usenix conference policies
You are here
Home » Using Hierarchical Change Mining to Manage Network Security Policy Evolution
Using Hierarchical Change Mining to Manage Network Security Policy Evolution
Website Maintenance Alert
Due to scheduled maintenance, the USENIX website may not be available on Monday, March 17, from 10:00 am–6:00 pm Pacific Daylight Time (UTC -7). We apologize for the inconvenience and thank you for your patience.
If you would like to register for NSDI '25, SREcon25 Americas, or PEPR '25, please complete your registration before or after this time period.
Abstract:
BibTeX
@inproceedings {266982,
author = {Gabriel A. Weaver and Nick Foti and Sergey Bratus and Dan Rockmore and Sean W. Smith},
title = {Using Hierarchical Change Mining to Manage Network Security Policy Evolution},
booktitle = {Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE 11)},
year = {2011},
address = {Boston, MA},
url = {https://www.usenix.org/conference/hot-ice11/using-hierarchical-change-mining-manage-network-security-policy-evolution},
publisher = {USENIX Association},
month = mar
}
author = {Gabriel A. Weaver and Nick Foti and Sergey Bratus and Dan Rockmore and Sean W. Smith},
title = {Using Hierarchical Change Mining to Manage Network Security Policy Evolution},
booktitle = {Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE 11)},
year = {2011},
address = {Boston, MA},
url = {https://www.usenix.org/conference/hot-ice11/using-hierarchical-change-mining-manage-network-security-policy-evolution},
publisher = {USENIX Association},
month = mar
}
connect with us