Open Access
MATEC Web of Conferences
Volume 150, 2018
Malaysia Technical Universities Conference on Engineering and Technology (MUCET 2017)
Article Number 06001
Number of page(s) 6
Section Information & Communication Technology (ICT), Science (SCI) & Mathematics (SM)
Published online 23 February 2018
  1. Gont, T., Liu W. (2014). Security Implications of IPv6 on IPv4 Networks. Technical Report: Internet Engineering Task Force (IETF). ISSN: 2070-1721. [Google Scholar]
  2. Benelbahri, M.A., & Bouhoula, A. (2007). Tuple based approach for anomalies detection within firewall filtering rules. Paper presented at the 12th IEEE Symposium on Computers and Communications (ISCC), 2007. [Google Scholar]
  3. Abbes, T., A.Bouhoula, & Rusinowitch, M. (2008). An inference system for detecting firewall filtering rules anomalies. Paper presented at the Proceedings of the 2008 ACM Symposium on Applied Computing. [Google Scholar]
  4. Benelbahri, M. A., Bouhoula, A., & Trabelsi, Z. (2007). XML based open tool for anomalies detection in firewall filtering rules. Paper presented at the 4th International Conference on Innovations in Information Technology (IIT), 2007. [Google Scholar]
  5. Wang, Y.-G., Ge, Y.-m., & Yang, J.-X. (2008, 1214 Dec. 2008). Research on packet filter rules of the firewall based on visual prolog. Paper presented at the International Conference on Computer Science and Software Engineering, 2008. [Google Scholar]
  6. Jack, W. (2009). Review: Firestarter firewall for Linux. Retrieved May 12, 2012, from [Google Scholar]
  7. Tomas, J. (2004). Firestarter manual. Retrieved October 4, 2012, from [Google Scholar]
  8. Kurland, V. (2010). What’s new in Firewall Builder 3.0. Linux J., 2010(189), 4. [Google Scholar]
  9. NetCitadel. (2012). Firewall Builder. from [Google Scholar]
  10. Timme, F., & Schmalfeld, C. (2011). Installing Apache2 with PHP5 and MySQL support on Ubuntu 11.10 (LAMP). Retrieved October 22 2012, from [Google Scholar]
  11. Taib, M. A., Ali, W. N. A. W. & Shaari, N. S. (2013). “ICMPv6 Vulnerability: The Importance of Threat Model and SF-ICMP6”, International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 5(2), 78-100, AprilJune 2013. [CrossRef] [Google Scholar]
  12. Ali, W. N. A. W., Taib, A. H. M., Hussin, N. M., & Othman, J. (2012). IPv6 attack scenarios testbed. Paper presented at the IEEE Symposium on Humanities, Science and Engineering Research (SHUSER), 2012. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.