Login / Signup

Inconsistency Analysis of Time-Based Security Policy and Firewall Policy.

Yi YinYuichiro TateiwaYun WangYoshiaki KatayamaNaohisa Takahashi
Published in: ICFEM (2017)
Keyphrases
  • security policies
  • network security
  • intrusion detection
  • data analysis
  • data mining
  • end users
  • access control policies