Wakabayashi et al., 2020
| Publication | Publication Date | Title |
|---|---|---|
| US6691168B1 (en) | Method and apparatus for high-speed network rule processing | |
| US8042167B2 (en) | Methods, systems, and computer program products for network firewall policy optimization | |
| US7136926B1 (en) | Method and apparatus for high-speed network rule processing | |
| US9866426B2 (en) | Methods and apparatus for analyzing system events | |
| US9270704B2 (en) | Modeling network devices for behavior analysis | |
| Fulp et al. | Network firewall policy tries | |
| US9313175B2 (en) | Method and system for mapping between connectivity requests and a security rule set | |
| Fulp | Firewall Architectures for High-Speed Networks | |
| Soldo et al. | Optimal source-based filtering of malicious traffic | |
| US9647947B2 (en) | Block mask register key processing by compiling data structures to traverse rules and creating a new rule set | |
| JP5204581B2 (en) | Method for managing security rule conflict in electronic device, computer program, and electronic device capable of managing security rule conflict | |
| Wakabayashi et al. | Traffic-aware access control list reconstruction | |
| Rana et al. | Automated fast-flux detection using machine learning and genetic algorithms | |
| US7546281B2 (en) | Reduction of ternary rules with common priority and actions | |
| US11184282B1 (en) | Packet forwarding in a network device | |
| Trabelsi et al. | Dynamic traffic awareness statistical model for firewall performance enhancement | |
| Fulp et al. | Trie-based policy representations for network firewalls | |
| RU2697698C2 (en) | Method of processing network traffic using firewall method | |
| Holsopple et al. | Virtual terrain: a security-based representation of a computer network | |
| KR20120049572A (en) | Device and the method for classifying packet | |
| Harish et al. | Scaling IoT MUD Enforcement using Programmable Data Planes | |
| Youssef et al. | Toward migration to sdn: generating sdn forwarding rules by decision tree | |
| Krzemień et al. | Anomaly detection in software defined networks using ensemble learning | |
| Sistani et al. | Packet classification algorithm based on geometric tree by using recursive Dimensional Cutting (DimCut) | |
| Nicol | Simulation-based analysis of network rules matching |