Login / Signup
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention.
Khalid Alsubhi
Issam Aib
Jérôme François
Raouf Boutaba
Published in:
ICC (2009)
Keyphrases
</>
machine learning
intrusion detection and prevention
configuration management
intrusion detection
network management
access control
social networks
decision making
information security
version control