USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Using Hierarchical Change Mining to Manage Network Security Policy Evolution
Submitted by Anonymous (not verified) on February 8, 2021 - 10:10 pm
Title | Using Hierarchical Change Mining to Manage Network Security Policy Evolution |
Publication Type | Conference Paper |
Year of Publication | 2011 |
Authors | Weaver GA, Foti N, Bratus S, Rockmore D, Smith SW |
Conference Name | Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE 11) |
Date Published | 03/2011 |
Publisher | USENIX Association |
Conference Location | Boston, MA |
URL | https://www.usenix.org/conference/hot-ice11/using-hierarchical-change-mining-manage-network-security-policy-evolution |
- DBLP
- Log in or Register to post comments
- Google Scholar
- BibTeX