Applying soft computing techniques to corporate mobile security systems
Going a Step Beyond the Black and White Lists for URL Accesses in the Enterprise by means of Categorical Classifiers
21 enero2013 a trust evaluation framework in distributed networks
Muses open access week hackathon