Login / Signup

Soft Computing Techniques Applied to Corporate and Personal Security.

Paloma de las Cuevas DelgadoJuan Julián Merelo GuervósPablo García-Sánchez
Published in: GECCO (Companion) (2015)
Keyphrases
  • intrusion detection
  • information security
  • case study
  • security policies
  • information retrieval
  • genetic algorithm
  • access control
  • network security
  • key management
  • security problems