Login / Signup
Automated Implementation of Windows-related Security-Configuration Guides.
Patrick Stöckle
Bernd Grobauer
Alexander Pretschner
Published in:
ASE (2020)
Keyphrases
</>
closely related
information security
efficient implementation
information assurance
access control
intrusion detection
fully automated
statistical databases
security issues
semi automated
real time
social networks
information systems
database systems
hardware implementation
security model