共 18 条
- [1] Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security [J]. 2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, : 123 - +
- [2] Al-Shaer ES, 2004, IEEE INFOCOM SER, P2605
- [3] Firewall policy advisor for anomaly discovery and rule editing [J]. INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL, 2003, 118 : 17 - 30
- [4] Firmato:: A novel firewall management toolkit [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2004, 22 (04): : 381 - 420
- [5] Bera P., 2010, IEEE Transactions on Network and Service Management, V7, P231, DOI 10.1109/TNSM.2010.1012.0365
- [7] Bera P, 2009, LECT NOTES COMPUT SC, V5905, P117, DOI 10.1007/978-3-642-10772-6_10
- [8] Giunchiglia E., 2001, Automated Reasoning. First International Joint Conference, IJCAR 2001. Proceedings (Lecture Notes in Artificial Intelligence Vol.2083), P364
- [9] Gouda MohamedG., 2008, Global Telecommunications Conference, P1
- [10] HAO JX, 1992, PROCEEDINGS OF THE THIRD ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P165