The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2013
DOI: 10.1007/978-3-642-36563-8_2
|View full text |Cite
|
Sign up to set email alerts
|

Using Security Policies to Automate Placement of Network Intrusion Prevention

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(13 citation statements)
references
References 18 publications
0
13
0
Order By: Relevance
“…The recent work by Talele et al [26,25] addresses a similar problem: that of finding a minimal set of IDS placements that will obtain a given graph property. Their work, however, requires knowledge of information flows which we do not consider.…”
Section: Related Workmentioning
confidence: 99%
“…The recent work by Talele et al [26,25] addresses a similar problem: that of finding a minimal set of IDS placements that will obtain a given graph property. Their work, however, requires knowledge of information flows which we do not consider.…”
Section: Related Workmentioning
confidence: 99%
“…The mediator placement problem aims to resolve all information flow errors, as defined in an information flow model, such as the one below (adopted from Talele et al [37]). …”
Section: Mediator Placement Problemmentioning
confidence: 99%
“…In practice, input nodes form a small fraction of the number of nodes in a host's data-flow graph. Second, we compute the paths after the host graphs are summarized, which already eliminated spurious paths [37].…”
Section: Corresponding Info Flow Errors: If Node U1 ∈ V1mentioning
confidence: 99%
See 2 more Smart Citations