{"id":"https://openalex.org/W2045999085","doi":"https://doi.org/10.1145/2379690.2379691","title":"Visual analysis of complex firewall configurations","display_name":"Visual analysis of complex firewall configurations","publication_year":2012,"publication_date":"2012-10-04","ids":{"openalex":"https://openalex.org/W2045999085","doi":"https://doi.org/10.1145/2379690.2379691","mag":"2045999085"},"language":"en","primary_location":{"id":"doi:10.1145/2379690.2379691","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2379690.2379691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Ninth International Symposium on Visualization for Cyber Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076733321","display_name":"Florian Mansmann","orcid":null},"institutions":[{"id":"https://openalex.org/I189712700","display_name":"University of Konstanz","ror":"https://ror.org/0546hnb39","country_code":"DE","type":"education","lineage":["https://openalex.org/I189712700"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Florian Mansmann","raw_affiliation_strings":["University of Konstanz"],"affiliations":[{"raw_affiliation_string":"University of Konstanz","institution_ids":["https://openalex.org/I189712700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032754429","display_name":"Timo G\u00f6bel","orcid":null},"institutions":[{"id":"https://openalex.org/I189712700","display_name":"University of Konstanz","ror":"https://ror.org/0546hnb39","country_code":"DE","type":"education","lineage":["https://openalex.org/I189712700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Timo G\u00f6bel","raw_affiliation_strings":["University of Konstanz"],"affiliations":[{"raw_affiliation_string":"University of Konstanz","institution_ids":["https://openalex.org/I189712700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077882939","display_name":"William Cheswick","orcid":null},"institutions":[{"id":"https://openalex.org/I189712700","display_name":"University of Konstanz","ror":"https://ror.org/0546hnb39","country_code":"DE","type":"education","lineage":["https://openalex.org/I189712700"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"William Cheswick","raw_affiliation_strings":["University of Konstanz"],"affiliations":[{"raw_affiliation_string":"University of Konstanz","institution_ids":["https://openalex.org/I189712700"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076733321"],"corresponding_institution_ids":["https://openalex.org/I189712700"],"apc_list":null,"apc_paid":null,"fwci":4.7186,"has_fulltext":false,"cited_by_count":49,"citation_normalized_percentile":{"value":0.95561072,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12720","display_name":"Multimedia Communication and Technology","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6850166320800781},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.6689697504043579},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.06549379229545593}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6850166320800781},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.6689697504043579},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.06549379229545593},{"id":"https://openalex.org/C2776401274","wikidata":"https://www.wikidata.org/wiki/Q3756855","display_name":"Accretion (finance)","level":2,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2379690.2379691","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2379690.2379691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Ninth International Symposium on Visualization for Cyber Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320326505","display_name":"Universit\u00e4t Konstanz","ror":"https://ror.org/0546hnb39"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1502519295","https://openalex.org/W1591593704","https://openalex.org/W1678529581","https://openalex.org/W1790126211","https://openalex.org/W1865994522","https://openalex.org/W2000089542","https://openalex.org/W2059942088","https://openalex.org/W2063329049","https://openalex.org/W2069798399","https://openalex.org/W2083896568","https://openalex.org/W2097257601","https://openalex.org/W2121065592","https://openalex.org/W2129322903","https://openalex.org/W2132068130","https://openalex.org/W2134056613","https://openalex.org/W2144006900","https://openalex.org/W2144615061","https://openalex.org/W2165741325","https://openalex.org/W2538676480","https://openalex.org/W2911522264","https://openalex.org/W3141164029"],"related_works":["https://openalex.org/W2367805574","https://openalex.org/W3202286939","https://openalex.org/W2371597722","https://openalex.org/W2990243758","https://openalex.org/W2206869121","https://openalex.org/W2615133144","https://openalex.org/W2888391618","https://openalex.org/W3037718519","https://openalex.org/W2374289167","https://openalex.org/W2464166007"],"abstract_inverted_index":{"Firewalls":[0],"have":[1],"become":[2],"essential":[3],"components":[4,134,142],"in":[5,22,77,93],"the":[6,23,37,78,90,157,174],"security":[7],"concept":[8],"of":[9,32,97,109,160,176],"almost":[10],"any":[11],"modern":[12],"computer":[13],"network.":[14,79],"Due":[15],"to":[16,60,74,88,122,146],"their":[17,25,123],"relevance":[18],"and":[19,34,102,130,137,150,179,184],"central":[20],"location":[21],"network,":[24],"programming":[26],"logic":[27,38],"often":[28],"survives":[29],"several":[30],"generations":[31],"administrators":[33],"hardware.":[35],"Understanding":[36],"behind":[39],"a":[40,51,58,85,110,126,161],"firewall":[41,99,162,189],"configuration":[42,128],"is":[43,57],"thus":[44],"an":[45],"important":[46],"but":[47],"challenging":[48],"task":[49,96],"for":[50,135],"network":[52,91],"administrator.":[53],"In":[54,80],"general,":[55],"there":[56],"tendency":[59],"add":[61],"new":[62],"rules":[63,66,117,136],"while":[64],"old":[65],"are":[67,143],"only":[68],"rarely":[69],"changed":[70],"or":[71,118],"removed":[72],"due":[73],"unexpected":[75],"consequences":[76],"this":[81,94],"paper":[82],"we":[83,168],"present":[84,169],"visualization":[86],"tool":[87,107],"support":[89],"administrator":[92],"complex":[95,158],"understanding":[98,156],"rule":[100,177],"sets":[101],"object":[103,119,138,182],"group":[104],"definitions.":[105],"The":[106],"consists":[108],"hierarchical":[111],"sunburst":[112],"visualization,":[113],"which":[114],"logically":[115],"groups":[116,120,183],"according":[121],"common":[124],"characteristics,":[125],"color-linked":[127],"editor":[129],"classical":[131],"tree":[132],"view":[133],"groups.":[139],"All":[140],"these":[141],"interactively":[144],"linked":[145],"enable":[147],"both":[148],"exploratory":[149],"hypotheses":[151],"testing":[152],"tasks":[153],"aimed":[154],"at":[155],"functionality":[159],"configuration.":[163],"To":[164],"verify":[165],"our":[166],"design,":[167],"two":[170],"case":[171],"studies":[172],"on":[173,180],"analysis":[175],"usage":[178],"nested":[181],"collected":[185],"feedback":[186],"from":[187],"five":[188],"administrators.":[190]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":6}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
