|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 809 occurrences of 533 keywords
|
|
|
Results
Found 1957 publication records. Showing 1955 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
35 | Bruce A. Philp, Brian J. Garner |
Knowledge Mediation in Software Quality Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Software Engineering Conference ![In: 13th Australian Software Engineering Conference (ASWEC 2001), 26-28 August 2001, Canberra, Australia, pp. 153-159, 2001, IEEE Computer Society, 0-7695-1254-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Knowledge mediated concurrent audit, XP, software development process, software risk |
35 | Christoph C. Michael, Anup K. Ghosh |
Two State-based Approaches to Program-based Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 21-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
state-based approaches, program-based anomaly detection, intrusion detection algorithms, execution audit data, statistical deviation monitoring, finite state machines, finite-state machine, security of data, software performance evaluation, experimental results, auditing, n-grams, algorithm performance |
32 | Junliang Zhang, Dingyi Fang, Li Liu |
Intelligent Content Filtering Model for Network Security Audit System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 546-548, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Túlio Cicero Salvaro de Souza, Jean Everson Martina, Ricardo Felipe Custódio |
Audit and backup procedures for hardware security modules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 89-97, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PKI ceremony, embedded cryptographic hardware, hardware security module, key life-cycle, key management, public key infrastructure |
32 | Chen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin, William Cheng-Chung Chu |
A Portable Interceptor Mechanism on SOAP for Continuous Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 13th Asia-Pacific Software Engineering Conference (APSEC 2006), 6-8 December 2006, Bangalore, India, pp. 95-104, 2006, IEEE Computer Society, 0-7695-2685-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Fei Yu 0001, Yue Shen, Huang Huang, Cheng Xu 0001, Xia-peng Dai |
An Information Audit System Based on Bayes Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb Workshops ![In: Advanced Web and Network Technologies, and Applications, APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China, January 16-18, 2006, Proceedings, pp. 869-876, 2006, Springer, 3-540-31158-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Fei Yu 0001, Huang Huang, Cheng Xu 0001, Xiao-peng Dai, Miaoliang Zhu |
Badness Information Audit Based on Image Character Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 647-656, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Konstantina Kabouraki, Stefanos Gritzalis, Konstantinos Moulinos |
Towards a Privacy Audit Programmes Comparison Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV ![In: Electronic Government: Third International Conference, EGOV 2004, Zaragoza, Spain, August 30 - September 3, 2004, Proceedings, pp. 328-331, 2004, Springer, 3-540-22916-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 |
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 63-75, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Intrusion detection, Network security, Data visualization, Multivariate data analysis |
32 | Gerald Quirchmayr, Beate List, A Min Tjoa |
Analyzing Workflow Audit Trails in Web-Based Environments with Fuzzy Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: Electronic Commerce and Web Technologies, Second International Conference, EC-Web 2001 Munich, Germany, September 4-6, 2001, Proceedings, pp. 315-325, 2001, Springer, 3-540-42517-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Joachim Biskup, Ulrich Flegel |
On Pseudonymization of Audit Data for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Design Issues in Anonymity and Unobservability ![In: Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, pp. 161-180, 2000, Springer, 3-540-41724-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
32 | Rajendra P. Srivastava, Hai Lu |
Structural Analysis of Audit Evidence using Belief Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, USA, 1999, IEEE Computer Society, 0-7695-0001-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Cu D. Nguyen, Alessandro Marchetto 0001, Paolo Tonella |
Test Case Prioritization for Audit Testing of Evolving Web Services Using Information Retrieval Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2011, Washington, DC, USA, July 4-9, 2011, pp. 636-643, 2011, IEEE Computer Society, 978-1-4577-0842-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Webservice composition, audit testing, test case prioritization |
29 | David Huemer, A Min Tjoa |
A Stepwise Approach Towards an Interoperable and Flexible Logging Principle for Audit Trails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 114-119, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
XML, grid computing, cloud computing, logging, audit trail |
29 | Haiming Zheng, Tieqiao Guo |
