{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:37Z","timestamp":1750220437050,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,17]],"date-time":"2020-10-17T00:00:00Z","timestamp":1602892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,17]]},"DOI":"10.1145\/3438872.3439090","type":"proceedings-article","created":{"date-parts":[[2020,12,25]],"date-time":"2020-12-25T17:12:34Z","timestamp":1608916354000},"page":"255-258","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on intelligent Firewall for network security"],"prefix":"10.1145","author":[{"given":"Wang","family":"Daxian","sequence":"first","affiliation":[{"name":"Department of Computer, Anhui Sanlian University, Hefei China"}]},{"given":"Zhang","family":"Jishan","sequence":"additional","affiliation":[{"name":"Department of Computer, Anhui Sanlian University, Hefei China"}]},{"given":"Yu","family":"jiujiu","sequence":"additional","affiliation":[{"name":"Department of Computer, Anhui Sanlian University, Hefei China"}]}],"member":"320","published-online":{"date-parts":[[2020,12,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Network Security Technology and Application","author":"Tiejun Jia","year":"2017","unstructured":"Jia Tiejun , Tao Weidong . Network Security Technology and Application ( 3 rd edition). Machinery Industry Press , 2017 . Jia Tiejun, Tao Weidong. Network Security Technology and Application (3rd edition). Machinery Industry Press, 2017.","edition":"3"},{"key":"e_1_3_2_1_2_1","volume-title":"Foundation of Network Security: Applications and Standards","author":"Stallings William","year":"2014","unstructured":"William Stallings . Foundation of Network Security: Applications and Standards ( 5 th edition).Tsinghua University Press , 2014 . William Stallings. Foundation of Network Security: Applications and Standards (5th edition).Tsinghua University Press, 2014.","edition":"5"},{"key":"e_1_3_2_1_3_1","volume-title":"Artificial Intelligence and its Application","author":"CAI","year":"2016","unstructured":"CAI Zi-xing. Artificial Intelligence and its Application ( 5 th edition). Tsinghua University Press , 2016 . CAI Zi-xing. Artificial Intelligence and its Application (5th edition). Tsinghua University Press, 2016.","edition":"5"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2019.02.006"},{"key":"e_1_3_2_1_5_1","volume-title":"International Journal of Digital Content Technology and its Applications","author":"Tiejun Jia","year":"2011","unstructured":"Jia Tiejun . The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage . International Journal of Digital Content Technology and its Applications , 2011 . Jia Tiejun. The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage. International Journal of Digital Content Technology and its Applications, 2011."},{"key":"e_1_3_2_1_6_1","volume-title":"Application of ARTIFICIAL intelligence in computer Network Technology in the Era of Big Data [J].Electronic Technology and Software Engineering","author":"Meng Li","year":"2019","unstructured":"Li Meng . Application of ARTIFICIAL intelligence in computer Network Technology in the Era of Big Data [J].Electronic Technology and Software Engineering , 2019 (13):248. Li Meng. Application of ARTIFICIAL intelligence in computer Network Technology in the Era of Big Data [J].Electronic Technology and Software Engineering, 2019(13):248."},{"issue":"14","key":"e_1_3_2_1_7_1","first-page":"60","article-title":"Application analysis of ARTIFICIAL intelligence technology in Network Security Defense [J].","volume":"43","author":"Jingjing Wu","year":"2017","unstructured":"Wu Jingjing . Application analysis of ARTIFICIAL intelligence technology in Network Security Defense [J]. Computer and network , 2017 , 43 ( 14 ): 60 - 61 . Wu Jingjing. Application analysis of ARTIFICIAL intelligence technology in Network Security Defense [J].Computer and network, 2017, 43(14):60-61.","journal-title":"Computer and network"},{"issue":"07","key":"e_1_3_2_1_8_1","first-page":"96","article-title":"Application of Artificial intelligence technology in Cyber Space Security Defense [J]","volume":"2017","author":"Sai Wang","unstructured":"Wang Sai , Wang Jiaqi . Application of Artificial intelligence technology in Cyber Space Security Defense [J] . Information communications , 2017 ( 07 ): 96 - 97 . Wang Sai, Wang Jiaqi. Application