Phil Kernick

According to our database1, Phil Kernick authored at least 8 papers between 2015 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
ForestFirewalls: Getting Firewall Configuration Right in Critical Networks (Technical Report).
CoRR, 2019

2016
Case Studies of SCADA Firewall Configurations and the Implications for Best Practices.
IEEE Trans. Netw. Serv. Manag., 2016

The Mathematical Foundations for Mapping Policies to Network Devices (Technical Report).
CoRR, 2016

Verifiable Policy-defined Networking for Security Management.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

The Mathematical Foundations for Mapping Policies to Network Devices.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Malachite: Firewall policy comparison.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
Towards Standardising Firewall Reporting.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015


  Loading...