{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:59:15Z","timestamp":1725803955166},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/apnoms.2011.6077015","type":"proceedings-article","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T21:14:09Z","timestamp":1321564449000},"page":"1-8","source":"Crossref","is-referenced-by-count":9,"title":["Efficient method for inferring a firewall policy"],"prefix":"10.1109","author":[{"given":"Hyeonwoo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Hongtaek","family":"Ju","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/SECPRI.2000.848455"},{"year":"1998","author":"goldsmith","journal-title":"Firewalking A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Access Control Lists","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICDCS.2004.1281597"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/INM.2003.1194157"},{"key":"ref11","article-title":"StrobeLight: Lightweight availability Mapping and Anomaly Detection","author":"mickens","year":"0","journal-title":"USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference USENIX Association Berkeley"},{"key":"ref5","article-title":"Architecting the Lumeta Firewall Analyzer","author":"wool","year":"2001","journal-title":"Proceedings of the Tenth USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/SFCS.1976.16"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SP.2006.16"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/INFCOM.2004.1354680"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICNP.2007.4375860"},{"key":"ref9","article-title":"Guidelines on firewalls and firewall policy","author":"cutler","year":"2002","journal-title":"NIST(National Institute of Standards and Technology"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/NPSEC.2006.320342"}],"event":{"name":"2011 13th Asia-Pacific Network Operations and Management Symposium (APNOMS)","start":{"date-parts":[[2011,9,21]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2011,9,23]]}},"container-title":["2011 13th Asia-Pacific Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6069626\/6076947\/06077015.pdf?arnumber=6077015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T17:30:21Z","timestamp":1490117421000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6077015\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/apnoms.2011.6077015","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}