usenix conference policies
You are here
Home ยป Using Hierarchical Change Mining to Manage Network Security Policy Evolution
Using Hierarchical Change Mining to Manage Network Security Policy Evolution
Abstract:
BibTeX
@inproceedings {266982,
author = {Gabriel A. Weaver and Nick Foti and Sergey Bratus and Dan Rockmore and Sean W. Smith},
title = {Using Hierarchical Change Mining to Manage Network Security Policy Evolution},
booktitle = {Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE 11)},
year = {2011},
address = {Boston, MA},
url = {https://www.usenix.org/conference/hot-ice11/using-hierarchical-change-mining-manage-network-security-policy-evolution},
publisher = {USENIX Association},
month = mar
}
author = {Gabriel A. Weaver and Nick Foti and Sergey Bratus and Dan Rockmore and Sean W. Smith},
title = {Using Hierarchical Change Mining to Manage Network Security Policy Evolution},
booktitle = {Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE 11)},
year = {2011},
address = {Boston, MA},
url = {https://www.usenix.org/conference/hot-ice11/using-hierarchical-change-mining-manage-network-security-policy-evolution},
publisher = {USENIX Association},
month = mar
}
connect with us