{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:48:09Z","timestamp":1762033689340,"version":"3.44.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.23919\/softcom.2019.8903718","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T14:21:37Z","timestamp":1574691697000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Optimization of Parallel Firewalls Filtering Rules"],"prefix":"10.23919","author":[{"given":"Taha Elamine","family":"Hadjadj","sequence":"first","affiliation":[{"name":"Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage,Tunisia"}]},{"given":"Rim","family":"Tebourbi","sequence":"additional","affiliation":[{"name":"Higher School of Communication of Tunis,Tunisia"}]},{"given":"Adel","family":"Bouhoula","sequence":"additional","affiliation":[{"name":"Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage,Tunisia"}]},{"given":"Riadh","family":"Ksantini","sequence":"additional","affiliation":[{"name":"Digital Security Research Lab Higher School of Communication of Tunis (SupCom), University of Carthage,Tunisia"}]}],"member":"263","reference":[{"key":"ref10","first-page":"153","article-title":"Towards safe and optimal filtering rule reordering for complex packet filters","author":"neji","year":"0","journal-title":"2011 5th International Conference on Network and System Security"},{"key":"ref11","first-page":"28","article-title":"Efficient packet classification using splay tree models","volume":"6","author":"srinivasan","year":"2006","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235232"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422079"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1109557.1109600"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE.2017.17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.06.015"},{"key":"ref3","article-title":"Optimization of network firewall policies using ordered sets and directed acyclical graphs","author":"fulp","year":"0","journal-title":"Proc of IEEE Internet Management Conference"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877140"},{"key":"ref5","article-title":"Rule dependencies in access control lists","author":"grout","year":"0","journal-title":"Proc IADIS Int WWW\/Internet Conf"},{"key":"ref8","first-page":"455","article-title":"Firewall optimization using cross-domain privacy-preserving","author":"kumar","year":"2018","journal-title":"International Journal of Scientific Research in Computer Science Engineering and Information Technology (IJSRCSEIT)"},{"journal-title":"Graphical network simulator-3","year":"0","author":"jeremy","key":"ref7"},{"journal-title":"Packetforge-ng","year":"0","author":"d'otreppe de bouvette","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3773"}],"event":{"name":"2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","start":{"date-parts":[[2019,9,19]]},"location":"Split, Croatia","end":{"date-parts":[[2019,9,21]]}},"container-title":["2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892589\/8903594\/08903718.pdf?arnumber=8903718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T18:32:31Z","timestamp":1755714751000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8903718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.23919\/softcom.2019.8903718","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}