1 |
K. J. Houle & G. M. Weaver, 'Trends in Denial of Service Attack Technology,' CERT/CC, 2001
|
2 |
M. L. Hutcheson, Software Testing Fundamentals: Methods and Metrics (Wiley & Sons, 2003)
|
3 |
M. R. Lyu & L. K. Y. Lau, 'Firewall Security: Policies, Testing and Performance Evaluation,' proc.of Computer Software and Applications Conference: COMSAC2000, 2000, 116-121
DOI
|
4 |
www.infis.univ.trieste.it/~lcars/ftest
|
5 |
S. Northcutt, and et. al., Inside Network Perimeter Security (USA: New Riders Publishing, 2003)
|
6 |
B. McCarty, Red hat Linux Firewlls(Indianapolis, IN: Wiley Publishing, 2003)
|
7 |
www.0kr.net/files/iptables-tutorial.html
|
8 |
Y. H. Cho, S. Navab, & W. H. Mangione-Smith, 'Specialized Hardware for Deep network Packet Filtering,' LNCS2438, 2002, 452-461
|
9 |
J. Wack, 'Firewall Testing and Rating,' Proc.of NATIONAL INFORMATION SYSTEMS SECURITY CONFERENCE, 1996
|
10 |
E. E. Schultz, 'When Firewalls Fail: Lessons Learned From Firewall Testing,' NETWORK SECURITY, 1997, 8-11
DOI
ScienceOn
|
11 |
E. E. Schultz, 'How to Perform Effective Firewall Testing,' COMPUTER SECURITY JOURNAL, 12(1), 1996, 47-54
|
12 |
B. Potter & G. McGraw, 'Sooftware Security Testing,' IEEE SECURITY AND PRIVACY MAGAZINE, 2(5), 2004, 81-85
DOI
ScienceOn
|