{"id":"https://openalex.org/W2137827272","doi":"https://doi.org/10.1109/iscc.2013.6755066","title":"Optical stateful security filtering approach based on code words","display_name":"Optical stateful security filtering approach based on code words","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2137827272","doi":"https://doi.org/10.1109/iscc.2013.6755066","mag":"2137827272"},"language":"en","primary_location":{"id":"doi:10.1109/iscc.2013.6755066","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2013.6755066","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030780989","display_name":"Maha Sliti","orcid":"https://orcid.org/0000-0002-8296-6284"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Maha Sliti","raw_affiliation_strings":["Communication Networks and Security Research Lab., University of Carthage, Tunisia","Commun. Networks & Security Res. Lab., Univ. of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Communication Networks and Security Research Lab., University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Commun. Networks & Security Res. Lab., Univ. of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113487171","display_name":"Noureddine Boudriga","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Noureddine Boudriga","raw_affiliation_strings":["Communication Networks and Security Research Lab., University of Carthage, Tunisia","Commun. Networks & Security Res. Lab., Univ. of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Communication Networks and Security Research Lab., University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Commun. Networks & Security Res. Lab., Univ. of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030780989"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":0.4729,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.71021758,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"1","issue":null,"first_page":"000916","last_page":"000921"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10232","display_name":"Optical Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10232","display_name":"Optical Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10847","display_name":"Advanced Optical Network Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10767","display_name":"Advanced Photonic Communication Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.9538789987564087},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.782233715057373},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.7710086107254028},{"id":"https://openalex.org/keywords/stateless-protocol","display_name":"Stateless protocol","score":0.6307411193847656},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.5811638236045837},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5442867279052734},{"id":"https://openalex.org/keywords/application-firewall","display_name":"Application firewall","score":0.45113545656204224},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.41835296154022217},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.1968357264995575},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17835229635238647},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.1611993908882141}],"concepts":[{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.9538789987564087},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.782233715057373},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.7710086107254028},{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.6307411193847656},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.5811638236045837},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5442867279052734},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.45113545656204224},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.41835296154022217},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.1968357264995575},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17835229635238647},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.1611993908882141},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc.2013.6755066","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2013.6755066","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W126115153","https://openalex.org/W2050920809","https://openalex.org/W2117254270","https://openalex.org/W2118004310","https://openalex.org/W2119072567","https://openalex.org/W2119139316","https://openalex.org/W2129847414","https://openalex.org/W2139498175","https://openalex.org/W2372866357","https://openalex.org/W6708905208"],"related_works":["https://openalex.org/W2009238965","https://openalex.org/W2361515550","https://openalex.org/W2916429898","https://openalex.org/W8359669","https://openalex.org/W2057573940","https://openalex.org/W4363647490","https://openalex.org/W2347324149","https://openalex.org/W2495628081","https://openalex.org/W2583381754","https://openalex.org/W40377838"],"abstract_inverted_index":{"In":[0,48],"this":[1],"paper,":[2],"we":[3],"propose":[4],"a":[5,28,33,53,86,154,157],"stateful":[6,141,155],"optical":[7,20,60,80,93,107,142],"filtering":[8,17,89,143,159],"approach":[9,112],"that":[10],"allows":[11,139],"session":[12,73],"establishment":[13,74],"and":[14,101,149,156],"traffic":[15,23,77,99,132],"flow":[16,24,61,133],"in":[18,45,66,126,145],"the":[19,46,49,59,72,76,106,127,136,140,146],"layer.":[21],"Each":[22],"is":[25,56,83,113,122],"identified":[26],"by":[27,85],"unique":[29],"identifier":[30,65],"composed":[31],"of":[32,35,41,88],"set":[34,87],"code":[36],"words":[37],"built":[38],"on":[39,63,97,105,115],"values":[40],"appropriately":[42],"selected":[43],"fields":[44],"stream.":[47],"firewall":[50,147],"core":[51],"node,":[52,129],"security":[54,81],"policy":[55,82],"applied":[57],"to":[58,68],"based":[62,96,104,114],"its":[64],"order":[67],"accept":[69],"or":[70,75],"reject":[71],"data.":[78],"The":[79,110,119],"formed":[84],"rules":[90],"which":[91,130],"filters":[92],"data":[94],"units":[95],"their":[98],"identifiers":[100],"implemented":[102,144],"optically":[103],"logic":[108],"gates.":[109],"proposed":[111],"two":[116,152],"main":[117],"components.":[118],"first":[120],"component":[121,138],"an":[123],"encoder":[124],"used":[125],"edge":[128],"generates":[131],"identifiers.":[134],"And,":[135],"second":[137],"node":[148],"divided":[150],"into":[151],"modules:":[153],"stateless":[158],"modules.":[160]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
