共 50 条
- [1] Firewall Log Analysis and Dynamic Rule Re-ordering in Firewall Policy Anomaly Management Framework [J]. 2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 853 - 856
- [3] Practical firewall policy inspection using anomaly detection and its visualization [J]. Multimedia Tools and Applications, 2014, 71 : 627 - 641
- [4] An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solver [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 147 - 161
- [5] On ubiquitous network security and anomaly detection [J]. 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 374 - 378
- [6] Reliable Security Policy in Mobile Distributed Network [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1782 - 1786
- [7] Network Security and Anomaly Detection with Big-DAMA, a Big Data Analytics Framework [J]. PROCEEDINGS OF THE 2017 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2017, : 16 - 22