Relative Accuracy Test Audit Evaluation for Flue Gas Continuous Emission Monitoring Systems in Power Plant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIIA (1) ![In: PACIIA 2008, Volume 1, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 19-20 December 2008, Wuhan, China, pp. 939-943, 2008, IEEE Computer Society, 978-0-7695-3490-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Continuous Emissions Monitoring Systems (CEMS), Relative Accuracy Test Audit (RATA) |
29 | Limin Jia 0001, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, Steve Zdancewic |
AURA: a programming language for authorization and audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFP ![In: Proceeding of the 13th ACM SIGPLAN international conference on Functional programming, ICFP 2008, Victoria, BC, Canada, September 20-28, 2008, pp. 27-38, 2008, ACM, 978-1-59593-919-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, type systems, audit, authorization logic |
29 | Bruce Schneier, John Kelsey |
Secure Audit Logs to Support Computer Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(2), pp. 159-176, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
authenthication, intrusion detection, auditing, computer forensics, hash chains, audit logs |
29 | Paul Helman, Gunar E. Liepins |
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 19(9), pp. 886-901, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
audit trail analysis, computer misuse, computer transactions, stationary stochastic processes, misuse detectors, detection accuracy, transaction attributes, statistical foundations, modeling, transaction processing, NP-hard, security of data, stochastic processes, auditing, density estimation, system security, computer crime, heuristic approach |
28 | Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs |
Proofs of Retrievability via Hardness Amplification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 109-127, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Amir Jerbi, Ethan Hadar, Carrie Gates, Dmitry Grebenev |
An access control reference architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008, pp. 17-24, 2008, ACM, 978-1-60558-300-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
architecture centric evolution, security, access control, reference architecture |
28 | Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos |
Super-Efficient Verification of Dynamic Outsourced Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 407-424, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Adam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram |
Privacy and Utility in Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pp. 279-294, 2007, IEEE Computer Society, 0-7695-2819-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Di Ma |
Secure Feedback Service in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 116-128, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Feedback Service, ACK aggregation, ACK implosion, Sensor network, Authentication, MAC, Bloom Filter |
28 | Byung kwan Lee, Seung Hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim |
PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 38-47, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Michael Bauland, Philippe Chapdelaine, Nadia Creignou, Miki Hermann, Heribert Vollmer |
An Algebraic Approach to the Complexity of Generalized Conjunctive Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAT (Selected Papers ![In: Theory and Applications of Satisfiability Testing, 7th International Conference, SAT 2004, Vancouver, BC, Canada, May 10-13, 2004, Revised Selected Papers, pp. 30-45, 2004, Springer, 3-540-27829-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Gaurav Tandon, Debasis Mitra 0003, Philip K. Chan |
Motif-Oriented Representation of Sequences for a Host-Based Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Innovations in Applied Artificial Intelligence, 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2004, Ottawa, Canada, May 17-20, 2004. Proceedings, pp. 605-615, 2004, Springer, 3-540-22007-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Gregory L. Orgill, Gordon W. Romney, Michael G. Bailey, Paul M. Orgill |
The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 177-181, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
user education, access control, social engineering, physical security |
28 | Yogesh Deshpande, Anupama Chandrarathna, Athula Ginige |
Web site auditing: first step towards re-engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEKE ![In: Proceedings of the 14th international conference on Software engineering and knowledge engineering, SEKE 2002, Ischia, Italy, July 15-19, 2002, pp. 731-737, 2002, ACM, 1-58113-556-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
web site auditing, web site evaluation, web site reengineering, web site, web development |
28 | William Shapiro, Radek Vingralek |
How to Manage Persistent State in DRM Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers, pp. 176-191, 2001, Springer, 3-540-43677-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Wenke Lee, Salvatore J. Stolfo |
