Login / Signup
Mining policies from enterprise network configuration.
Theophilus Benson
Aditya Akella
David A. Maltz
Published in:
Internet Measurement Conference (2009)
Keyphrases
</>
network configuration
data mining
knowledge discovery
information systems
neural network
web services
association rules
response time
decision support system
linear programming
attack graph