Login / Signup

Generating Policies for Defense in Depth.

Paul RubelMichael IhdeSteven A. HarpCharles N. Payne
Published in: ACSAC (2005)
Keyphrases
  • network security
  • optimal policy
  • intrusion detection
  • databases
  • information systems
  • automatically generating
  • revenue management
  • management policies