A framework for constructing features and models for intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 3(4), pp. 227-261, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
data mining, intrusion detection, feature construction |
28 | Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson |
Dynamic Multi-threshold Metering Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings, pp. 130-143, 2000, Springer, 3-540-42069-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Metering Schemes, Security, Cryptography, Entropy |
27 | He Li, Zhengjie Sun, Feiqi Huang |
The Impact of Audit Office Cybersecurity Experience on Nonbreach Client's Audit Fees and Cybersecurity Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Syst. ![In: J. Inf. Syst. 38(1), pp. 177-206, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
27 | William Finch, William K. Gray, Louisa Hermans, Andrew Boasman, Tim W. R. Briggs, Andrew Dickinson |
Comparing reported management of ureteric stones between clinical audit and administrative datasets: An opportunity to streamline clinical audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Medical Informatics ![In: Int. J. Medical Informatics 180, pp. 105271, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Anisa Putri Pertiwi, Fransisca Hanita Rusgowanto |
The Effects of Company Size, Solvency, Public Accounting Firm Size, and Debt Default on Going Concern Audit Opinions with Financial Conditions Serving as a Moderator Variable: The Effects of Company Size, Solvency, Public Accounting Firm Size, and Debt Default on Going Concern Audit Opinions with Financial Conditions Serving as a Moderator Variable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEME ![In: Proceedings of the 14th International Conference on E-business, Management and Economics, ICEME 2023, Beijing, China, July 21-23, 2023, pp. 461-467, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Nobushige Doi, Yusuke Nobuta, Takeshi Mizuno |
Topic Classification of Key Audit Matters in Japanese Audit Reports by Zero-shot Text Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIAI-AAI ![In: 14th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2023, Koriyama, Japan, July 8-13, 2023, pp. 540-545, 2023, IEEE, 979-8-3503-2422-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Benjamin Awuah, Joseph Mensah Onumah, King Carl Tornam Duho |
Determinants of adoption of computer-assisted audit tools and techniques among internal audit units in Ghana. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. J. Inf. Syst. Dev. Ctries. ![In: Electron. J. Inf. Syst. Dev. Ctries. 88(2), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Ibrahim Emair Albawwat |
Tacit knowledge sharing in small audit firms and audit quality inputs: the antecedent effect of auditors' social capital. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Knowl. Manag. ![In: J. Knowl. Manag. 26(9), pp. 2333-2353, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Annie L. Witte, Christine E. Earley, Jay C. Thibodeau |
Big Fish, Small Pond: How In-Charge Auditors Engage with Technology-Based Audit Tools to Influence the Audit in Non-Global Network Firms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Syst. ![In: J. Inf. Syst. 36(2), pp. 141-160, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Gisela Gilberta, Rindang Widuri, Faris Kasenda |
Factors Affecting the Implementation of Remote Audit in the Audit Process in the COVID-19 Pandemic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEEG ![In: ICEEG 2022: 6th International Conference on E-Commerce, E-Business and E-Government, Plymouth, United Kingdom, April 27 - 29, 2022, pp. 345-351, 2022, ACM, 978-1-4503-9652-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Meiryani Meiryani, Nadia Aliffia, Andreas, Rindang Widuri, Dianka Wahyuningtias, Silvia Dewiyanti |
Analysis of The Influence of Audit Opinions, Change of Management, Public Accounting Firm Size, Size of Client Companies and Audit Fees on Auditor Switching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSIE ![In: MSIE 2022: 4th International Conference on Management Science and Industrial Engineering, Chiang Mai Thailand, April 28 - 30, 2022, pp. 71-79, 2022, ACM, 978-1-4503-9581-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Bambang Leo Handoko, Firda Arfianti, Sherly Marlinda |
The Utilization of Blockchain Technology on Remote Audit to Ensure Audit Data Integrity in Detecting Potential Fraudulent Financial Reporting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEB ![In: 6th International Conference on Software and e-Business, ICSEB 2022, Shenzhen, China, December 9-11, 2022., pp. 104-112, 2022, ACM. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Chengai Li, Lin Pan, Meilan Chen |
The Overseas Experience of Audit Committee and Audit Fees: Empirical Evidence from China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex. ![In: Complex. 2021, pp. 5454418:1-5454418:16, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Bong Gu Huh, Sunhwa Lee, Wonsin Kim |
