Using security policies to automate placement of network intrusion prevention

Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Fingerprint

Dive into the research topics of 'Using security policies to automate placement of network intrusion prevention'. Together they form a unique fingerprint.

Keyphrases

Computer Science