Author of the publication

Discovering last-matching rules in popular open-source and commercial firewalls.

, , , , and . IJIPT, 5 (1/2): 23-31 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed XML-based network management using JPVM., and . Int. Journal of Network Management, 16 (4): 263-277 (2006)Towards Simulating a Virtual Distributed Honeynet at KFUPM: A Case Study., , and . EMS, page 316-321. IEEE Computer Society, (2010)Identifying network traffic features suitable for honeynet data analysis., , , and . CCECE, page 1044-1048. IEEE, (2011)Modeling and Formal Verification of DHCP Using SPIN., , and . IJCSA, 3 (2): 145-159 (2006)Discovering last-matching rules in popular open-source and commercial firewalls., , , , and . IJIPT, 5 (1/2): 23-31 (2010)Classifying malicious activities in Honeynets using entropy and volume-based thresholds., , , and . Security and Communication Networks, 6 (5): 567-583 (2013)An Enhanced Estimator to Multi-objective OSPF Weight Setting Problem., , and . NOMS, page 240-247. IEEE, (2006)EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing., , and . UCC, page 49-56. IEEE Computer Society, (2011)An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic., , , and . CW, page 23-30. IEEE Computer Society, (2011)Constraint-Based Modeling of InterOperability Problems Using an Object-Oriented Approach., and . IAAI, page 87-94. AAAI, (2001)