The impact of the input level of information system audit on the audit quality: Korean evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Account. Inf. Syst. ![In: Int. J. Account. Inf. Syst. 43, pp. 100533, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Meiryani Meiryani, Klara Karlita Rianty, Zaidi Mat Daud, Tommy Andrian, Ilham Condro Prabowo |
The Effect of Audit Service Market Concentration and Power Market of Public Accountant Office on Audit Fee. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBT ![In: ICEBT 2021: 5th International Conference on E-Education, E-Business and E-Technology, Beijing, China, June 18 - 20, 2021, pp. 99-105, 2021, ACM, 978-1-4503-8960-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Eu-Gene Siew, Khairina Rosli, Paul H. P. Yeow |
Organizational and environmental influences in the adoption of computer-assisted audit tools and techniques (CAATTs) by audit firms in Malaysia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Account. Inf. Syst. ![In: Int. J. Account. Inf. Syst. 36, pp. 100445, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Santy Setiawan, Barnabas Tridig S, Yuliana Gunawan, Deta Sekar Sari |
The Effect of Information Technology Audit on the Audit Quality in Detecting Fraud Using the Competence of the Auditor as a Moderation Variable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIBE ![In: ICIBE 2020: The 6th International Conference on Industrial and Business Engineering, Macau, SAR, China, September, 2020, pp. 141-145, 2020, ACM, 978-1-4503-8788-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Saeed Askary, Jean-Paul M. Arnaout, Naser Abughazaleh |
Audit evidences and modelling audit risk using goal programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Appl. Decis. Sci. ![In: Int. J. Appl. Decis. Sci. 11(1), pp. 18-35, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Md. Shariful Islam, Jaeung Lee 0003 |
Internal Audit Function (IAF)'s Competencies and Cybersecurity Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS ![In: 24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018, 2018, Association for Information Systems, 978-0-9966831-6-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
27 | Johannes Langhein, Oliver Thomas |
Audit Cloud Adoption by German Audit Firms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the International Conference on Information Systems - Bridging the Internet of People, Data, and Things, ICIS 2018, San Francisco, CA, USA, December 13-16, 2018, 2018, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
27 | Dyah Paramita Budi Dharma, Puspa Indahati Sandhyaduhita, Ave Adriana Pinem, Achmad Nizar Hidayanto |
Antecedents of intention-to-use of e-audit system: a case of the Audit Board of the Republic of Indonesia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Bus. Inf. Syst. ![In: Int. J. Bus. Inf. Syst. 26(2), pp. 185-204, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Anna M. Rose, Jacob M. Rose, Kerri-Ann Sanderson, Jay C. Thibodeau |
When Should Audit Firms Introduce Analyses of Big Data Into the Audit Process? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Syst. ![In: J. Inf. Syst. 31(3), pp. 81-99, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Sojung Lucia Kim, Thompson S. H. Teo, Anol Bhattacherjee, Kichan Nam |
IS auditor characteristics, audit process variables, and IS audit satisfaction: An empirical study in South Korea. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 19(3), pp. 577-591, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Tung-Hsien Wu, Shi-Ming Huang, Shaio Yan Huang, David C. Yen |
The effect of competencies, team problem-solving ability, and computer audit activity on internal audit performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 19(5), pp. 1133-1148, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Li-Jen He |
Successor Audit Partner Choice for Mandatory Audit Partner Rotation Companies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMIS ![In: 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016, Fukuoka, Japan, July 6-8, 2016, pp. 563-566, 2016, IEEE Computer Society, 978-1-5090-0984-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Irina Malaescu, Steve G. Sutton |
The Reliance of External Auditors on Internal Audit's Use of Continuous Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Syst. ![In: J. Inf. Syst. 29(1), pp. 95-114, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Numanul Subhani, Robert D. Kent |
Continuous process auditing (CPA): An audit rule ontology based approach to audit-as-a-service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SysCon ![In: Annual IEEE Systems Conference, SysCon 2015, Proceedings, Vancouver, BC, Canada, April 13-16, 2015, pp. 832-838, 2015, IEEE, 978-1-4799-5927-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Dichapong Pongpattrachai, Paul B. Cragg, Richard Fisher |
IT infusion within the audit process: Spreadsheet use in small audit firms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Account. Inf. Syst. ![In: Int. J. Account. Inf. Syst. 15(1), pp. 26-46, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | He-Ming Ruan, Chin-Laung Lei |
Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaJCIS ![In: Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014, pp. 156-163, 2014, IEEE Computer Society, 978-1-4799-5733-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Jordan Brouns |
