{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:14:32Z","timestamp":1742922872169,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540367963"},{"type":"electronic","value":"9783540367994"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11805588_2","type":"book-chapter","created":{"date-parts":[[2006,7,18]],"date-time":"2006-07-18T06:53:12Z","timestamp":1153205592000},"page":"15-29","source":"Crossref","is-referenced-by-count":26,"title":["Detection and Resolution of Anomalies in Firewall Policy Rules"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Abedin","sequence":"first","affiliation":[]},{"given":"Syeda","family":"Nessa","sequence":"additional","affiliation":[]},{"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Al-Shaer, E., Hamed, H.: Design and implementation of firewall policy advisor tools. Technical Report CTI-techrep0801, School of Computer Science Telecommunications and Information Systems, DePaul University (August 2002)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E., Hamed, H.: Firewall policy advisor for anomaly detection and rule editing. In: IEEE\/IFIP Integrated Management Conference (IM 2003) (March 2003)","DOI":"10.1007\/978-0-387-35674-7_2"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E., Hamed, H.: Discovery of policy anomalies in distributed firewalls. In: Proc. 23rd Conf. IEEE Communications Soc. (INFOCOM 2004), vol.\u00a023(1), pp. 2605\u20132616 (March 2004)","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E., Hamed, H.: Taxonomy of conflicts in network security policies. IEEE Communications Magazine\u00a044(3) (March 2006)","DOI":"10.1109\/MCOM.2006.1607877"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E., Hamed, H., Boutaba, R., Hasan, M.: Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications (JSAC)\u00a023(10) (October 2005)","DOI":"10.1109\/JSAC.2005.854119"},{"key":"2_CR6","volume-title":"Introduction to Algorithms","author":"T.H. Cormen","year":"2001","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. MIT Press, Cambridge (2001)","edition":"2"},{"key":"2_CR7","unstructured":"Eppstein, D., Muthukrishnan, S.: Internet packet filter management and rectangle geometry. In: Proceedings of the 12th Annual ACM\u2013SIAM Symposium on Discrete Algorithms (SODA 2001), pp. 827\u2013835 (January 2001)"},{"key":"2_CR8","unstructured":"Eronen, P., Zitting, J.: An expert system for analyzing firewall rules. In: Proceedings of the 6th Nordic Workshop on Secure IT Systems (NordSec 2001), pp. 100\u2013107 (November 2001)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Fu, Z., Wu, S.F., Huang, H., Loh, K., Gong, F., Baldine, I., Xu, C.: IPSec\/VPN security policy: Correctness, conflict detection, and resolution. In: Proceedings of Policy 2001 Workshop (January 2001)","DOI":"10.1007\/3-540-44569-2_3"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Golnabi, K., Min, R.K., Khan, L., Al-Shaer, E.: Analysis of firewall policy rules using data mining techniques. In: IEEE\/IFIP Network Operations and Management Symposium (NOMS 2006) (April 2006)","DOI":"10.1109\/NOMS.2006.1687561"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Hari, A., Suri, S., Parulkar, G.M.: Detecting and resolving packet filter conflicts. In: INFOCOM, vol.\u00a03, pp. 1203\u20131212 (March 2000)","DOI":"10.1109\/INFCOM.2000.832496"},{"key":"2_CR12","unstructured":"Hazelhurst, S.: Algorithms for analysing firewall and router access lists. Technical Report TR-WitsCS-1999-5, Department of Computer Science, University of the Witwatersrand, South Africa (July 1999)"},{"key":"2_CR13","first-page":"177","volume-title":"Proceedings, IEEE Symposium on Security and Privacy","author":"A. Mayer","year":"2000","unstructured":"Mayer, A., Wool, A., Ziskind, E.: Fang: A firewall analysis engine. In: Proceedings, IEEE Symposium on Security and Privacy, pp. 177\u2013187. IEEE Computer Society Press, Los Alamitos (2000)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security XX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11805588_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T23:15:12Z","timestamp":1555715712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11805588_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540367963","9783540367994"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11805588_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}