Login / Signup
Securing Networks Using Situation-Based Firewall Policy Computations.
Vijender Kumar Solanki
Kumar Pal Singh
M. Venkatesan
Sudhanshu Raghuwanshi
Published in:
ICACNI (2013)
Keyphrases
</>
data sets
social networks
network security
intrusion detection
optimal policy
network analysis
real time
network structure
network size
security risks
network topologies
telecommunication networks
network design
long run
computer networks
information security
network traffic
neural network