Sign in

Automated Implementation of Windows-related Security-Configuration Guides.

Patrick StöckleBernd GrobauerAlexander Pretschner
Published in: CoRR (2022)
Keyphrases
  • semi automated
  • data sets
  • databases
  • efficient implementation
  • intrusion detection
  • computer security
  • security threats
  • microsoft windows
  • information assurance