Login / Signup
Enforcing corporate security policies via computational intelligence techniques.
Antonio Miguel Mora
Paloma de las Cuevas
Juan Julián Merelo Guervós
Sergio Zamarripa
Anna Isabel Esparcia-Alcázar
Published in:
GECCO (Companion) (2014)
Keyphrases
</>
security policies
access control
computational intelligence
security management
network security
security concerns
security requirements
distributed systems
access control systems
knowledge management
case study
model based testing
cyber attacks
access control policies
home network
multilevel secure
real world