{"id":"https://openalex.org/W2556507683","doi":"https://doi.org/10.1109/fuzz-ieee.2016.7737764","title":"Fuzzy reasoning based Windows Firewall for preventing denial of service attack","display_name":"Fuzzy reasoning based Windows Firewall for preventing denial of service attack","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2556507683","doi":"https://doi.org/10.1109/fuzz-ieee.2016.7737764","mag":"2556507683"},"language":"en","primary_location":{"id":"doi:10.1109/fuzz-ieee.2016.7737764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2016.7737764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089628794","display_name":"Nitin Naik","orcid":"https://orcid.org/0000-0002-0659-9646"},"institutions":[{"id":"https://openalex.org/I1340226911","display_name":"Defence Equipment and Support","ror":"https://ror.org/00jztws02","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I1340226911","https://openalex.org/I2802373619"]},{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Nitin Naik","raw_affiliation_strings":["Ministry of Defence, Defence School of Communications and Information Systems, UK"],"affiliations":[{"raw_affiliation_string":"Ministry of Defence, Defence School of Communications and Information Systems, UK","institution_ids":["https://openalex.org/I1340226911","https://openalex.org/I1306956679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064994129","display_name":"Paul Jenkins","orcid":"https://orcid.org/0000-0002-9854-9450"},"institutions":[{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]},{"id":"https://openalex.org/I1340226911","display_name":"Defence Equipment and Support","ror":"https://ror.org/00jztws02","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I1340226911","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Jenkins","raw_affiliation_strings":["Ministry of Defence, Defence School of Communications and Information Systems, UK"],"affiliations":[{"raw_affiliation_string":"Ministry of Defence, Defence School of Communications and Information Systems, UK","institution_ids":["https://openalex.org/I1340226911","https://openalex.org/I1306956679"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089628794"],"corresponding_institution_ids":["https://openalex.org/I1306956679","https://openalex.org/I1340226911"],"apc_list":null,"apc_paid":null,"fwci":5.2117,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.95820944,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"759","last_page":"766"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.8197905421257019},{"id":"https://openalex.org/keywords/application-firewall","display_name":"Application firewall","score":0.7616121172904968},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7207555770874023},{"id":"https://openalex.org/keywords/microsoft-windows","display_name":"Microsoft Windows","score":0.6170485019683838},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5516846179962158},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5488002896308899},{"id":"https://openalex.org/keywords/windows-vista","display_name":"Windows Vista","score":0.5280492901802063},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.5182268619537354},{"id":"https://openalex.org/keywords/network-access-protection","display_name":"Network Access Protection","score":0.4962311387062073},{"id":"https://openalex.org/keywords/context-based-access-control","display_name":"Context-based access control","score":0.4876926839351654},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.442082017660141},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.28269463777542114},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.10569721460342407}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.8197905421257019},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.7616121172904968},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7207555770874023},{"id":"https://openalex.org/C508378895","wikidata":"https://www.wikidata.org/wiki/Q1406","display_name":"Microsoft Windows","level":3,"score":0.6170485019683838},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5516846179962158},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5488002896308899},{"id":"https://openalex.org/C527868296","wikidata":"https://www.wikidata.org/wiki/Q11230","display_name":"Windows