Développement d'outils numériques pour l'audit énergétique des bâtiments. (Development of numerical tools for building energy audit). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2014 |
RDF |
|
27 | William R. Titera |
Updating Audit Standard - Enabling Audit Data Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Syst. ![In: J. Inf. Syst. 27(1), pp. 325-331, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Bruce I. Davidson, Naman K. Desai, Gregory J. Gerard |
The Effect of Continuous Auditing on the Relationship between Internal Audit Sourcing and the External Auditor's Reliance on the Internal Audit Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Syst. ![In: J. Inf. Syst. 27(1), pp. 41-59, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Khairina Rosli, Paul H. P. Yeow, Eu-Gene Siew |
Adoption of Audit Technology in Audit Firms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS ![In: Australasian Conference on Information Systems, ACIS 2013, Melbourne, VIC, Australia, 4-6 December 2013., pp. 43, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
27 | Elizabeth Carson, Carlin Dowling |
The Competitive Advantage of Audit Support Systems: The Relationship between Extent of Structure and Audit Pricing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Syst. ![In: J. Inf. Syst. 26(1), pp. 35-49, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | M. Dale Stoel, Douglas Havelka, Jeffrey W. Merhout |
An analysis of attributes that impact information technology audit quality: A study of IT and financial audit practitioners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Account. Inf. Syst. ![In: Int. J. Account. Inf. Syst. 13(1), pp. 60-79, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Jason Tyler King, Ben H. Smith, Laurie A. Williams |
Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IHI ![In: ACM International Health Informatics Symposium, IHI '12, Miami, FL, USA, January 28-30, 2012, pp. 305-314, 2012, ACM, 978-1-4503-0781-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | She-I Chang, Chih-Fong Tsai, Dong-Her Shih, Chia-Ling Hwang |
The development of audit detection risk assessment system: Using the fuzzy theory and audit risk model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 35(3), pp. 1053-1067, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | David Chadwick, Rodney E. Sue |
Teaching spreadsheet development using peer audit and self-audit methods for reducing error ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0801.1514, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
27 | Grenville J. Croll |
A Typical Model Audit Approach: Spreadsheet Audit Methodologies in the City of London ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0712.2591, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
27 | She-I Chang, Chih-Fong Tsai, Chia-Ling Hwang |
The Development of Audit Detection Risk Assessment System: Using the Fuzzy Theory and Audit Risk Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIS ![In: Pacific Asia Conference on Information Systems, PACIS 2007, Auckland, New Zealand, July 4-6, 2007, pp. 78, 2007, AISeL. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
27 | Peter J. Best, George M. Mohay, Alison Anderson |
Machine-independent audit trail analysis - a tool for continuous audit assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intell. Syst. Account. Finance Manag. ![In: Intell. Syst. Account. Finance Manag. 12(2), pp. 85-102, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Ulrich Flegel |
Anonyme Audit-Daten im Überblick - Architekturen für anonyme Autorisierungen und Audit-Daten. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 27(5), 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
27 | Vincenzo Cutello, Emilio Mastriani, Francesco Pappalardo 0001 |
Piranha Audit: Kernel Enhancements And Utilities To Improve Audit/Logging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Linux Showcase & Conference ![In: 4th Annual Linux Showcase & Conference 2000, Atlanta, Georgia, USA, October 10-14, 2000, 2000, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | A. D. Chambers |
Audit Test Packs and Computer Audit Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 18(2), pp. 98-101, 1975. The full citation details ...](Pics/full.jpeg) |
1975 |
DBLP DOI BibTeX RDF |
|
25 | Xiaofan Jiang 0001, Minh Van Ly, Jay Taneja, Prabal Dutta, David E. Culler |
Experiences with a high-fidelity wireless building energy auditing network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SenSys ![In: Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, SenSys 2009, Berkeley, California, USA, November 4-6, 2009, pp. 113-126, 2009, ACM, 978-1-60558-519-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
sensor networks, wireless, power, energy, audit, building |
25 | Dattatraya S. Bhilare, Ashwini K. Ramani, Sanjay K. Tanwani |
