Using Hierarchical Change Mining to Manage Network Security Policy Evolution.
Gabriel A. WeaverNicholas J. FotiSergey BratusDaniel N. RockmoreSean W. SmithPublished in: Hot-ICE (2011)
Keyphrases
- security policies
- network management
- access control
- home network
- network access
- security management
- security architecture
- network security
- security measures
- peer to peer
- computer networks
- network structure
- distributed systems
- ubiquitous computing environments
- data mining
- unsupervised learning
- complex networks
- security requirements
- security concerns
- knowledge discovery