Vista","level":4,"score":0.5280492901802063},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.5182268619537354},{"id":"https://openalex.org/C113725186","wikidata":"https://www.wikidata.org/wiki/Q1186962","display_name":"Network Access Protection","level":2,"score":0.4962311387062073},{"id":"https://openalex.org/C42934231","wikidata":"https://www.wikidata.org/wiki/Q1128692","display_name":"Context-based access control","level":5,"score":0.4876926839351654},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.442082017660141},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28269463777542114},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.10569721460342407},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fuzz-ieee.2016.7737764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2016.7737764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W332844675","https://openalex.org/W1525003841","https://openalex.org/W1578037780","https://openalex.org/W1974030435","https://openalex.org/W1990999691","https://openalex.org/W1992176519","https://openalex.org/W1995077566","https://openalex.org/W2079325629","https://openalex.org/W2084896955","https://openalex.org/W2177837262","https://openalex.org/W2209736539","https://openalex.org/W2225783731","https://openalex.org/W2289429767","https://openalex.org/W2296443825","https://openalex.org/W2320951485","https://openalex.org/W2912565176","https://openalex.org/W4205373109","https://openalex.org/W4211007335","https://openalex.org/W4249749961","https://openalex.org/W4251212860","https://openalex.org/W4253889224"],"related_works":["https://openalex.org/W2361515550","https://openalex.org/W2495628081","https://openalex.org/W2583381754","https://openalex.org/W4310291187","https://openalex.org/W2144255176","https://openalex.org/W2592819086","https://openalex.org/W2891274976","https://openalex.org/W2393767664","https://openalex.org/W4240856555","https://openalex.org/W2046094884"],"abstract_inverted_index":{"Microsoft":[0,24],"Windows":[1,25,31,67,107,122,132,183],"operating":[2,12,26],"system":[3,13,27,180],"has":[4],"the":[5,11,40,161,175],"lion's":[6],"share":[7],"(approximately":[8],"70%),":[9],"of":[10,43,54,92,121,166,177,202,208,220],"(OS)":[14],"market.":[15],"A":[16],"firewall":[17,47],"is":[18,141],"a":[19,98,114],"native":[20,66,131,182],"security":[21,85,105,117],"utility":[22],"in":[23],"available":[28,100],"to":[29,76,157,181,215],"all":[30],"users":[32,36],"with":[33,70,109],"most":[34,163],"end":[35,103],"apply":[37],"it":[38,80,190],"as":[39,97],"first":[41],"line":[42],"digital":[44],"defence.":[45],"This":[46,124],"can":[48,211],"be":[49,82,113,213],"further":[50],"customised":[51],"for":[52,87,119,134],"filtering":[53],"network":[55],"traffic":[56],"based":[57],"on":[58],"user-defined":[59],"inbound":[60],"and":[61,89,101,136,155,159,171,188],"outbound":[62],"rules.":[63],"However,":[64],"this":[65,145,209],"Firewall":[68,108,133,184],"comes":[69],"only":[71],"rudimentary":[72],"functionality.":[73],"Therefore,":[74],"akin":[75],"many":[77],"other":[78,218],"firewalls,":[79,196],"cannot":[81],"an":[83,127],"effective":[84],"tool":[86,118],"monitoring":[88,135],"preventing":[90,137],"denial":[91],"service":[93],"(DoS)":[94],"attack.":[95],"Nonetheless,":[96],"freely":[99],"conventional":[102],"user":[104],"tool,":[106],"some":[110,194,217],"enhancement":[111],"may":[112],"very":[115],"useful":[116],"millions":[120],"users.":[123],"paper":[125],"presents":[126],"intuitive":[128],"fuzzy":[129,148,178],"reasoning-based":[130],"DoS":[138,167,170,204,221],"attacks,":[139],"which":[140,197],"named":[142],"FR-WinFirewall.":[143],"For":[144],"FR-WinFirewall,":[146],"two":[147,162],"reasoning":[149,179],"components":[150],"are":[151,198],"successfully":[152],"designed,":[153],"implemented":[154],"tested":[156],"monitor":[158],"prevent":[160,216],"severe":[164],"types":[165,219],"attacks":[168],"ICMP":[169],"UDP":[172],"DoS.":[173],"Thus,":[174],"addition":[176],"enhances":[185],"its":[186],"functionality":[187],"make":[189],"relatively":[191],"better":[192],"than":[193],"popular":[195],"still":[199],"not":[200],"capable":[201],"handling":[203],"attacks.":[205,222],"The":[206],"use":[207],"FR-WinFirewall":[210],"also":[212],"extended":[214]},"counts_by_year":[{"year":2023,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
