Author of the publication

Enforcing corporate security policies via computational intelligence techniques.

, , , , and . GECCO (Companion), page 1245-1252. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Statistical Approach to Dealing with Noisy Fitness in Evolutionary Algorithms., , , , , , , and . IJCCI (Selected Papers), volume 620 of Studies in Computational Intelligence, page 79-95. Springer, (2014)A Performance Assessment of Evolutionary Algorithms in Volunteer Computing Environments: The Importance of Entropy., , , and . EvoApplications (1), volume 10199 of Lecture Notes in Computer Science, page 806-821. (2017)Applying computational intelligence methods for predicting the sales of newly published books in a real editorial business management environment., , , , , , , and . Knowl. Based Syst., (2017)Developing services in a service oriented architecture for evolutionary algorithms., , , , , , , , and . GECCO (Companion), page 1341-1348. ACM, (2013)Adapting evolutionary algorithms to the concurrent functional language Erlang., , , and . GECCO (Companion), page 1723-1724. ACM, (2013)Going a Step Beyond the Black and White Lists for URL Accesses in the Enterprise by Means of Categorical Classifiers., , and . IJCCI (ECTA), page 125-134. SciTePress, (2014)NodIO: A Framework and Architecture for Pool-based Evolutionary Computation., , , , and . GECCO (Companion), page 1323-1330. ACM, (2016)Automatic Rule Extraction from Access Rules Using Genetic Programming., , , , and . EvoApplications, volume 12104 of Lecture Notes in Computer Science, page 54-69. Springer, (2020)NodIO, a JavaScript framework for volunteer-based evolutionary algorithms : first results., , , , , and . CoRR, (2016)MUSES: a corporate user-centric system which applies computational intelligence methods., , , , , , , , and . SAC, page 1719-1723. ACM, (2014)