{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:55:18Z","timestamp":1725796518575},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/apnoms.2011.6077012","type":"proceedings-article","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T21:14:09Z","timestamp":1321564449000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["A flexible and feasible anomaly diagnosis system for Internet firewall rules"],"prefix":"10.1109","author":[{"given":"Chi-Shih","family":"Chao","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1035582.1035583"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766714"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.16.142"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_39"},{"key":"ref15","article-title":"A RAR Tree-Based Diagnosis System for Rule Anomalies among Network Firewalls","author":"chao","year":"2010","journal-title":"TANET 2010"},{"key":"ref16","first-page":"20","article-title":"Network Visualization: State of the Art and Research Challenges","author":"mosharaf","year":"2009","journal-title":"IEEE Communications Magazine"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70802"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2009.5383125"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601327"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832496"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"ref5","article-title":"An Internet Firewall Policy Validation System","author":"chen","year":"2006","journal-title":"Master thesis"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.854119"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2003.1194157"},{"key":"ref2","first-page":"827","article-title":"Internet Packet Filter Management and Rectangle Geometry","author":"eppstein","year":"2001","journal-title":"Proceedings of the 5th Annual ACM-SIAM Symposium on Discrete Algorithms"},{"key":"ref1","first-page":"190","article-title":"Implementing a Distributed Firewall","author":"ioannidis","year":"2000","journal-title":"Computer Communications of the ACM"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2004.1317810"},{"key":"ref15a","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.07.003"}],"event":{"name":"2011 13th Asia-Pacific Network Operations and Management Symposium (APNOMS)","start":{"date-parts":[[2011,9,21]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2011,9,23]]}},"container-title":["2011 13th Asia-Pacific Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6069626\/6076947\/06077012.pdf?arnumber=6077012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T17:27:01Z","timestamp":1490117221000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6077012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/apnoms.2011.6077012","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}