Author of the publication

Firewall Policy Reconnaissance: Techniques and Analysis.

, , and . IEEE Trans. Inf. Forensics Secur., 9 (2): 296-308 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards network security policy generation for configuration analysis and testing., , and . SafeConfig, page 45-52. ACM, (2009)Online workflow management and performance analysis with Stampede., , , , , , , , , and 1 other author(s). CNSM, page 1-10. IEEE, (2011)Failure analysis of distributed scientific workflows executing in the cloud., , , , , , and . CNSM, page 46-54. IEEE, (2012)Guest Editorial: Special Issue on Data Analytics and Machine Learning for Network and Service Management - Part II., , , , , , , and . IEEE Trans. Netw. Serv. Manag., 18 (1): 775-779 (2021)Observational Data Patterns for Time Series Data Quality Assessment., , , , , , , , , and 1 other author(s). eScience, page 271-278. IEEE Computer Society, (2014)Online Fault and Anomaly Detection for Large-Scale Scientific Workflows., , , , , , , and . HPCC, page 373-381. IEEE, (2011)Failure prediction and localization in large scientific workflows., , , , , , and . WORKS@SC, page 107-116. ACM, (2011)Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance., , , and . INFOCOM, page 866-874. IEEE, (2007)Fuzzy Conflict Analysis for QoS Policy Parameters in DiffServ Networks., and . IEEE Trans. Network and Service Management, 9 (4): 459-472 (2012)End-to-end verification of QoS policies., and . NOMS, page 426-434. IEEE, (2012)