[HTML][HTML] Learning from safety science: A way forward for studying cybersecurity incidents in organizations

N Ebert, T Schaltegger, B Ambuehl, L Schöni… - Computers & …, 2023 - Elsevier
In the aftermath of cybersecurity incidents within organizations, explanations of their causes
often revolve around isolated technical or human events such as an Advanced Persistent …

Methods and tools for policy analysis

AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …

Conflict classification and analysis of distributed firewall policies

E Al-Shaer, H Hamed, R Boutaba… - IEEE journal on …, 2005 - ieeexplore.ieee.org
Firewalls are core elements in network security. However, managing firewall rules,
particularly, in multifirewall enterprise networks, has become a complex and error-prone …

Method, systems, and computer program products for implementing function-parallel network firewall

EW Fulp, RJ Farley - US Patent 8,037,517, 2011 - Google Patents
the subject matter described herein relates to implementing network firewalls. More
particularly, the subject matter described herein relates to methods, systems, and computer …

A firewall policy anomaly detection framework for reliable network security

C Togay, A Kasif, C Catal… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
One of the key challenges in computer networks is network security. For securing the
network, various solutions have been proposed, including network security protocols and …

[PDF][PDF] Optimization of network firewall policies using directed acyclical graphs

EW Fulp - Proceedings of the IEEE Internet management …, 2005 - Citeseer
This paper introduces a new method to improve the performance of list oriented firewall
systems. Specifically, the paper addresses reordering a firewall rule set to minimize the …

Methods, systems, and computer readable media for adaptive packet filtering

DK Ahn - US Patent 8,495,725, 2013 - Google Patents
US8495725B2 - Methods, systems, and computer readable media for adaptive packet filtering
- Google Patents US8495725B2 - Methods, systems, and computer readable media for …

Modeling and verification of IPSec and VPN security policies

H Hamed, E Al-Shaer, W Marrero - 13th IEEE International …, 2005 - ieeexplore.ieee.org
IPSec has become the defacto standard protocol for secure Internet communications,
providing traffic integrity, confidentiality and authentication. Although IPSec supports a rich …

eFLINT: a domain-specific language for executable norm specifications

LT Van Binsbergen, LC Liu, R Van Doesburg… - Proceedings of the 19th …, 2020 - dl.acm.org
Software systems that share potentially sensitive data are subjected to laws, regulations,
policies and/or contracts. The monitoring, control and enforcement processes applied to …

Dynamic optimal countermeasure selection for intrusion response system

A Shameli-Sendi, H Louafi, W He… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Designing an efficient defense framework is challenging with respect to a network's
complexity, widespread sophisticated attacks, attackers' ability, and the diversity of security …