-
2
-
-
84874341466
-
-
"AT&T-Network-Based Firewall," http://www.business.att.com/ enterprise/Service/business-continuity-enterprise/ebfirewallsecurity/ networkbased-firewall-enterprise/.
-
-
-
-
4
-
-
27644470057
-
Outsourced security the benefits and risks
-
M. Whitworth, "Outsourced security the benefits and risks," Network Security, pp. 16-19, 2005.
-
(2005)
Network Security
, pp. 16-19
-
-
Whitworth, M.1
-
9
-
-
33845688273
-
Structured firewall design
-
March
-
M. G. Gouda and A. X. Liu, "Structured firewall design," Computer Networks Journal (Elsevier), vol. 51, no. 4, pp. 1106-1120, March 2007.
-
(2007)
Computer Networks Journal (Elsevier)
, vol.51
, Issue.4
, pp. 1106-1120
-
-
Gouda, M.G.1
Liu, A.X.2
-
10
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of ACM, vol. 13, no. 7, pp. 422-426, 1970. [Online]. Available: citeseer.nj.nec.com/article/chandranmenon95trading.html
-
(1970)
Communications of ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
11
-
-
48349089344
-
Design and implementation of cross-domain cooperative firewall
-
J. Cheng, H. Yang, S. H. Wong, and S. Lu, "Design and implementation of cross-domain cooperative firewall," in Proc. IEEE Int. Conf. on Network Protocols (ICNP), 2007.
-
(2007)
Proc. IEEE Int. Conf. on Network Protocols (ICNP)
-
-
Cheng, J.1
Yang, H.2
Wong, S.H.3
Lu, S.4
-
12
-
-
84874308043
-
Collaborative enforcement of firewall policies in virtual private networks
-
A. X. Liu and F. Chen, "Collaborative enforcement of firewall policies in virtual private networks," in Proc. PODC, 2008.
-
(2008)
Proc. PODC
-
-
Liu, A.X.1
Chen, F.2
-
13
-
-
14944358967
-
Structure preserving anonymization of router configuration data
-
D. A. Maltz, J. Zhan, G. Xie, H. Zhang, G. Hjálmtýsson, A. Greenberg, and J. Rexford, "Structure preserving anonymization of router configuration data," in Proc. IMC, 2004.
-
(2004)
Proc. IMC
-
-
Maltz, D.A.1
Zhan, J.2
Xie, G.3
Zhang, H.4
Hjálmtýsson, G.5
Greenberg, A.6
Rexford, J.7
-
15
-
-
33947542283
-
High-speed prefix-preserving ip address anonymization for passive measurement systems
-
R. Ramaswamy and T. Wolf, "High-speed prefix-preserving ip address anonymization for passive measurement systems," IEEE/ACM Transaction in Networking, vol. 15, pp. 26-39, 2007.
-
(2007)
IEEE/ACM Transaction in Networking
, vol.15
, pp. 26-39
-
-
Ramaswamy, R.1
Wolf, T.2
-
16
-
-
84874331233
-
The devil and packet trace anonymization
-
R. Pang, M. Allman, V. Paxson, and J. Lee, "The devil and packet trace anonymization," in Proc. ACM SIGCOMM, 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
18
-
-
84874343410
-
TCAM razor: A systematic approach towards minimizing packet classifiers in TCAMs
-
to appear
-
A. X. Liu, C. R. Meiners, and E. Torng, "TCAM razor: A systematic approach towards minimizing packet classifiers in TCAMs," IEEE/ACM Transactions on Networking, to appear.
-
IEEE/ACM Transactions on Networking
-
-
Liu, A.X.1
Meiners, C.R.2
Torng, E.3
-
22
-
-
33745129743
-
Survey & taxonomy of packet classification techniques
-
D. E. Taylor, "Survey & taxonomy of packet classification techniques," ACM Computing Surveys, vol. 37, no. 3, pp. 238-275, 2005.
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.3
, pp. 238-275
-
-
Taylor, D.E.1
-
23
-
-
84874289133
-
-
"Umass Trace Repository, http://traces.cs.umass.edu/."
-
-
-
|