Sciweavers

348 search results - page 2 / 70
» Offline firewall analysis
Sort
View
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
13 years 11 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
DSOM
2006
Springer
13 years 9 months ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...
ICDAR
2009
IEEE
13 years 3 months ago
Combining Multiple HMMs Using On-line and Off-line Features for Off-line Arabic Handwriting Recognition
This paper presents an off-line Arabic Handwriting recognition system based on the selection of different state of the art features and the combination of multiple Hidden Markov M...
Mahdi Hamdani, Haikal El Abed, Monji Kherallah, Ad...
IM
2003
13 years 6 months ago
Firewall Policy Advisor for Anomaly Discovery and Rule Editing
Abstract: Firewalls are core elements in network security. However, managing firewall rules, especially for enterprize networks, has become complex and error-prone. Firewall filt...
Ehab S. Al-Shaer, Hazem H. Hamed
AIM
2002
13 years 5 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe