Login / Signup
Detecting and Resolving Firewall Policy Anomalies.
Hongxin Hu
Gail-Joon Ahn
Ketan Kulkarni
Published in:
IEEE Trans. Dependable Secur. Comput. (2012)
Keyphrases
</>
detecting anomalies
anomaly detection
network security
intrusion detection
network traffic
intrusion detection system
optimal policy
markov decision process
management system
root cause
misuse detection
database
detect anomalies
unsupervised learning
artificial intelligence
data sets
real time