-
1
-
-
84881122979
-
-
Configchecker. http://www.arc.cdm.depaul.edu/projects/ConfigChecker.
-
Configchecker
-
-
-
2
-
-
64249084113
-
Automated pseudo-live testing of firewall configuration enforcement
-
E. Al-Shaer, A. El-Atawy, and T. Samak. Automated pseudo-live testing of firewall configuration enforcement. Selected Areas in Communications, IEEE Journal on, 27(3):302-314, 2009.
-
(2009)
Selected Areas in Communications, IEEE Journal on
, vol.27
, Issue.3
, pp. 302-314
-
-
Al-Shaer, E.1
El-Atawy, A.2
Samak, T.3
-
4
-
-
27644451689
-
Conflict classification and analysis of distributed firewall policies
-
October, Nominated for Best JSAC Paper Award for year 2005
-
E. Al-Shaer, H. Hamed, R. Boutaba, and M. Hasan. Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications (JSAC), 23(10), October 2005. Nominated for Best JSAC Paper Award for year 2005.
-
(2005)
IEEE Journal on Selected Areas in Communications (JSAC)
, vol.23
, Issue.10
-
-
Al-Shaer, E.1
Hamed, H.2
Boutaba, R.3
Hasan, M.4
-
5
-
-
65249107656
-
Shadow configuration as a network management primitive
-
New York, NY, USA, ACM
-
Richard Alimi, Ye Wang, and Y. Richard Yang. Shadow configuration as a network management primitive. In SIGCOMM '08: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pages 111-122, New York, NY, USA, 2008. ACM.
-
(2008)
SIGCOMM '08: Proceedings of the ACM SIGCOMM 2008 conference on Data communication
, pp. 111-122
-
-
Alimi, R.1
Wang, Y.2
Richard Yang, Y.3
-
6
-
-
0022769976
-
Graph-based algorithms for Boolean function manipulation
-
August
-
R. Bryant. Graph-based algorithms for Boolean function manipulation. IEEE Transactions on Computers, C-35(8):677-691, August 1986.
-
(1986)
IEEE Transactions on Computers
, vol.C-35
, Issue.8
, pp. 677-691
-
-
Bryant, R.1
-
7
-
-
35048900689
-
20 states and beyond
-
June
-
20 states and beyond. Journal of Information and Computation, 98(2):1-33, June 1992.
-
(1992)
Journal of Information and Computation
, vol.98
, Issue.2
, pp. 1-33
-
-
Burch, J.1
Clarke, E.2
McMillan, K.3
Dill, D.4
Hwang, J.5
-
8
-
-
0041474573
-
Integrity for virtual private routed networks
-
R. Bush and T. Griffin. Integrity for virtual private routed networks. In IEEE INFOCOM 2003, volume 2, pages 1467-1476, 2003.
-
(2003)
IEEE INFOCOM 2003
, vol.2
, pp. 1467-1476
-
-
Bush, R.1
Griffin, T.2
-
9
-
-
0001449325
-
Temporal and modal logic
-
Jan van Leeuwen, editor, Computer Science, chapter 16, MIT Press
-
E. Allen Emerson. Temporal and modal logic. In Jan van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B, chapter 16, pages 995-1072. MIT Press, 1990.
-
(1990)
Handbook of Theoretical
, vol.B
, pp. 995-1072
-
-
Allen Emerson, E.1
-
10
-
-
84894553762
-
Detecting BGP configuration faults with static analysis
-
N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In NSDI, 2005.
-
(2005)
NSDI
-
-
Feamster, N.1
Balakrishnan, H.2
-
14
-
-
65249120689
-
XL: An efficient network routing algorithm
-
New York, NY, USA, ACM
-
Kirill Levchenko, Geoffrey M. Voelker, Ramamohan Paturi, and Stefan Savage. XL: An efficient network routing algorithm. In SIGCOMM '08: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pages 15-26, New York, NY, USA, 2008. ACM.
-
(2008)
SIGCOMM '08: Proceedings of the ACM SIGCOMM 2008 conference on Data communication
, pp. 15-26
-
-
Levchenko, K.1
Voelker, G.M.2
Paturi, R.3
Savage, S.4
-
17
-
-
85094321414
-
Network configuration management via model finding
-
S. Narain. Network configuration management via model finding. In LISA, pages 155-168, 2005.
-
(2005)
LISA
, pp. 155-168
-
-
Narain, S.1
-
18
-
-
25844500375
-
On static reachability analysis of ip networks
-
G. G. Xie, J. Zhan, D.A. Maltz, H. Zhang, A. Greenberg, G. Hjalmtysson, and J. Rexford. On static reachability analysis of ip networks. In IEEE INFOCOM 2005, volume 3, pages 2170-2183, 2005.
-
(2005)
IEEE INFOCOM 2005
, vol.3
, pp. 2170-2183
-
-
Xie, G.G.1
Zhan, J.2
Maltz, D.A.3
Zhang, H.4
Greenberg, A.5
Hjalmtysson, G.6
Rexford, J.7
-
19
-
-
4544284527
-
-
Y. Yang, C. U. Martel, and S. F. Wu. On building the minimum number of tunnels: An ordered-split approach to manage ipsec/vpn tunnels. In In 9th IEEE/IFIP Network Operation and Management Symposium (NOMS2004), pages 277-290, May 2004.
-
Y. Yang, C. U. Martel, and S. F. Wu. On building the minimum number of tunnels: An ordered-split approach to manage ipsec/vpn tunnels. In In 9th IEEE/IFIP Network Operation and Management Symposium (NOMS2004), pages 277-290, May 2004.
-
-
-
-
20
-
-
33751028760
-
FIREMAN: A toolkit for firewall modeling and analysis
-
May
-
L. Yuan, J. Mai, Z. Su, H Chen, C. Chuah, and P. Mohapatra. FIREMAN: A toolkit for firewall modeling and analysis. In IEEE Symposium on Security and Privacy (SSP'06), May 2006.
-
(2006)
IEEE Symposium on Security and Privacy (SSP'06)
-
-
Yuan, L.1
Mai, J.2
Su, Z.3
Chen, H.4
Chuah, C.5
Mohapatra, P.6
|