{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:31Z","timestamp":1750309411094,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T00:00:00Z","timestamp":1698364800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,27]]},"DOI":"10.1145\/3650215.3650256","type":"proceedings-article","created":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T22:11:20Z","timestamp":1713305480000},"page":"232-238","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Network Application Fault Repair Method Based on Reinforcement Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9070-8372","authenticated-orcid":false,"given":"Wenbo","family":"Liu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0392-0107","authenticated-orcid":false,"given":"Yan","family":"Gao","sequence":"additional","affiliation":[{"name":"Chinese Institute of Electronics, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1225-0560","authenticated-orcid":false,"given":"Ming","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.1012.0365"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1109\/RNDM.2015.7325238","volume-title":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","author":"MALDONADO-LOPEZ F","year":"2015","unstructured":"MALDONADO-LOPEZ F, CALLE E, and DONOSO Y. Detection and prevention of firewall-rule conflicts on software-defined networking[C]. 2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM), Munich, Germany, 2015, 259-265."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1145\/1266840.1266871","volume-title":"SACMAT'07: 12th ACM Symposium on Access Control Models and Technologies","author":"ZHANG B","year":"2007","unstructured":"ZHANG B, AL-SHAER E, JAGADEESAN R, RIELY J, and PITCHER C. Specifications of a high-level conflict-free firewall policy language for multi-domain networks[C]. SACMAT'07: 12th ACM Symposium on Access Control Models and Technologies, New York, America, 2007, 185-194."},{"key":"e_1_3_2_1_4_1","first-page":"369","volume-title":"Coimbra","author":"SA\u00c2DAOUI A","year":"2017","unstructured":"SA\u00c2DAOUI A, BEN YOUSSEF BEN SOUAYEH N and BOUHOULA A. A New FDD-Based Method for Distributed Firewall Misconfigurations Resolution[C]. 14th European, Mediterranean, and Middle Eastern Conference on Information Systems, Coimbra, Portugal, 2017, 369-383."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2726066"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.jocs.2017.09.003","article-title":"FDD-based firewall anomalies resolution tool[J]","volume":"23","author":"SA\u00c2DAOUI A","year":"2017","unstructured":"SA\u00c2DAOUI A, SOUAYEH N and BOUHOULA A. FARE: FDD-based firewall anomalies resolution tool[J]. Journal of Computational Science, 2017, 23: 181-191.","journal-title":"Journal of Computational Science"},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","author":"SINHA M","year":"2021","unstructured":"SINHA M, BERA P and SATPATHY M. An Anomaly Free Distributed Firewall System for SDN[C]. 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, Ireland, 2021, 1-8."},{"key":"e_1_3_2_1_8_1","first-page":"203","volume-title":"Leuven","author":"ALFARO G","year":"2011","unstructured":"ALFARO G, CUPPENS J, CUPPENS-BOULAHIA F, and PREDA N. MIRAGE: a management tool for the analysis and deployment of network security policies[C]. Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, Leuven, Belgium, 2011, 203-215."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2871023"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2979894"}],"event":{"name":"ICMLCA 2023: 2023 4th International Conference on Machine Learning and Computer Application","acronym":"ICMLCA 2023","location":"Hangzhou China"},"container-title":["2023 4th International Conference on Machine Learning and Computer Application"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650215.3650256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650215.3650256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:10Z","timestamp":1750294690000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650215.3650256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,27]]},"references-count":10,"alternative-id":["10.1145\/3650215.3650256","10.1145\/3650215"],"URL":"https:\/\/doi.org\/10.1145\/3650215.3650256","relation":{},"subject":[],"published":{"date-parts":[[2023,10,27]]},"assertion":[{"value":"2024-04-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}