Cited By
View all- Pyke MMeng WLampe B(2024)Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means ClusteringMachine Learning for Cyber Security10.1007/978-981-97-2458-1_10(145-162)Online publication date: 23-Apr-2024
- SHOJI ASHINJO Y(2023)Implementation method of non-bypassable PC application firewalls using virtualization technologies2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)10.1109/HPCC-DSS-SmartCity-DependSys60770.2023.00066(435-442)Online publication date: 17-Dec-2023
- Li WZhang XBao HWang QLi Z(2022)Robust network traffic identification with graph matchingComputer Networks10.1016/j.comnet.2022.109368218(109368)Online publication date: Dec-2022
- Show More Cited By