Login / Signup
Inconsistency Analysis of Time-Based Security Policy and Firewall Policy.
Yi Yin
Yuichiro Tateiwa
Yun Wang
Yoshiaki Katayama
Naohisa Takahashi
Published in:
ICFEM (2017)
Keyphrases
</>
security policies
network security
intrusion detection
data analysis
data mining
end users
access control policies