{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:15:35Z","timestamp":1743102935000,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030170646"},{"type":"electronic","value":"9783030170653"}],"license":[{"start":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T00:00:00Z","timestamp":1554854400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-17065-3_30","type":"book-chapter","created":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T01:38:22Z","timestamp":1554773902000},"page":"298-307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Concept of Firewall-Filtering Service Based on Rules Trust-Risk Assessment"],"prefix":"10.1007","author":[{"given":"Faouzi","family":"Ja\u00efdi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,10]]},"reference":[{"issue":"ICSCAAIT\u20132018","key":"30_CR1","first-page":"131","volume":"5","author":"D Kumar","year":"2018","unstructured":"Kumar, D., Gupta, M.: Implementation of firewall & intrusion detection system using pfSense to enhance network security. Int. J. Electr. Electron. Comput. Sci. Eng. 5(ICSCAAIT\u20132018), 131\u2013137 (2018)","journal-title":"Int. J. Electr. Electron. Comput. Sci. Eng."},{"key":"30_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-017-9445-1","author":"C Diekmann","year":"2018","unstructured":"Diekmann, C., Hupel, L., Michaelis, J., et al.: Verified iptables firewall analysis and verification. J. Autom. Reason. (2018). \n                  https:\/\/doi.org\/10.1007\/s10817-017-9445-1","journal-title":"J. Autom. Reason."},{"issue":"3","key":"30_CR3","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TDSC.2012.20","volume":"9","author":"H Hu","year":"2012","unstructured":"Hu, H., Ahn, G.J., Kulkarni, K.: Detecting and resolving firewall policy anomalies. IEEE Trans. Dependable Secur. Comput. 9(3), 318\u2013331 (2012)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.jocs.2017.09.003","volume":"23","author":"A Sa\u00e2daoui","year":"2017","unstructured":"Sa\u00e2daoui, A., Souayeh, N.B.Y.B., Bouhoula, A.: FARE: FDD-based firewall anomalies resolution tool. J. Comput. Sci. 23, 181\u2013191 (2017)","journal-title":"J. Comput. Sci."},{"issue":"3","key":"30_CR5","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s10207-015-0290-0","volume":"15","author":"T Abbes","year":"2016","unstructured":"Abbes, T., Bouhoula, A., Rusinowitch, M.: Detection of firewall configuration errors with updatable tree. Int. J. Inf. Secur. 15(3), 301\u2013317 (2016)","journal-title":"Int. J. Inf. Secur."},{"unstructured":"Halle, S., Ngoupe, E.L., Villemaire, R., Cherkaoui, O.: Distributed firewall anomaly detection through LTL model checking. In: 2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM 2013), pp. 194-201 (2013)","key":"30_CR6"},{"unstructured":"Cuppens, F., Cuppens-Boulahia, N., Garcia-Alfaro, J.: Detection and removal of firewall misconfiguration. In: Proceedings of the 2005 IASTED International Conference on Communication, Network and Information Security, vol. 1, pp. 154-162 (2005)","key":"30_CR7"},{"doi-asserted-by":"crossref","unstructured":"Hu, H., Ahn, G.J., Kulkarni, K.: Fame: a firewall anomaly management environment. In: Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, pp. 17-26 (2010)","key":"30_CR8","DOI":"10.1145\/1866898.1866902"},{"issue":"3","key":"30_CR9","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s10207-005-0074-z","volume":"5","author":"A Mayer","year":"2006","unstructured":"Mayer, A., Wool, A., Ziskind, E.: Offline firewall analysis. Int. J. Inf. Secur. 5(3), 125\u2013144 (2006). \n                  https:\/\/doi.org\/10.1007\/s10207-005-0074-z","journal-title":"Int. J. Inf. Secur."},{"unstructured":"Yuan, L., Chen, H., Mai, J., Chuah, C.N., Su, Z., Mohapatra, P.: FIREMAN: a toolkit for firewall modeling and analysis. In: IEEE Symposium on Security and Privacy, pp. 199\u2013213 (2006)","key":"30_CR10"},{"unstructured":"Bodei, C., Degano, P., Focardi, R., Galletta, L., Tempesta, M., Veronese, L.: Firewall management with firewall synthesizer. In: CEUR Workshop Proceedings, vol. 2058, no. 16 (2018)","key":"30_CR11"},{"unstructured":"Phillips, I.: Assessing risk associated with firewall rules. U.S. Patent Application No 15\/215,792 (2018)","key":"30_CR12"},{"doi-asserted-by":"crossref","unstructured":"Jaidi, F., Ayachi, F.L.: A risk awareness approach for monitoring the compliance of RBAC-based policies. In: Proceedings of the 12th International Conference on Security and Cryptography, (SECRYPT 2015), pp. 454\u2013459 (2015)","key":"30_CR13","DOI":"10.5220\/0005577304540459"},{"doi-asserted-by":"crossref","unstructured":"Haslum, K., Abraham, A., Knapskog, S.: Fuzzy online risk assessment for distributed intrusion prediction and prevention systems. In: Proceedings of the Tenth International Conference on Computer Modeling and Simulation, pp. 216\u2013223 (2008)","key":"30_CR14","DOI":"10.1109\/UKSIM.2008.30"},{"key":"30_CR15","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.isatra.2007.04.003","volume":"46","author":"PAS Ralstona","year":"2007","unstructured":"Ralstona, P.A.S., Grahamb, J.H., Hiebb, J.L.: Cyber security risk assessment for SCADA and DCS networks. ISA Trans. 46, 583\u2013594 (2007)","journal-title":"ISA Trans."},{"key":"30_CR16","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1155\/2018\/7142170","volume":"2018","author":"F Jaidi","year":"2018","unstructured":"Jaidi, F., Ayachi, F.L., Bouhoula, A.: A methodology and toolkit for deploying reliable security policies in critical infrastructures. Secur. Commun. Netw. 2018, 22 (2018)","journal-title":"Secur. Commun. Netw."},{"doi-asserted-by":"crossref","unstructured":"Scarfone, K.J., Hoffman, P.: Guidelines on firewalls and firewall policy. In: National Institute of Standards and Technology, NIST Special Publication 800-41, Revision 1 (2009)","key":"30_CR17","DOI":"10.6028\/NIST.SP.800-41r1"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-17065-3_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T04:14:00Z","timestamp":1558152840000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-17065-3_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,10]]},"ISBN":["9783030170646","9783030170653"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-17065-3_30","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,10]]},"assertion":[{"value":"10 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SoCPaR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Soft Computing and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socpar2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/socpar18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}