MUSES presented at the European Researchers’ Night 2014

UGR’s Paloma de las Cuevas presented MUSES to the general public during the Granada events for the European researcher’s night on September 26th. It was presented in a colloquial way, using non-technical terms. The “Bring Your Own Device” problem was described and how MUSES uses auto-adaptation to protect this kind of environment. The project was well received and many people felt interested in the problem that MUSES tries to solve and how MUSES works.

Have a look at Paloma’s presentation (in Spanish).

ResearchersNightGranada_MusesPresentationResearchersNightGranada_MusesPosterResearchersNightGranada_Leaflets
ResearchersNightGranada_attendanceAndMayor

SecDef workshop @ ACM-GECCO 2014

SecDef (July 2014)

S2’s Anna Esparcia chaired SecDef, the workshop on Genetic and Evolutionary Computation in Defense, Security and Risk Management held as part of the ACM Genetic and Evolutionary Computation (ACM-GECCO 2014) conference, where the paper “Enforcing Corporate Security Policies via Computational Intelligence” was presented by UGR’s JJ Merelo.

JJ Merelo presents MUSES at the SecDef workshop @ ACM-GECCO 2014

JJ Merelo presents MUSES at the SecDef workshop @ ACM-GECCO 2014

SEACON 2014 (May 2014)

SEACON 2014 (May 2014)

HITEC’s Natalia Mannov moderated OpenSpace Discussion on  “BYOD – Work Experience, Possible and Existing Solutions” at SEACON 2014 in Hamburg. A dynamic group of end users (company employees) and experts from the IT field discussed different views, opinions, experiences and desired future goals on BYOD culture in different companies. Discussion results were presented in the plenum.

TRECK (Trust, Reputation, Evidence and other Collaboration Know-how) track at ACM SAC 2014

TRECK (March 2014)

The goal of the ACM SAC2014 TRECK (Trust, Reputation, Evidence and other Collaboration Know-how) track was to review the set of applications that benefit from the use of computational trust and online reputation. For its 10th anniversary year the track, chaired by UNIGE’s JM Seigneur, had a special focus on Bring Your Own Device (BYOD) and corporate security, trust, risk and privacy.Two MUSES papers were presented:

  • MUSES: A corporate user-centric system which applies computational intelligence methods, presented by UGR’s Antonio Mora.
  • Case study: Legal Requirements for the Use of Social Login Features for Online Reputation Updates, presented by KUL’s Yung Shin Van der Sype.

1st MUSES paper accepted at a conference

First MUSES paper accepted at an International Conference: “A Survey of Trust and Risk Metrics for a BYOD Mobile Worker World”, J.-M. Seigneur, P. Kölndorfer, M. Busch and C. Hochleitner.

First MUSES paper accepted to an International Conference: “A Survey of Trust and Risk Metrics for a BYOD Mobile Worker World”, J.-M. Seigneur, P. Kölndorfer, M. Busch and C. Hochleitner, Proceedings of the Third International Conference on Social Eco-Informatics, Lisbon, Portugal, IARIA, 2013, and it can be found in our Muses R&D Section.