Protecting intellectual property and sensitive information in academic campuses from trusted insiders: leveraging active directory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the ACM SIGUCCS Fall Conference on User Services 2009, St. Louis, Missouri, USA, October 11-14, 2009, pp. 99-104, 2009, ACM, 978-1-60558-477-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
audit automation, real time action, insider threat, active directory, user identification |
25 | Stuart Haber, Yasuo Hatano, Yoshinori Honda, William G. Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, Danfeng Yao |
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 353-362, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data integrity, digital signatures, data privacy, pseudonyms, audit logs, redaction |
25 | Nouha Oualha, Yves Roudier |
Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSOS ![In: Self-Organizing Systems, Third International Workshop, IWSOS 2008, Vienna, Austria, December 10-12, 2008. Proceedings, pp. 47-58, 2008, Springer, 978-3-540-92156-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
P2P storage, cooperation, audit, evolutionary game, trust establishment |
25 | Wing Bun Lee, Vivien Shek, Benny C. F. Cheung |
Auditing and Mapping the Knowledge Assets of Business Processes - An Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSEM ![In: Knowledge Science, Engineering and Management, Second International Conference, KSEM 2007, Melbourne, Australia, November 28-30, 2007, Proceedings, pp. 11-16, 2007, Springer, 978-3-540-76718-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Knowledge audit, Knowledge assets, Knowledge mapping, Intellectual capital |
25 | Joyce E. Hicks |
Looking for the magic formula: evaluating our it communication mix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 35th Annual ACM SIGUCCS Conference on User Services 2007, Orlando, Florida, USA, October 7-10, 2007, pp. 169-171, 2007, ACM, 978-1-59593-634-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
communication audit, newsletter, techqual+ study, documentation, engagement, new media |
25 | Susan J. Lincke |
Network security auditing as a community-based learning project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2007, Covington, Kentucky, USA, March 7-11, 2007, pp. 476-480, 2007, ACM, 1-59593-361-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, audit, service learning |
25 | Yolanta Beres, Adrian Baldwin, Marco Casassa Mont, Simon Shiu |
On identity assurance in the presence of federated identity management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 27-35, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
models, control, risk, identity, audit, assurance |
25 | Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters |
Attribute-based encryption for fine-grained access control of encrypted data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 89-98, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, delegation, broadcast encryption, attribute-based encryption, audit logs, hierarchical identity-based encryption |
25 | Vaclav Petricek, Tobias Escher, Ingemar J. Cox, Helen Z. Margetts |
The web structure of e-government - developing a methodology for quantitative evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 669-678, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
national audit offices, webmetric, network, e-government, ranking |
25 | William R. Claycomb, Dongwan Shin |
Mobile-driven architecture for managing enterprise security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 44st Annual Southeast Regional Conference, 2006, Melbourne, Florida, USA, March 10-12, 2006, pp. 555-559, 2006, ACM, 1-59593-315-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
enterprise security management, mobile solution, authentication, access control, security policy, audit |
25 | David Molnar, Andrea Soppera, David A. Wagner 0001 |
Privacy for RFID through trusted computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 31-34, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, RFID, trusted computing, audit |
25 | Jong Youl Choi, Markus Jakobsson, Susanne Wetzel |
Balancing auditability and privacy in vehicular networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'05 - Proceedings of the First ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Montreal, Quebec, Canada, October 13, 2005, pp. 79-87, 2005, ACM, 1-59593-241-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
light-weight, privacy, incentive, audit, symmetric |
25 | Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán |
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, pp. 15-33, 2003, Springer, 3-540-40663-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
multi-hop cellular networks, routing, collaboration, detection, Audit, rational, micro-payment |
25 | Mihir Bellare, Bennet S. Yee |
Forward-Security in Private-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 1-18, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
pseudorandom bit generators, message authentication, forward security, Symmetric cryptography, audit logs, proofs of security |
25 | Dieter Gantenbein, Luca Deri |
