Login / Signup
Automated Implementation of Windows-related Security-Configuration Guides.
Patrick Stöckle
Bernd Grobauer
Alexander Pretschner
Published in:
CoRR (2022)
Keyphrases
</>
semi automated
data sets
databases
efficient implementation
intrusion detection
computer security
security threats
microsoft windows
information assurance