참고문헌
- D. Appelt, C. D. Nguyen, A. Panichella, and L. C. Briand, "A machine-learning-driven evolutionary approach for testing web application firewalls," IEEE Transactions on Reliability, vol. 67, pp. 733-757, 2018. https://doi.org/10.1109/TR.2018.2805763
- N. Altwaijry, "Identification of Network Attacks Using a Deep Learning Approach," International Journal of Computer Science and Network Security (IJCSNS), vol. 20, p. 201, 2020. https://doi.org/10.22937/IJCSNS.2020.20.04.25
- T. Abbes, A. Bouhoula, and M. Rusinowitch, "Detection of firewall configuration errors with updatable tree," International Journal of Information Security, vol. 15, pp. 301-317, 2016. https://doi.org/10.1007/s10207-015-0290-0
- K. Kaur and D. Rao, "Automation the process of unifying the change in the firewall performance," International Journal of Computer Science and Network Security (IJCSNS), 2014.
- N. Ammari, A. A. El Mrabti, A. Abou El Kalam, and A. A. Ouahman, "Firewall anti-leak of sensitive data," Procedia Computer Science, vol. 83, pp. 1226-1231, 2016. https://doi.org/10.1016/j.procs.2016.04.256
- U. P. D. Ani, H. He, and A. Tiwari, "Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective," Journal of Cyber Security Technology, vol. 1, pp. 32-74, 2017. https://doi.org/10.1080/23742917.2016.1252211
- K. Sattar, K. Salah, M. Sqalli, R. Rafiq, and M. Rizwan, "A Delay-Based Countermeasure Against the Discovery of Default Rules in Firewalls," Arabian Journal for Science and Engineering, vol. 42, pp. 833-844, February 01 2017. https://doi.org/10.1007/s13369-016-2359-0
- C. Diekmann, L. Hupel, J. Michaelis, M. Haslbeck, and G. Carle, "Verified iptables firewall analysis and verification," Journal of automated reasoning, vol. 61, pp. 191-242, 2018. https://doi.org/10.1007/s10817-017-9445-1
- S. Prabakaran and R. Ramar, "Stateful firewall-enabled software-defined network with distributed controllers: A network performance study," International Journal of Communication Systems, vol. 32, p. e4237, 2019. https://doi.org/10.1002/dac.4237
- P. Cotret, G. Gogniat, and M. J. S. Florez, "Protection of heterogeneous architectures on FPGAs: An approach based on hardware firewalls," Microprocessors and Microsystems, vol. 42, pp. 127-141, 2016. https://doi.org/10.1016/j.micpro.2016.01.013
- T. Kurek, M. Niemiec, and A. Lason, "Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality," International Journal of Information Security, vol. 15, pp. 235-250, June 01 2016. https://doi.org/10.1007/s10207-015-0292-y
- N. Ammari, A. A. E. Mrabti, A. A. E. Kalam, and A. A. Ouahman, "Firewall Anti-Leak of Sensitive Data," Procedia Computer Science, vol. 83, pp. 1226-1231, 2016. https://doi.org/10.1016/j.procs.2016.04.256
- Y. Nomura and N. Salzetta, "Why firewalls need not exist," Physics Letters B, vol. 761, pp. 62-69, 2016. https://doi.org/10.1016/j.physletb.2016.08.003
- G. Hooft, "The Firewall Transformation for Black Holes and Some of Its Implications," Foundations of Physics, vol. 47, pp. 1503-1542, December 01 2017. https://doi.org/10.1007/s10701-017-0122-3
- M. Yeasmin, N. Akter, M. H. Kabir, J. Hossain, and K.-P. Shih, "Performance evaluation of multi-cloud compared to the single-cloud under varying firewall conditions," Cogent Engineering, vol. 5, 2018. https://doi.org/10.1080/23311916.2018.1442109
- R. Mohan, A. Yazidi, B. Feng, and J. Oommen, "On optimizing firewall performance in dynamic networks by invoking a novel swapping window-based paradigm," International Journal of Communication Systems, vol. 31, p. e3773, 2018. https://doi.org/10.1002/dac.3773
- P. Cotret, G. Gogniat, and M. J. Sepulveda Florez, "Protection of heterogeneous architectures on FPGAs: An approach based on hardware firewalls," Microprocessors and Microsystems, vol. 42, pp. 127-141, 2016. https://doi.org/10.1016/j.micpro.2016.01.013
- S. Prabakaran and R. Ramar, "Stateful firewall-enabled software-defined network with distributed controllers: A network performance study," International Journal of Communication Systems, vol. n/a, p. e4237. https://doi.org/10.1002/dac.4237
- A. Khoumsi, M. Erradi, and W. Krombi, "A formal basis for the design and analysis of firewall security policies," Journal of King Saud University - Computer and Information Sciences, vol. 30, pp. 51-66, 2018. https://doi.org/10.1016/j.jksuci.2016.11.008
- U. P. D. Ani, H. He, and A. Tiwari, "Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective," Journal of Cyber Security Technology, vol. 1, pp. 32-74, 2016. https://doi.org/10.1080/23742917.2016.1252211
- M. Dunn Cavelty and A. Wenger, "Cyber security meets security politics: Complex technology, fragmented politics, and networked science," Contemporary Security Policy, pp. 1-28, 2019.