Pozo et al., 2008
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Sikos | AI in digital forensics: Ontology engineering for cybercrime investigations | |
| US7188173B2 (en) | Method and apparatus to enable efficient processing and transmission of network communications | |
| US20110283348A1 (en) | System and method for determining firewall equivalence, union, intersection and difference | |
| Gade et al. | Private learning on networks: Part ii | |
| Gouda et al. | Verification of distributed firewalls | |
| Ranathunga et al. | Malachite: Firewall policy comparison | |
| Liu | Firewall policy change-impact analysis | |
| Bisdorff et al. | Choices and kernels in bipolar valued digraphs | |
| Pozo et al. | A HEURISTIC POLYNOMIAL ALGORITHM FOR LOCAL INCONSISTENCY DIAGNOSIS IN FIREWALL RULE SETS | |
| Bouhoula et al. | Firewall filtering rules analysis for anomalies detection | |
| Rysavy et al. | Improving security in SCADA systems through firewall policy analysis | |
| Thanasegaran et al. | A topological approach to detect conflicts in firewall policies | |
| Pozo et al. | A Heuristic Process for Local Inconsistency Diagnosis in Firewall Rule Sets. | |
| Ahmed et al. | Firewall rule anomaly detection: A survey | |
| Hidalgo et al. | Fast algorithms for consistency-based diagnosis of firewall rule sets | |
| Niksefat et al. | Efficient algorithms for dynamic detection and resolution of IPSec/VPN security policy conflicts | |
| Haerens et al. | Investigating the creation of an evolvable firewall rule base and guidance for network firewall architecture, using the normalized systems theory | |
| de Albuquerque et al. | Formal validation of automated policy refinement in the management of network security systems | |
| Yin et al. | Detection of conflicts caused by a combination of filters based on spatial relationships | |
| Rezvani et al. | Analyzing and resolving anomalies in firewall security policies based on propositional logic | |
| Haerens | Ontological analysis of the evolvability of the network firewall rule base | |
| Pozo et al. | Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets | |
| Arfa et al. | An empirical study of software maintenance | |
| Kim et al. | Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly. | |
| Clark | Firewall policy diagram: Novel data structures and algorithms for modeling, analysis, and comprehension of network firewalls |