Automated Security Configuration Management.
Ehab Al-ShaerCharles R. KalmanekFelix WuPublished in: J. Netw. Syst. Manag. (2008)
Keyphrases
- configuration management
- network management
- version control
- security issues
- information security
- security policies
- access control
- intrusion detection
- semi automated
- computer security
- security mechanisms
- fully automated
- security level
- human operators
- network security
- statistical databases
- security threats
- artificial intelligence
- cooperative
- reinforcement learning
- data processing
- security requirements
- security analysis
- data mining