Login / Signup
Soft Computing Techniques Applied to Corporate and Personal Security.
Paloma de las Cuevas Delgado
Juan Julián Merelo Guervós
Pablo García-Sánchez
Published in:
GECCO (Companion) (2015)
Keyphrases
</>
intrusion detection
information security
case study
security policies
information retrieval
genetic algorithm
access control
network security
key management
security problems