{"id":"https://openalex.org/W2055091983","doi":"https://doi.org/10.1145/2598394.2605438","title":"Enforcing corporate security policies via computational intelligence techniques","display_name":"Enforcing corporate security policies via computational intelligence techniques","publication_year":2014,"publication_date":"2014-07-11","ids":{"openalex":"https://openalex.org/W2055091983","doi":"https://doi.org/10.1145/2598394.2605438","mag":"2055091983"},"language":"en","primary_location":{"id":"doi:10.1145/2598394.2605438","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2598394.2605438","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067599928","display_name":"Antonio M. Mora","orcid":"https://orcid.org/0000-0003-1603-9105"},"institutions":[{"id":"https://openalex.org/I173304897","display_name":"Universidad de Granada","ror":"https://ror.org/04njjy449","country_code":"ES","type":"education","lineage":["https://openalex.org/I173304897"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Antonio M. Mora","raw_affiliation_strings":["University of Granada, Granada, Spain","University of Granada. Granada, Spain"],"affiliations":[{"raw_affiliation_string":"University of Granada, Granada, Spain","institution_ids":["https://openalex.org/I173304897"]},{"raw_affiliation_string":"University of Granada. Granada, Spain","institution_ids":["https://openalex.org/I173304897"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047664057","display_name":"Paloma de las Cuevas","orcid":"https://orcid.org/0000-0002-5599-3981"},"institutions":[{"id":"https://openalex.org/I173304897","display_name":"Universidad de Granada","ror":"https://ror.org/04njjy449","country_code":"ES","type":"education","lineage":["https://openalex.org/I173304897"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Paloma De las Cuevas","raw_affiliation_strings":["University of Granada, Granada, Spain","University of Granada. Granada, Spain"],"affiliations":[{"raw_affiliation_string":"University of Granada, Granada, Spain","institution_ids":["https://openalex.org/I173304897"]},{"raw_affiliation_string":"University of Granada. Granada, Spain","institution_ids":["https://openalex.org/I173304897"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063930069","display_name":"J. J. Merelo","orcid":"https://orcid.org/0000-0002-1385-9741"},"institutions":[{"id":"https://openalex.org/I173304897","display_name":"Universidad de Granada","ror":"https://ror.org/04njjy449","country_code":"ES","type":"education","lineage":["https://openalex.org/I173304897"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Juan Juli\u00e1n Merelo","raw_affiliation_strings":["University of Granada, Granada, Spain","University of Granada. Granada, Spain"],"affiliations":[{"raw_affiliation_string":"University of Granada, Granada, Spain","institution_ids":["https://openalex.org/I173304897"]},{"raw_affiliation_string":"University of Granada. Granada, Spain","institution_ids":["https://openalex.org/I173304897"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005052680","display_name":"Sergio Zamarripa","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164798","display_name":"S2 Grupo (Spain)","ror":"https://ror.org/05bvt3s14","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210164798"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Sergio Zamarripa","raw_affiliation_strings":["S2 Grupo, Valencia, Spain"],"affiliations":[{"raw_affiliation_string":"S2 Grupo, Valencia, Spain","institution_ids":["https://openalex.org/I4210164798"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026427534","display_name":"Anna I. Esparcia-Alc\u00e1zar","orcid":"https://orcid.org/0000-0002-3855-4039"},"institutions":[{"id":"https://openalex.org/I4210164798","display_name":"S2 Grupo (Spain)","ror":"https://ror.org/05bvt3s14","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210164798"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Anna I. Esparcia-Alc\u00e1zar","raw_affiliation_strings":["S2 Grupo, Valencia, Spain"],"affiliations":[{"raw_affiliation_string":"S2 Grupo, Valencia, Spain","institution_ids":["https://openalex.org/I4210164798"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5067599928"],"corresponding_institution_ids":["https://openalex.org/I173304897"],"apc_list":null,"apc_paid":null,"fwci":1.5778,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.87978652,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1245","last_page":"1252"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7761263847351074},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5335745215415955},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4998633861541748},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4913698732852936},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47534629702568054},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4397132992744446},{"id":"https://openalex.org/keywords/corporate-security","display_name":"Corporate security","score":0.4367510676383972},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.41311225295066833},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.35006850957870483},{"id":"https://openalex.org/keywords/corporate-governance","display_name":"Corporate