Using security policies to automate placement of network intrusion prevention
- Nirupama Talele
- , Jason Teutsch
- , Trent Jaeger
- , Robert F. Erbacher
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7
Link opens in a new tab
Scopus
citations