Login / Signup

Comparing and debugging firewall rule tables.

Liang LuReihaneh Safavi-NainiJeffrey HortonWilly Susilo
Published in: IET Inf. Secur. (2007)
Keyphrases
  • database
  • databases
  • network security
  • association rules
  • intrusion detection
  • data sets
  • genetic algorithm
  • data mining
  • machine learning
  • website
  • evolutionary algorithm
  • xml documents
  • active databases
  • rule discovery