Cited By
View all- de las Cuevas Delgado PMerelo JGarcía Sánchez PEsparcia-Alcázar A(2015)Soft Computing Techniques Applied to Corporate and Personal SecurityProceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation10.1145/2739482.2768477(1193-1196)Online publication date: 11-Jul-2015
- Aldini ASeigneur JLafuente CTiti XGuislain J(2015)Formal Modeling and Verification of Opportunity-enabled Risk ManagementProceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 0110.1109/Trustcom.2015.434(676-684)Online publication date: 20-Aug-2015
- Mora ADe las Cuevas PMerelo JZamarripa SEsparcia-Alcázar AArnold D(2014)Enforcing corporate security policies via computational intelligence techniquesProceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation10.1145/2598394.2605438(1245-1252)Online publication date: 12-Jul-2014