Research Article

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Figure 3

The validation process.