Categorizing Computing Assets According to Communication Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING Tutorials ![In: Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002], pp. 83-100, 2002, Springer, 3-540-00165-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Network and System Management, Inventory and Asset Management, Due Diligence, Data Mining and OLAP, IT Audit |
25 | Roman M. Wong, Siddhartha Bhattacharyya |
Task-Structure Analysis: A Modularized Approach for Modeling Knowledge Intensive Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 90, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
knowledge intensive processes, task structure, audit risk assessment, software engineering, knowledge-based systems, knowledge acquisition, software reuse, Knowledge modeling |
25 | John R. Wilson, L. Cordiner, Sarah Nichols 0001, L. Norton, N. Bristol, Theresa Clarke, S. Roberts |
On the Right Track: Systematic Implementation of Ergonomics in Railway Network Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 3(4), pp. 238-253, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Ergonomics audit, Railway ergonomics, Field study, Situation awareness, Mental workload, Control rooms, Cognitive ergonomics |
25 | Barbara Masucci, Douglas R. Stinson |
Metering Schemes for General Access Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings, pp. 72-87, 2000, Springer, 3-540-41031-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Distributed Audit, Security, Cryptography, Entropy, Metering |
25 | Alberto Avritzer, Elaine J. Weyuker |
Investigating Metrics for Architectural Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE METRICS ![In: 5th IEEE International Software Metrics Symposium (METRICS 1998), March 20-21, 1998, Bethesda, Maryland, USA, pp. 4-10, 1998, IEEE Computer Society, 0-8186-9201-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
architecture discovery, architecture audit, architecture review |
25 | Calvin Ko, Manfred Ruschitzka, Karl N. Levitt |
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 175-187, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
security-critical program execution monitoring, specification-based approach, program vulnerabilities, security specifications, real-time intrusion detection system, Unix setuid root programs, system attack detection, security violations, distributed systems, synchronization, system monitoring, audit trails, formal framework |
25 | Kymie M. C. Tan, Blair R. Collie |
Detection and Classification of TCP/IP Network Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 99-107, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
TCP/IP network service classification, computer intruders, remote terminal software, undetectable access, system audit, intruder activity detection, unauthorised network services, network connection signature, neural network, learning, monitoring, experiment, transport protocols, data security, network traffic, generalisation, Australia, law enforcement |
25 | Chris Hall, Bruce Schneier |
Remote Electronic Gambling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 232-238, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
remote electronic gambling, casino games, random bit generation, random permutation generation, player/player collusions, player/dealer collusions, secure audit trail, debt payment, security, Internet, Internet, fairness, public key cryptography |
25 | Christoph L. Schuba, Eugene H. Spafford |
A Reference Model for Firewall Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 133-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
firewall technology, technological aspect, specialized engineering solution, firewall systems, integrity assurance, centralized security policy, authentication, access control, audit, reference model, computer network management, networking technologies, communications security |
25 | Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran |
On the Identification of Covert Storage Channels in Secure Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(6), pp. 569-580, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
covert storage channels, Secure Xenix kernel, visible/alterable kernel variables, language code, sharing relationships, nondiscretionary access rules, false flow violations, kernel locations, audit code, time-delay variables, covert-channel handling, software engineering, identification, security of data, source code, operating systems (computers), secure systems, information-flow analysis, implementation languages |
23 | |
Audit Trail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Database Systems ![In: Encyclopedia of Database Systems, pp. 172, 2009, Springer US, 978-0-387-35544-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Gabriel Murray, Thomas Kleinbauer, Peter Poller, Tilman Becker, Steve Renals, Jonathan Kilgour |
Extrinsic summarization evaluation: A decision audit task. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Speech Lang. Process. ![In: ACM Trans. Speech Lang. Process. 6(2), pp. 2:1-2:29, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
evaluation, interfaces, abstraction, browsing, Summarization, extraction |
Displaying result #101 - #200 of 1955 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|