Login / Signup
Comparing and debugging firewall rule tables.
Liang Lu
Reihaneh Safavi-Naini
Jeffrey Horton
Willy Susilo
Published in:
IET Inf. Secur. (2007)
Keyphrases
</>
database
databases
network security
association rules
intrusion detection
data sets
genetic algorithm
data mining
machine learning
website
evolutionary algorithm
xml documents
active databases
rule discovery