共 32 条
[1]
Al-Shaer E., Configuration Analytics and Automation (SAFECONFIG), P1, DOI [DOI 10.1109/SAFECONFIG.2011.6111667, 10.1109/SafeConfig.2011.6111667.]
[2]
Al-Shaer E., 2010, P 3 ACM WORKSHOP ASS, P37, DOI DOI 10.1145/1866898.1866905
[3]
Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security
[J].
2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009),
2009,
:123-+
[4]
Al-Shaer ES, 2004, IEEE INFOCOM SER, P2605
[5]
Algosec Survey Insights, 2012, EX DANG COMPL NETW S
[7]
[Anonymous], 2014, IEEE S COMP COMM ISC
[8]
[Anonymous], 2004, IEEE Transactions on Network and Service Management, DOI [DOI 10.1109/TNSM.2004.4623689, 10.1109/TNSM.2004.4623689]
[9]
[Anonymous], 2012, NSDI 12 9 USENIX S N
[10]
Basile C., 2014, P 9 INT C RISKS SEC, P148