Login / Signup
Rigorous automated network security management.
Joshua D. Guttman
Amy L. Herzog
Published in:
Int. J. Inf. Sec. (2005)
Keyphrases
</>
security management
security measures
security policies
multi tier
network management
computer networks
web services
wireless sensor networks
peer to peer
mobile phone
data processing
wireless networks
resource allocation