Research Article

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Figure 6

Example of generated report by the validation process.