|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 590 occurrences of 434 keywords
|
|
|
Results
Found 2122 publication records. Showing 2122 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Roger Debreceny |
Re-Engineering IT Internal Controls: Applying Capability Maturity Models to the Evaluation of IT Controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | David Del Vecchio, Victor Hazlewood, Marty Humphrey |
Grid networks and portals - Evaluating grid portal security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC ![In: Proceedings of the ACM/IEEE SC2006 Conference on High Performance Networking and Computing, November 11-17, 2006, Tampa, FL, USA, pp. 114, 2006, ACM Press, 0-7695-2700-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Bengt Carlsson, Dejan Baca |
Software Security Analysis - Execution Phase Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO-SEAA ![In: 31st EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2005), 30 August - 3 September 2005, Porto, Portugal, pp. 240-247, 2005, IEEE Computer Society, 0-7695-2431-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Oystein Hallaraker, Giovanni Vigna |
Detecting Malicious JavaScript Code in Mozilla. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 16-20 June 2005, Shanghai, China, pp. 85-94, 2005, IEEE Computer Society, 0-7695-2284-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Web Applications, JavaScript, Mobile Code |
22 | Rajendra P. Srivastava, Liping Liu |
Applications of Belief Functions in Business Decisions: A Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 5(4), pp. 359-378, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Dempster-Shafer theory of belief functions, linear belief functions, audit decision, hierarchical evidence, versatile evidence, statistical evidence, judgment under ambiguity |
22 | Garret Swart |
WS-Workspace: Workspace Versioning for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC ![In: Service-Oriented Computing - ICSOC 2003, First International Conference, Trento, Italy, December 15-18, 2003, Proceedings, pp. 351-366, 2003, Springer, 3-540-20681-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | DeWayne Searcy, Jon B. Woodroof, Bruce Behn |
Continuous Audit: The Motivations, Benefits, Problems, and Challenges Identified by Partners of a Big 4 Accounting Firm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 210, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Stefan Probst, Wolfgang Eßmayr, Edgar R. Weippl |
Reusable Components for Developing Security-Aware Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 18th Annual Computer Security Applications Conference (ACSAC 2002), 9-13 December 2002, Las Vegas, NV, USA, pp. 239-248, 2002, IEEE Computer Society, 0-7695-1828-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Ryan K. L. Ko, Peter Jagadpramana, Miranda Mowbray, Siani Pearson, Markus Kirchberg, Qianhui Liang, Bu-Sung Lee |
TrustCloud: A Framework for Accountability and Trust in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4-9, 2011, pp. 584-588, 2011, IEEE Computer Society, 978-1-4577-0879-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
trust in cloud computing, continuous auditing, monitoring, governance, accountability, auditability, logging, data provenance |
18 | Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha |
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 312-327, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Auditing Learning Game Model Regret Minimization Economics |
18 | Tanu Malik, Ligia Nistor, Ashish Gehani |
Tracking and Sketching Distributed Data Provenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eScience ![In: Sixth International Conference on e-Science, e-Science 2010, 7-10 December 2010, Brisbane, QLD, Australia, pp. 190-197, 2010, IEEE Computer Society, 978-1-4244-8957-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Distributed, Sketch, Provenance, Auditing, Lineage, Pedigree |
18 | Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin |
Logging key assurance indicators in business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 364-367, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
tamper-proofed logs, auditing, logs, enterprise |
18 | Christopher Kunz, Jan Wiebelitz, Stefan Piger, Christian Grimm |
A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPDC ![In: Eighth International Symposium on Parallel and Distributed Computing, ISPDC 2009, Lisbon, Portugal, June 30-July 4 2009, pp. 245-248, 2009, IEEE Computer Society, 978-0-7695-3680-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
abuse detection, Grid, PKI, auditing, X.509, proxy certificate |
18 | Lianzhong Liu, Chunfang Li, Yanping Zhang |
A Business-Oriented Fault Localization Approach Using Digraph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, Chengdu, Sichuan, China, 10-12 August 2009, pp. 499-504, 2009, IEEE Computer Society, 978-0-7695-3747-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security auditing, fault propagation model, fault localization, transitive closure |
18 | Fahim Akhter, Lami Kaya |
Building secure e-business systems: technology and culture in the UAE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 1474-1475, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ISS auditing, ISS infrastructure, information security, e-business |
18 | Stefan Böttcher, Rita Hartel, Matthias Kirschner |
Detecting Suspicious Relational Database Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 771-778, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Auditing Compliance, Privacy, relational Database |