of Artificial intelligence technology in Cyber Space Security Defense [J]. Information communications, 2017(07):96-97.","journal-title":"Information communications"},{"key":"e_1_3_2_1_9_1","volume-title":"Application of artificial intelligence technology in cyber space security defense [J]. Computer application research","author":"Yuanli Wu","year":"2015","unstructured":"Wu Yuanli , Si Guangya , Luo Pei . Application of artificial intelligence technology in cyber space security defense [J]. Computer application research , 2015 , 32(08):2241-2244+2253. Wu Yuanli, Si Guangya, Luo Pei. Application of artificial intelligence technology in cyber space security defense [J]. Computer application research, 2015, 32(08):2241-2244+2253."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14311\/NNW.2019.29.013"},{"issue":"2","key":"e_1_3_2_1_11_1","article-title":"Intelligent Firewall Using Intrusion Detection System Based on Neural Networks[J]","volume":"2","author":"Sawant Mandar Dinesh","year":"2014","unstructured":"Mandar Dinesh Sawant , Madhura Milind Phatak , Mrugank Ajay Ranavde , Nitya R. Laxamanan . Intelligent Firewall Using Intrusion Detection System Based on Neural Networks[J] . Journal of Network and Information Security , 2014 , 2 ( 2 ). Mandar Dinesh Sawant, Madhura Milind Phatak, Mrugank Ajay Ranavde, Nitya R. Laxamanan. Intelligent Firewall Using Intrusion Detection System Based on Neural Networks[J]. Journal of Network and Information Security, 2014, 2(2).","journal-title":"Journal of Network and Information Security"},{"key":"e_1_3_2_1_12_1","article-title":"FPGA Based Multi-Tier Artificial Neural Network Processor for Firewall Implementation[J]","volume":"1","author":"Shelake Vinod G.","year":"2008","unstructured":"Vinod G. Shelake , Santosh A. Shinde , Rajanish K. Kamat . FPGA Based Multi-Tier Artificial Neural Network Processor for Firewall Implementation[J] . International Journal of Artificial Intelligence\u2122 , 2008 , 1 (A08). Vinod G. Shelake, Santosh A. Shinde, Rajanish K. Kamat. FPGA Based Multi-Tier Artificial Neural Network Processor for Firewall Implementation[J]. International Journal of Artificial Intelligence\u2122, 2008, 1(A08).","journal-title":"International Journal of Artificial Intelligence\u2122"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/nano.202000021"},{"key":"e_1_3_2_1_14_1","author":"Juniper Networks Inc.; Patent Issued for Application-Aware Firewall Policy Enforcement By Data Center Controller (USPTO 10, 742, 607)[J]","year":"2020","unstructured":"Juniper Networks Inc.; Patent Issued for Application-Aware Firewall Policy Enforcement By Data Center Controller (USPTO 10, 742, 607)[J] . Computer Weekly News , 2020 . Juniper Networks Inc.; Patent Issued for Application-Aware Firewall Policy Enforcement By Data Center Controller (USPTO 10, 742, 607)[J]. Computer Weekly News, 2020.","journal-title":"Computer Weekly News"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"McDonald Braedon Zucoloto Amanda Z Yu Ian Ling Burkhard Regula Brown Kirsty Geuking Markus B McCoy Kathy D. Programing of an Intravascular Immune Firewall by the Gut Microbiota Protects against Pathogen Dissemination during Infection.[J]. Cell host & microbe 2020.  McDonald Braedon Zucoloto Amanda Z Yu Ian Ling Burkhard Regula Brown Kirsty Geuking Markus B McCoy Kathy D. Programing of an Intravascular Immune Firewall by the Gut Microbiota Protects against Pathogen Dissemination during Infection.[J]. Cell host & microbe 2020.","DOI":"10.1016\/j.chom.2020.07.014"},{"key":"e_1_3_2_1_16_1","volume-title":"Technology News Focus","author":"Science - Management Science; New Findings from University of Hong Kong in Management Science Provides New Insights (Shadow of the Great Firewall","year":"2020","unstructured":"Science - Management Science; New Findings from University of Hong Kong in Management Science Provides New Insights (Shadow of the Great Firewall : the Impact of Google Blockade On Innovation In China)[J] . Technology News Focus , 2020 . Science - Management Science; New Findings from University of Hong Kong in Management Science Provides New Insights (Shadow of the Great Firewall: the Impact of Google Blockade On Innovation In China)[J]. Technology News Focus, 2020."