchi |
Performance Evaluation of a Firewall-Compliant Globus-based Wide-Area Cluster System. |
HPDC |
2000 |
DBLP DOI BibTeX RDF |
|
70 | Khalil Abdullah, James E. Kimble Jr., Lee J. White |
Correcting for unreliable regression integration testing. |
ICSM |
1995 |
DBLP DOI BibTeX RDF |
unreliable regression integration testing, firewall concept, error cases, firewall construction, software maintenance, statistical analysis, program testing, unit testing, control flow, integration testing |
69 | Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov |
Towards improving mental models of personal firewall users. |
CHI Extended Abstracts |
2009 |
DBLP DOI BibTeX RDF |
configuration, firewall, mental model, usable security |
69 | Dong-Young Lee, Hyung-Jin Lim, Tai-Myoung Chung |
A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall Systems. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
Integrated Security Management, Secure MIB, Agent, Firewall, SNMP |
64 | Samuel Patton, David Doss, William Yurcik |
Open Source Versus Commercial Firewalls: Functional Comparison. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
corporate applications, commercial firewalls, security risks, Cisco, IOS firewall feature set, Internet, Internet, open source, open source software, open systems, network operating systems, authorisation, telecommunication security, virtual private network, business communication, Linux operating system |
64 | Yoshio Tanaka, Mitsuhisa Sato, Motonori Hirano, Hidemoto Nakada, Satoshi Sekiguchi |
Resource Manager for Globus-Based Wide-Area Cluster Computing. |
IWCC |
1999 |
DBLP DOI BibTeX RDF |
Wide-area Cluster Computing, Firewall, Globus, Cluster Systems, Global Computing |
63 | Gajanan S. Jedhe, Arun Ramamoorthy, Kuruvilla Varghese |
A Scalable High Throughput Firewall in FPGA. |
FCCM |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Lihua Yuan, Jianning Mai, Zhendong Su 0001, Hao Chen 0003, Chen-Nee Chuah, Prasant Mohapatra |
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
63 | Ehab Al-Shaer, Hazem H. Hamed, Raouf Boutaba, Masum Hasan |
Conflict classification and analysis of distributed firewall policies. |
IEEE J. Sel. Areas Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Pankaj N. Parmar, Priya Rajagopal, Ravi Sahita |
Protocol Decode Based Stateful Firewall Policy Definition Language. |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
63 | Wei T. Yue, Amitava Bagchi |
Tuning the Quality Parameters of a Firewall to Maximize Net Benefit. |
IWDC |
2003 |
DBLP DOI BibTeX RDF |
|
63 | Yongyuth Permpoontanalarp, Chaiwat Rujimethabhas |
A Unified Methodology for Verification and Synthesis of Firewall Configurations. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
63 | Michael R. Lyu, Lorrien K. Y. Lau |
Firewall Security: Policies, Testing and Performance Evaluation. |
COMPSAC |
2000 |
DBLP DOI BibTeX RDF |
|
59 | Chi-Shih Chao |
A Visualized Internet Firewall Rule Validation System. |
APNOMS |
2007 |
DBLP DOI BibTeX RDF |
Firewall security consistency, Rule anomalies, Policy-based network security management, System visualization |
59 | Ying Qiu, Feng Bao 0001, Jianying Zhou 0001 |
Firewall for Dynamic IP Address in Mobile IPv6. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Mobile IP6, Firewall |
59 | Daniel Hoffman, Kevin Yoo |
Blowtorch: a framework for firewall test automation. |
ASE |
2005 |
DBLP DOI BibTeX RDF |
network firewall, production grammar, automated testing, covering array, capture/replay |
59 | Alain J. Mayer, Avishai Wool, Elisha Ziskind |
Fang: A Firewall Analysis Engine. |
S&P |
2000 |
DBLP DOI BibTeX RDF |
Vulnerability Testing, Network Security, Firewall |
58 | Subrata Acharya, Jia Wang 0001, Zihui Ge, Taieb Znati, Albert G. Greenberg |
Simulation Study of Firewalls to Aid Improved Performance. |
Annual Simulation Symposium |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Robert N. Smith, Sourav Bhattacharya |
Operating firewalls outside the LAN perimeter. |
IPCCC |
1999 |
DBLP DOI BibTeX RDF |
|
56 | Robert N. Smith, Sourav Bhattacharya |
Firewall placement in a large network topology. |
FTDCS |
1997 |
DBLP DOI BibTeX RDF |
firewall placement heuristics, large network topology, multi-user distributed information environment, firewall cascade, potential attack point, comprehensive security protection, end-to-end security protection, simulation, performance, network security, completeness, authorisation, operations research, cost optimization, delay minimization, sensitive data, confidence degree |
53 | Wang Yu-gang, Ge Yin-mao, Yang Jian-xin |
Research on Packet Filter Rules of the Firewall Based on Visual Prolog. |
CSSE (1) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Grzegorz J. Nalepa |
A Unified Firewall Model for Web Security. |
AWIC |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Sebastian Felis, Martin Stiemerling |
Securing a Path-Coupled NAT/Firewall Signaling Protocol. |
IPOM |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Charles C. Zhang, Marianne Winslett, Carl A. Gunter |
On the Safety and Efficiency of Firewall Policy Deployment. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Richard Clayton 0001, Steven J. Murdoch, Robert N. M. Watson |
Ignoring the Great Firewall of China. |
Privacy Enhancing Technologies |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Antonio Theophilo Costa, Markus Endler, Renato Cerqueira |
Evaluation of Three Approaches for CORBA Firewall/NAT Traversal. |
OTM Conferences (2) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Utz Roedig, Jens B. Schmitt |
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Ana-Maria Ghiran, Gheorghe Cosmin Silaghi, Nicolae Tomai |
Ontology-Based Tools for Automating Integration and Validation of Firewall Rules. |
BIS |
2009 |
DBLP DOI BibTeX RDF |
firewall management, Ontologies, rule-based reasoning |
