[1]
A. A. Hassan and L. Hudec, “Management and Verification of Firewall and Router Access Lists”, Comput. Inform., vol. 23, no. 1, pp. 77–100, Feb. 2012.