AUTOMATED SECURITY FUNCTIONS

被引:0
|
作者
DAVENPORT, DL
机构
[1] GULF STATES UTIL,ST FRANCISVILLE,LA 70775
[2] PROSYS CONSULTANTS,BATON ROUGE,LA 70811
关键词
D O I
暂无
中图分类号
TL [原子能技术]; O571 [原子核物理学];
学科分类号
0827 ; 082701 ;
摘要
引用
收藏
页码:46 / 47
页数:2
相关论文
共 50 条
  • [1] Towards a fully automated and optimized network security functions orchestration
    Bringhenti, Daniele
    Marchetto, Guido
    Sisto, Riccardo
    Valenza, Fulvio
    Yusupov, Jalolliddin
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND SECURITY (ICCCS), 2019,
  • [2] SECURITY AND THE AUTOMATED OFFICE
    不详
    COMPUTER DECISIONS, 1984, 16 (02): : 64 - 64
  • [3] Automated design of security protocols
    Chen, H
    Clark, JA
    Jacob, JL
    CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS, 2003, : 2181 - 2188
  • [4] PROMOTING SECURITY IN AUTOMATED RECORDS
    TURGEON, E
    DEMPSTER, D
    FARRELL, R
    BECRAFT, W
    COLLEGE AND UNIVERSITY, 1980, 55 (04): : 386 - 387
  • [5] Automated Composition of Security Protocols
    Bela, Genge
    Ignat, Iosif
    Piroska, Haller
    2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 251 - +
  • [6] Automated Classification of Security Requirements
    Jindal, Rajni
    Malhotra, Ruchika
    Jain, Abha
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 2027 - 2033
  • [7] An automated security response robot
    Ciccimaro, DA
    Everett, HR
    Gilbreath, GA
    Tran, TT
    MOBILE ROBOTS XIII AND INTELLIGENT TRANSPORTATION SYSTEMS, 1998, 3525 : 50 - 61
  • [8] Automated Security Configuration Management
    Ehab Al-Shaer
    Charles R. Kalmanek
    Felix Wu
    Journal of Network and Systems Management, 2008, 16 : 231 - 233
  • [9] Security of connected and automated vehicles
    Chowdhury, Mashrur
    Islam, Mhafuzul
    Khan, Zadid
    Bridge, 2019, 49 (03) : 46 - 56
  • [10] Automated design of security protocols
    Hao, C
    Clark, JA
    Jacob, JL
    COMPUTATIONAL INTELLIGENCE, 2004, 20 (03) : 503 - 516