Using security policies to automate placement of network intrusion prevention

  • Nirupama Talele
  • , Jason Teutsch
  • , Trent Jaeger
  • , Robert F. Erbacher

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fingerprint

Dive into the research topics of 'Using security policies to automate placement of network intrusion prevention'. Together they form a unique fingerprint.
Sort by

Keyphrases

Computer Science