Soft Computing Techniques Applied to Corporate and Personal Security

@inproceedings{Cuevas2015SoftCT,
  title={Soft Computing Techniques Applied to Corporate and Personal Security},
  author={Paloma de las Cuevas and Juan Juli{\'a}n Merelo Guerv{\'o}s and Pablo Garc{\'i}a-S{\'a}nchez},
  booktitle={GECCO},
  year={2015}
}
Inside a "Bring Your Own Device" environment, the employees can freely use their devices. This allows them mix their personal and work life, but at the same time, if the users are not aware of a risky situation, or that situation is not covered by a company security policy or rule, this environment can become very insecure. The aim of this paper is defining… CONTINUE READING