Login / Signup
Enabling automated threat response through the use of a dynamic security policy.
Hervé Debar
Yohann Thomas
Frédéric Cuppens
Nora Cuppens-Boulahia
Published in:
J. Comput. Virol. (2007)
Keyphrases
</>
security policies
access control
security management
security concerns
network security
network management
security requirements
distributed systems
context sensitive
information systems
machine learning
databases
database
user interface
database systems
access control policies
security architecture