Firewall verification and redundancy checking are equivalent.
Hrishikesh B. AcharyaMohamed G. GoudaPublished in: INFOCOM (2011)
Keyphrases
- verification method
- java card
- model checking
- intrusion detection
- network security
- data sets
- functional verification
- redundancy reduction
- smart card
- face verification
- temporal logic
- concurrent systems
- consistency checking
- formal methods
- static analysis
- network traffic
- relational databases
- case study
- website
- computer vision
- real world