{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:27Z","timestamp":1750306647321,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,12]],"date-time":"2014-07-12T00:00:00Z","timestamp":1405123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,12]]},"DOI":"10.1145\/2598394.2605438","type":"proceedings-article","created":{"date-parts":[[2014,7,11]],"date-time":"2014-07-11T12:10:42Z","timestamp":1405080642000},"page":"1245-1252","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Enforcing corporate security policies via computational intelligence techniques"],"prefix":"10.1145","author":[{"given":"Antonio M.","family":"Mora","sequence":"first","affiliation":[{"name":"University of Granada, Granada, Spain"}]},{"given":"Paloma","family":"De las Cuevas","sequence":"additional","affiliation":[{"name":"University of Granada, Granada, Spain"}]},{"given":"Juan Juli\u00e1n","family":"Merelo","sequence":"additional","affiliation":[{"name":"University of Granada, Granada, Spain"}]},{"given":"Sergio","family":"Zamarripa","sequence":"additional","affiliation":[{"name":"S2 Grupo, Valencia, Spain"}]},{"given":"Anna I.","family":"Esparcia-Alc\u00e1zar","sequence":"additional","affiliation":[{"name":"S2 Grupo, Valencia, Spain"}]}],"member":"320","published-online":{"date-parts":[[2014,7,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.516"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71805-5_19"},{"volume-title":"James P. Anderson Co.","year":"1980","author":"Anderson A. J. P.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","first-page":"133","volume-title":"Information Security Management Handbook","author":"Bacik S.","year":"2013"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/229867"},{"volume-title":"Pattern recognition and Machine Learning","year":"2006","author":"Bishop C.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017470.2017477"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654988.1654996"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654988.1654991"},{"volume-title":"In Proceedings of the 17th National Computer Security Conference","year":"1994","author":"Frank J.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/534133"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654988.1655002"},{"issue":"3","key":"e_1_3_2_1_13_1","first-page":"233","article-title":"Genetic algorithms in intrusion detection systems: A survey","volume":"5","author":"Gowher Majeed P.","year":"2014","journal-title":"International Journal of Innovation and Applied Studies"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456377.1456383"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944968"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-006-0059-1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2002-6504"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456377.1456380"},{"key":"e_1_3_2_1_21_1","first-page":"145","volume-title":"Conference on Cyber Conflict","author":"Kirta T.","year":"2010"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456377.1456395"},{"volume-title":"Genetic Programming: On the programming of computers by means of natural selection","year":"1992","author":"Koza J. R.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/02635570110365989"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517322"},{"key":"e_1_3_2_1_26_1","first-page":"1792","volume-title":"Evolutionary Computation, 2008. CEC 2008. (IEEE World Congress on Computational Intelligence). IEEE Congress on","author":"Lim Y. T.","year":"2008"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1389095.1389395"},{"volume-title":"Evaluating and strengthening enterprise network security using attack graphs. Project report ia-2","year":"2005","author":"Lippmann R.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","first-page":"2165","volume-title":"Proceedings of the 2003 Congress on Evolutionary Computation","author":"Lu W.","year":"2003"},{"key":"e_1_3_2_1_30_1","first-page":"14","volume-title":"Proceedings of the fifth Berkeley symposium on mathematical statistics and probability","volume":"1","author":"MacQueen J."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2555059"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046699"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.292"},{"volume-title":"MobiSec Session on Smartphone Security","year":"2011","author":"Orthacker C.","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208111"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866423.1866433"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2008.06.011"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-0-387-72367-9_12","volume-title":"New Approaches for Security, Privacy and Trust in Complex Environments","author":"Siponen M.","year":"2007"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1592943"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"G.\n      Suarez-Tangil E.\n      Palomar J.\n      Fuentes J.\n      Blasco and \n      A.\n      Ribagorda\n  . \n  Automatic rule generation based on genetic programming for event correlation. In l\n  . Herrero P. Gastaldo R. Zunino and E. Corchado editors Computational Intelligence in Security for Information Systems volume \n  63\n   of \n  Advances in Intelligent and Soft Computing pages \n  127\n  --\n  134\n  . \n  Springer Berlin Heidelberg 2009\n  .  G. Suarez-Tangil E. Palomar J. Fuentes J. Blasco and A. Ribagorda. Automatic rule generation based on genetic programming for event correlation. In l. Herrero P. Gastaldo R. Zunino and E. Corchado editors Computational Intelligence in Security for Information Systems volume 63 of Advances in Intelligent and Soft Computing pages 127--134. Springer Berlin Heidelberg 2009.","DOI":"10.1007\/978-3-642-04091-7_16"},{"volume-title":"International Journal of Cyber-Security and Digital Forensics (IJCSDF), 1(1)","year":"2012","author":"Tamjidyamcholo A.","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","first-page":"325","volume-title":"Advances in artificial intelligence for privacy protection and security","author":"Zarza L.","year":"2010"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.83"},{"key":"e_1_3_2_1_44_1","first-page":"316","volume-title":"Design of cryptographic protocols by means of genetic algorithms techniques","author":"Zarza L.","year":"2006"}],"event":{"name":"GECCO '14: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Vancouver BC Canada","acronym":"GECCO '14"},"container-title":["Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2598394.2605438","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2598394.2605438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:06Z","timestamp":1750229766000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2598394.2605438"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,12]]},"references-count":44,"alternative-id":["10.1145\/2598394.2605438","10.1145\/2598394"],"URL":"https:\/\/doi.org\/10.1145\/2598394.2605438","relation":{},"subject":[],"published":{"date-parts":[[2014,7,12]]},"assertion":[{"value":"2014-07-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}