Login / Signup
A Unified Methodology for Verification and Synthesis of Firewall Configurations.
Yongyuth Permpoontanalarp
Chaiwat Rujimethabhas
Published in:
ICICS (2001)
Keyphrases
</>
java card
intrusion detection
model checking
program synthesis
database
information systems
intrusion detection system
real time
information retrieval
search engine
face recognition
search algorithm
software development
access control
network traffic
unified model