Login / Signup

Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention.

Khalid AlsubhiIssam AibJérôme FrançoisRaouf Boutaba
Published in: ICC (2009)
Keyphrases
  • machine learning
  • intrusion detection and prevention
  • configuration management
  • intrusion detection
  • network management
  • access control
  • social networks
  • decision making
  • information security
  • version control