↓ Skip to main content

Engineering Secure Software and Systems

Overview of attention for book
Attention for Chapter 2: Using Security Policies to Automate Placement of Network Intrusion Prevention
Altmetric Badge

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
7 Mendeley
citeulike
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Using Security Policies to Automate Placement of Network Intrusion Prevention
Chapter number 2
Book title
Engineering Secure Software and Systems
Published by
Springer, Berlin, Heidelberg, February 2013
DOI 10.1007/978-3-642-36563-8_2
Book ISBNs
978-3-64-236562-1, 978-3-64-236563-8
Authors

Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher, Talele, Nirupama, Teutsch, Jason, Jaeger, Trent, Erbacher, Robert F.

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 7 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 1 14%
Unknown 6 86%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 3 43%
Other 1 14%
Student > Master 1 14%
Researcher 1 14%
Professor > Associate Professor 1 14%
Other 0 0%
Readers by discipline Count As %
Computer Science 6 86%
Unknown 1 14%