![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
SafeConfig 2011: Arlington, VA, USA
- John Banghart, Ehab Al-Shaer, Tony Sager, HariGovind V. Ramasamy:
4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011. IEEE 2011 - William M. Fitzgerald, Simon N. Foley
:
Reasoning about the Security Configuration of SAN Switch Fabrics. - Simon N. Foley
, William M. Fitzgerald, Wayne Mac Adams:
Federated Autonomic Network Access Control. - Michael B. Crouse, Errin W. Fulp:
A moving target environment for computer configurations using Genetic Algorithms. - Xin Sun, Jinliang Wei, Sanjay G. Rao, Geoffrey G. Xie:
A software toolkit for visualizing enterprise routing design. - Mohammad Ashiqur Rahman, Ehab Al-Shaer:
AMIAnalyzer: Security analysis of AMI configurations. - Yousra Javed, Maliha Nazir, Muhammad Murtaza Khan
, Syed Ali Khayam, Shujun Li
:
Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis. - Saeed Al-Haj, Ehab Al-Shaer:
CloudChecker: An imperative framework for cloud configuration management. - Ehab Al-Shaer, Mohammed Noraden Alsaleh:
ConfigChecker: A tool for comprehensive security configuration analytics. - Fida Gillani, Umar Kalim, Noman Latif, Syed Ali Khayam:
Decision Theoretic Approach to Detect Anomalies beyond Enterprise Boundaries. - Saeed Al-Haj, Ehab Al-Shaer:
Measuring Firewall Security. - Ludi Akue, Emmanuel Lavinal, Michelle Sibilla:
A Dynamic Configuration Validation Language. - Hicham El Khoury
, Romain Laborde, François Barrère, Abdelmalek Benzekri, Maroun Chamoun:
A Generic Data Flow Security Model. - Mohammed Noraden Alsaleh, Ehab Al-Shaer:
SCAP Based Configuration Analytics for Comprehensive Compliance Checking. - Krishna Kant, Meixing Le, Sushil Jajodia
:
Security Considerations in Data Center Configuration Management. - Eugen Leontie, Gedare Bloom, Rahul Simha:
Automation for Creating and Configuring Security Manifests for Hardware Containers. - Said Marouf, Mohamed Shehab
:
SEGrapher: Visualization-based SELinux Policy Analysis. - Sanjai Narain, Sharad Malik
, Ehab Al-Shaer:
Towards Eliminating Configuration Errors in Cyber Infrastructure. - Rick Kuhn:
Vulnerability Hierarchies in Access Control Configurations.
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.