},{"key":"e_1_3_2_1_17_1","volume-title":"Information Technology Newsweekly","author":"Illumio Inc.","year":"2020","unstructured":"Illumio Inc. ; \" Optimizing Rules For Configuring A Firewall In A Segmented Computer Network\" in Patent Application Approval Process (USPTO 2020 0220845)[J] . Information Technology Newsweekly , 2020. Illumio Inc.; \"Optimizing Rules For Configuring A Firewall In A Segmented Computer Network\" in Patent Application Approval Process (USPTO 20200220845)[J]. Information Technology Newsweekly, 2020."},{"key":"e_1_3_2_1_18_1","volume-title":"J. V. Bibal Benifa. Development of Reinforcement Learning and Pattern Matching (RLPM) Based Firewall for Secured Cloud Infrastructure[J]. Wireless Personal Communications","author":"Praise J. Jeya","year":"2020","unstructured":"J. Jeya Praise , R. Joshua Samuel Raj , J. V. Bibal Benifa. Development of Reinforcement Learning and Pattern Matching (RLPM) Based Firewall for Secured Cloud Infrastructure[J]. Wireless Personal Communications , 2020 (prepublish). J. Jeya Praise, R. Joshua Samuel Raj, J. V. Bibal Benifa. Development of Reinforcement Learning and Pattern Matching (RLPM) Based Firewall for Secured Cloud Infrastructure[J]. Wireless Personal Communications, 2020(prepublish)."},{"key":"e_1_3_2_1_19_1","author":"Information Technology - Cloud Computing; Studies from Anna University Provide New Data on Cloud Computing [Development of Reinforcement Learning and Pattern Matching (Rlpm) Based Firewall for Secured Cloud Infrastructure][J]","year":"2020","unstructured":"Information Technology - Cloud Computing; Studies from Anna University Provide New Data on Cloud Computing [Development of Reinforcement Learning and Pattern Matching (Rlpm) Based Firewall for Secured Cloud Infrastructure][J] . Computer Technology Journal , 2020 . Information Technology - Cloud Computing; Studies from Anna University Provide New Data on Cloud Computing [Development of Reinforcement Learning and Pattern Matching (Rlpm) Based Firewall for Secured Cloud Infrastructure][J]. Computer Technology Journal, 2020.","journal-title":"Computer Technology Journal"},{"key":"e_1_3_2_1_20_1","volume-title":"Computer Technology Journal","author":"SonicWALL US Holdings Inc.","year":"2020","unstructured":"SonicWALL US Holdings Inc. ; \" Firewall Informed By Web Server Security Policy\" in Patent Application Approval Process (USPTO 2020 0213278)[J] . Computer Technology Journal , 2020. SonicWALL US Holdings Inc.; \"Firewall Informed By Web Server Security Policy\" in Patent Application Approval Process (USPTO 20200213278)[J]. Computer Technology Journal, 2020."},{"key":"e_1_3_2_1_21_1","author":"Nicira Inc.","year":"2020","unstructured":"Nicira Inc. ; Patent Issued for Using Headerspace Analysis To Identify Unneeded Distributed Firewall Rules (USPTO 10, 708, 231)[J] . Network Weekly News , 2020 . Nicira Inc.; Patent Issued for Using Headerspace Analysis To Identify Unneeded Distributed Firewall Rules (USPTO 10, 708, 231)[J]. Network Weekly News, 2020.","journal-title":"Network Weekly News"},{"key":"e_1_3_2_1_22_1","author":"Nicira Inc.","year":"2020","unstructured":"Nicira Inc. ; Patent Issued for Using Headerspace Analysis To Identify Unneeded Distributed Firewall Rules (USPTO 10, 708, 231)[J] . Network Weekly News , 2020 . Nicira Inc.; Patent Issued for Using Headerspace Analysis To Identify Unneeded Distributed Firewall Rules (USPTO 10, 708, 231)[J]. Network Weekly News, 2020.","journal-title":"Network Weekly News"}],"event":{"name":"RICAI 2020: 2020 2nd International Conference on Robotics, Intelligent Control and Artificial Intelligence","acronym":"RICAI 2020","location":"Shanghai China"},"container-title":["Proceedings of the 2020 2nd International Conference on Robotics, Intelligent Control and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3438872.3439090","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3438872.3439090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:19Z","timestamp":1750193239000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3438872.3439090"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,17]]},"references-count":22,"alternative-id":["10.1145\/3438872.3439090","10.1145\/3438872"],"URL":"https:\/\/doi.org\/10.1145\/3438872.3439090","relation":{},"subject":[],"published":{"date-parts":[[2020,10,17]]},"assertion":[{"value":"2020-12-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}