50 | Achim D. Brucker, Lukas Brügger, Burkhart Wolff |
Model-Based Firewall Conformance Testing. |
TestCom/FATES |
2008 |
DBLP DOI BibTeX RDF |
Model-based Testing, Firewall, Conformance Testing, Security Testing |
50 | Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca |
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
consistency, diagnosis, firewall, conflict, acl, rule set |
50 | Christopher P. Lee 0001, Jason Trost, Nicholas Gibbs, Raheem A. Beyah, John A. Copeland |
Visual Firewall: Real-time Network Security Monito. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
firewall configuration, snort monitoring, user interfaces, information visualization, Network security |
50 | Jung-Seuk Lee, Jun-Cheol Jeon, Kee-Young Yoo |
A security scheme for protecting security policies in firewall. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
security policy, firewall, ubiquitous environment, cryptographic algorithm |
48 | Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee 0001, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim |
Towards complete node enumeration in a peer-to-peer botnet. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
infected hosts enumeration, storm, P2P, botnet |
48 | Michael R. Horvath, Errin W. Fulp, Patrick S. Wheeler |
Policy Distribution Methods for Function Parallel Firewalls. |
ICCCN |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Livio Riciulli |
Advanced networks - High speed firewalls: securing the 10 gigabit ethernet WAN. |
SC |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Tugkan Tuglular, Özgür Kaya, Can Arda Muftuoglu, Fevzi Belli |
Directed Acyclic Graph Modeling of Security Policies for Firewall Testing. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Firewall Policies, Firewall Testing, Firewalls, Directed Acyclic Graphs, Security Testing, Event Sequence Graphs |
44 | Venanzio Capretta, Bernard Stepien, Amy P. Felty, Stan Matwin |
Formal correctness of conflict detection for firewalls. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
firewall, coq |
44 | Wan-Jik Lee, Seok-Yeol Heo, Tae Young Byun, Young-Ho Sohn, Ki Jun Han |
A Secure Packet Filtering Mechanism for Tunneling over Internet. |
ICESS |
2007 |
DBLP DOI BibTeX RDF |
Security, Firewall, Tunneling, Packet Filtering, Netfilter |
44 | Alex X. Liu, Mohamed G. Gouda |
Complete Redundancy Detection in Firewalls. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
Redundant Rules, Network Security, Firewall |
44 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo |
On Securing RTP-Based Streaming Content with Firewalls. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
streaming content, Network security, firewall |
44 | Ehab Al-Shaer, Adel El-Atawy, Taghrid Samak |
Automated pseudo-live testing of firewall configuration enforcement. |
IEEE J. Sel. Areas Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Shann-Chiuen Wu, Yung-Chung Ku, Tzao-Lin Lee |
Zero-Configuration Personal Firewall for DLNA DMS. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
44 | JeeHyun Hwang, Tao Xie 0001, Fei Chen 0001, Alex X. Liu |
Systematic Structural Testing of Firewall Policies. |
SRDS |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Sergio Pozo, Rafael Ceballos, Rafael M. Gasca |
CSP-Based Firewall Rule Set Diagnosis using Security Policies. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Chaokai He |
Design and implementation of a personal firewall Based on NDIS Intermediate Drivers. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Hazem H. Hamed, Ehab Al-Shaer |
Dynamic rule-ordering optimization for high-speed firewall filtering. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Baba Piprani |
Using ORM-Based Models as a Foundation for a Data Quality Firewall in an Advanced Generation Data Warehouse. |
OTM Workshops (2) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham |
Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
Network Security, Security Policy, Firewalls, Anomalies, Packet Filters |
44 | Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu, Alessandra Russo |
Using Argumentation Logic for Firewall Policy Specification and Analysis. |
DSOM |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Kun Bai, Peng Liu 0005 |
Towards Database Firewall: Mining the Damage Spreading Patterns. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Ke Zhang, Naiqi Liu, Yan Chen |
The Design of Firewall Based on Intel IXP2350 and Autopartitioning Mode C. |
ICESS |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Pavan Verma, Atul Prakash 0001 |
FACE: A Firewall Analysis and Configuration Engine. |
SAINT |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Se-Chang Son, Bill Allcock, Miron Livny |
CODO: firewall traversal by cooperative on-demand opening. |
HPDC |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Willy Susilo, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang |
Personal Firewall for Pocket PC 2003: Design & Implementation. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Gengsheng Zheng, Zhiping Xie, Bo Wang 0007, Guiming He |
A New Tunnel Scheme for Multimedia Communications Traversing NAT/Firewall in NGN. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Avishai Wool |
A Quantitative Study of Firewall Configuration Errors. |
Computer |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Mark L. Green, Steven M. Gallo, Russ Miller |
Grid-Enabled Virtual Organization Based Dynamic Firewall. |
GRID |
2004 |
DBLP DOI BibTeX RDF |
|
44 | John W. Lockwood, Christopher E. Neely, Christopher K. Zuver, James Moscola, Sarang Dharmapurikar, David Lim |
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall. |
FPL |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Whe Dar Lin |
A Firewall Approach to Personal Knowledge System. |
CBMS |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1260 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|