Sciweavers

IJISEC   2008
Wall of Fame | Most Viewed IJISEC-2008 Paper
IJISEC
2008
188views more  IJISEC 2008»
13 years 11 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source188
2Download preprint from source119
3Download preprint from source108
4Download preprint from source101
5Download preprint from source92
6Download preprint from source69
7Download preprint from source64
8Download preprint from source58
9Download preprint from source46
10Download preprint from source41