Iterative approaches to data authorization
摘要:
Embodiments described herein relate generally to network-based threat detection mechanisms. Specifically, embodiments described herein describe a communication mechanism that filters (e.g., allows or blocks) received communications according to an iterative security list.
公开/授权文献
信息查询
0/0