Login / Signup
An Automated Validation Method for Security Policies: The Firewall Case.
Ryma Abassi
Sihem Guemara El Fatmi
Published in:
IAS (2008)
Keyphrases
</>
significant improvement
security policies
similarity measure
database
information systems
detection method
network security
feature selection
principal component analysis
data processing
access control