{"id":"https://openalex.org/W3174053110","doi":"https://doi.org/10.1007/s10207-021-00557-4","title":"Optimization of parallel firewalls filtering rules","display_name":"Optimization of parallel firewalls filtering rules","publication_year":2021,"publication_date":"2021-06-21","ids":{"openalex":"https://openalex.org/W3174053110","doi":"https://doi.org/10.1007/s10207-021-00557-4","mag":"3174053110"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-021-00557-4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-021-00557-4","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014687233","display_name":"Taha Elamine Hadjadj","orcid":"https://orcid.org/0000-0001-6868-4881"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Taha Elamine Hadjadj","raw_affiliation_strings":["Digital Security Research Lab, Higher School of Communication of Tunis (Sup\u2019Com), University of Carthage Tunisia, Carthage, Tunisia","Digital Security Research Lab, Higher School of Communication of Tunis (Sup'Com), University of Carthage Tunisia, Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Digital Security Research Lab, Higher School of Communication of Tunis (Sup\u2019Com), University of Carthage Tunisia, Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Digital Security Research Lab, Higher School of Communication of Tunis (Sup'Com), University of Carthage Tunisia, Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075259756","display_name":"Adel Bouhoula","orcid":"https://orcid.org/0000-0003-2920-2338"},"institutions":[{"id":"https://openalex.org/I53218197","display_name":"Arabian Gulf University","ror":"https://ror.org/04gd4wn47","country_code":"BH","type":"education","lineage":["https://openalex.org/I53218197"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Adel Bouhoula","raw_affiliation_strings":["Department of Next-Generation Computing, College of Graduate Studies Arabian Gulf University, Manama, Kingdom of Bahrain"],"affiliations":[{"raw_affiliation_string":"Department of Next-Generation Computing, College of Graduate Studies Arabian Gulf University, Manama, Kingdom of Bahrain","institution_ids":["https://openalex.org/I53218197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071944111","display_name":"Rim Tebourbi","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Rim Tebourbi","raw_affiliation_strings":["Digital Security Research Lab, Higher School of Communication of Tunis (Sup\u2019Com), University of Carthage Tunisia, Carthage, Tunisia","Digital Security Research Lab, Higher School of Communication of Tunis (Sup'Com), University of Carthage Tunisia, Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Digital Security Research Lab, Higher School of Communication of Tunis (Sup\u2019Com), University of Carthage Tunisia, Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Digital Security Research Lab, Higher School of Communication of Tunis (Sup'Com), University of Carthage Tunisia, Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006211488","display_name":"Riadh Ksantini","orcid":"https://orcid.org/0000-0001-8143-1600"},"institutions":[{"id":"https://openalex.org/I106663880","display_name":"University of Bahrain","ror":"https://ror.org/0317ekv86","country_code":"BH","type":"education","lineage":["https://openalex.org/I106663880"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Riadh Ksantini","raw_affiliation_strings":["Department of Computer Science , College of Information Technology, University of Bahrain, Sakhir, Kingdom of Bahrain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science , College of Information Technology, University of Bahrain, Sakhir, Kingdom of Bahrain","institution_ids":["https://openalex.org/I106663880"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014687233"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":null,"fwci":0.7044,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66250578,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"21","issue":"2","first_page":"323","last_page":"340"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.9324201345443726},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.8766885995864868},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8704545497894287},{"id":"https://openalex.org/keywords/application-firewall","display_name":"Application firewall","score":0.8233505487442017},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6523590683937073},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6457275152206421},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5918278098106384},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5391618609428406},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5234757661819458},{"id":"https://openalex.org/keywords/context-based-access-control","display_name":"Context-based access control","score":0.43621087074279785},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.43091264367103577},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4293569326400757},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.42358773946762085},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30623483657836914},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17741146683692932}],"concepts":[{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.9324201345443726},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.8766885995864868},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8704545497894287},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.8233505487442017},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6523590683937073},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6457275152206421},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5918278098106384},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5391618609428406},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5234757661819458},{"id":"https://openalex.org/C42934231","wikidata":"https://www.wikidata.org/wiki/Q1128692","display_name":"Context-based access control","level":5,"score":0.43621087074279785},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.43091264367103577},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4293569326400757},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.42358773946762085},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30623483657836914},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17741146683692932},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-021-00557-4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-021-00557-4","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W46972015","https://openalex.org/W1499323133","https://openalex.org/W1850405760","https://openalex.org/W1999723039","https://openalex.org/W2023835507","https://openalex.org/W2034114460","https://openalex.org/W2050487400","https://openalex.org/W2104909067","https://openalex.org/W2106393787","https://openalex.org/W2119267636","https://openalex.org/W2119825210","https://openalex.org/W2141110377","https://openalex.org/W2148408186","https://openalex.org/W2150740451","https://openalex.org/W2170704207","https://openalex.org/W2769007064","https://openalex.org/W2884096875","https://openalex.org/W2886042450","https://openalex.org/W2900083505","https://openalex.org/W2990965385","https://openalex.org/W3048181937","https://openalex.org/W3135821462","https://openalex.org/W4256485853","https://openalex.org/W6601876108","https://openalex.org/W6995650542"],"related_works":["https://openalex.org/W2361515550","https://openalex.org/W2495628081","https://openalex.org/W2583381754","https://openalex.org/W4363647490","https://openalex.org/W2158110327","https://openalex.org/W2916429898","https://openalex.org/W2082371893","https://openalex.org/W2347324149","https://openalex.org/W2057573940","https://openalex.org/W2399718053"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
