The departure of an employee who had access to keys to your business premises can pose significant security risks. Whether the separation was voluntary or involuntary, it’s essential to take proactive steps to safeguard your business and prevent unauthorized access.
K. Yang, и Z. Zhang. Proceedings of the 1998 Artificial Intelligence Planning Systems (AIPS) Conference Workshop on Knowledge Engineering and Acquisition for Planning: Bridging Theory and Practice, (1998)
R. Walker. Proceedings of the Genetic and Evolutionary
Computation Conference, 2, стр. 1750--1755. Orlando, Florida, USA, Morgan Kaufmann, (13-17 July 1999)
H. Drucker, B. Shahrary, и D. Gibbon. ICML '01: Proceedings of the Eighteenth International Conference on Machine Learning, стр. 122--129. San Francisco, CA, USA, Morgan Kaufmann Publishers Inc., (2001)