governance","score":0.21273359656333923},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13574770092964172},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.0808592438697815}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7761263847351074},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5335745215415955},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4998633861541748},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4913698732852936},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47534629702568054},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4397132992744446},{"id":"https://openalex.org/C179681481","wikidata":"https://www.wikidata.org/wiki/Q5172490","display_name":"Corporate security","level":3,"score":0.4367510676383972},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.41311225295066833},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.35006850957870483},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.21273359656333923},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13574770092964172},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0808592438697815},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2598394.2605438","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2598394.2605438","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W18724527","https://openalex.org/W117363321","https://openalex.org/W1059665266","https://openalex.org/W1501614105","https://openalex.org/W1506806321","https://openalex.org/W1559956479","https://openalex.org/W1576818901","https://openalex.org/W1578929691","https://openalex.org/W1602619638","https://openalex.org/W1608350059","https://openalex.org/W1639032689","https://openalex.org/W1663973292","https://openalex.org/W1875879016","https://openalex.org/W1941659294","https://openalex.org/W1971963941","https://openalex.org/W1978422941","https://openalex.org/W1987751268","https://openalex.org/W1990844260","https://openalex.org/W1992419399","https://openalex.org/W2005459083","https://openalex.org/W2009086942","https://openalex.org/W2010902645","https://openalex.org/W2057855875","https://openalex.org/W2081707439","https://openalex.org/W2100594342","https://openalex.org/W2100907527","https://openalex.org/W2102248717","https://openalex.org/W2108450732","https://openalex.org/W2110006972","https://openalex.org/W2110893883","https://openalex.org/W2120099700","https://openalex.org/W2127218421","https://openalex.org/W2128010017","https://openalex.org/W2132853611","https://openalex.org/W2134321101","https://openalex.org/W2143122640","https://openalex.org/W2145052282","https://openalex.org/W2149197369","https://openalex.org/W2154331329","https://openalex.org/W2161487483","https://openalex.org/W2167066346","https://openalex.org/W2170689836","https://openalex.org/W2292966887","https://openalex.org/W2299467264","https://openalex.org/W2471609379","https://openalex.org/W2478464102","https://openalex.org/W2503947264","https://openalex.org/W2616627863","https://openalex.org/W2997683334","https://openalex.org/W2998216295","https://openalex.org/W2999549716","https://openalex.org/W3214373139","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2188814192","https://openalex.org/W2114705216","https://openalex.org/W3094039898","https://openalex.org/W2151761340","https://openalex.org/W1555133226","https://openalex.org/W2173238669","https://openalex.org/W1519114293","https://openalex.org/W2130339907","https://openalex.org/W2188404590","https://openalex.org/W2049966995"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"an":[3],"approach,":[4],"based":[5],"in":[6,9,21,108,125],"a":[7,25,61],"project":[8],"development,":[10],"which":[11],"combines":[12],"Data":[13],"Mining,":[14],"Machine":[15],"Learning":[16],"and":[17,27,66,78,128],"Computational":[18],"Intelligence":[19],"techniques,":[20,73],"order":[22],"to":[23,40,55,87,94],"create":[24],"user-centric":[26],"adaptable":[28],"corporate":[29,56],"security":[30,109],"system.":[31],"Thus,":[32],"the":[33,42,51,68,71,74,80,102,106,122,132],"system,":[34],"named":[35],"MUSES,":[36],"will":[37,84],"be":[38,85],"able":[39],"analyse":[41],"user's":[43,97],"behaviour":[44],"(modelled":[45],"as":[46],"events)":[47],"when":[48],"interacting":[49],"with":[50,89,131],"company's":[52],"server,":[53],"accessing":[54],"assets,":[57],"for":[58],"instance.":[59],"As":[60],"result":[62],"of":[63,70,105,114,117],"this":[64,126],"analysis,":[65],"after":[67],"application":[69],"aforementioned":[72],"Corporate":[75,81],"Security":[76,82],"Policies,":[77],"specifically,":[79],"Rules":[83],"adapted":[86],"deal":[88],"new":[90],"anomalous":[91],"situations,":[92],"or":[93],"better":[95],"manage":[96],"behaviour.":[98],"The":[99],"work":[100],"reviews":[101],"current":[103],"state":[104],"art":[107],"issues":[110],"resolution":[111],"by":[112],"means":[113],"these":[115],"kind":[116],"methods.":[118],"Then":[119],"it":[120],"describes":[121],"MUSES":[123],"features":[124],"respect":[127],"compares":[129],"them":[130],"existing":[133],"approaches.":[134]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