18 | Olly Gotel, Vidya Kulkarni, Christelle Scharff, Long Chrea Neak |
Students as Partners and Students as Mentors: An Educational Model for Quality Assurance in Global Software Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEAFOOD ![In: Software Engineering Approaches for Offshore and Outsourced Development - 2nd International Conference, SEAFOOD@TOOLS 2008, Zurich, Switzerland, July 2-3, 2008. Revised Papers, pp. 90-106, 2008, Springer, 978-3-642-01855-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Testing, Requirements, Software Engineering Education, Auditing, Global Software Development, Software Quality Assurance, Mentoring |
18 | Esmiralda Moradian, Anne Håkansson |
Approach to Solving Security Problems Using Meta-Agents in Multi Agent System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, Second KES International Symposium, KES-AMSTA 2008, Incheon, Korea, March 26-28, 2008. Proceedings, pp. 122-131, 2008, Springer, 978-3-540-78581-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, Web Services, multi-agent systems, reliability, networks, intelligent agents, Software agents, SOAP, auditing, meta-agents |
18 | Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo |
Analysis of Computer Intrusions Using Sequences of Function Calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(2), pp. 137-150, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
unauthorized access (for example, hacking), Security, design, intrusion detection, management, anomaly detection, auditing, logging, forensic analysis |
18 | Susanne Dobratz, Astrid Schoger |
Trustworthy Digital Long-Term Repositories: The Nestor Approach in the Context of International Developments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECDL ![In: Research and Advanced Technology for Digital Libraries, 11th European Conference, ECDL 2007, Budapest, Hungary, September 16-21, 2007, Proceedings, pp. 210-222, 2007, Springer, 978-3-540-74850-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Certification, Auditing, Trustworthiness, Standardisation, Long-Term Preservation, Digital Repositories |
18 | Sasank Reddy, Andrew Parker 0001, Josh Hyman, Jeff Burke, Deborah Estrin, Mark H. Hansen |
Image browsing, processing, and clustering for participatory sensing: lessons from a DietSense prototype. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EmNets ![In: Proceedings of the 4th Workshop on Embedded Networked Sensors, EmNets 2007, Cork, Ireland, June 25-26, 2007, pp. 13-17, 2007, ACM, 978-1-59593-694-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
data auditing, urban sensing, mobile sensors |
18 | Josh Dehlinger, Qian Feng, Lan Hu |
SSVChecker: unifying static security vulnerability detection tools in an Eclipse plug-in. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETX ![In: Proceedings of the 2006 OOPSLA workshop on Eclipse Technology eXchange, ETX 2006, Portland, Oregon, USA, October 22-23, 2006, pp. 30-34, 2006, ACM, 1-59593-621-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security auditing, software security, secure programming |
18 | Nabil R. Adam, Ahmet Kozanoglu, Aabhas V. Paliwal, Mahmoud Youssef |
Mutual trust in open environment for cascaded web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 107-108, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cascading web services, security, trust, auditing |
18 | Brian D. Carrier, Clay Shields |
The session token protocol for forensics and traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(3), pp. 333-362, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
TCP traceback, auditing and intrusion detection, privacy, Digital forensics, digital investigations |
18 | Anil Sharma, Jason R. Martin, Nitin Anand, Michel Cukier, William H. Sanders |
Ferret: A Host Vulnerability Checking Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 3-5 March 2004, Papeete, Tahiti, pp. 389-394, 2004, IEEE Computer Society, 0-7695-2076-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security auditing tool, host vulnerabilities, security evaluation |
18 | Dieter Gawlick, Shailendra Mishra |
Information sharing with the Oracle database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEBS ![In: Proceedings of the 2nd International Workshop on Distributed Event-Based Systems, DEBS 2003, Sunday, June 8th, 2003, San Diego, California, USA (in conjunction with SIGMOD/PODS), 2003, ACM, 1-58113-843-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
apply, post dating, reliable messaging, database, type system, rules, publish/subscribe, auditing, retention, JMS, capture, expression evaluation |
18 | Carlo Blundo, Stelvio Cimato |
SAWM: a tool for secure and authenticated web metering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEKE ![In: Proceedings of the 14th international conference on Software engineering and knowledge engineering, SEKE 2002, Ischia, Italy, July 15-19, 2002, pp. 641-648, 2002, ACM, 1-58113-556-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
secure metering, e-commerce, auditing |
18 | Raymond J. Butler |
Is This Spreadsheet a Tax Evader? How H.M. Customs and Excise Test Spreadsheet Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 4-7 January, 2000, Maui, Hawaii, USA, 2000, IEEE Computer Society, 0-7695-0493-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Testing, Errors, Auditing, Spreadsheets, End-Users |
18 | Thomas E. Daniels, Eugene H. Spafford |
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 178-187, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
network audit system, NASHID, operating system audit trails, low-level network attacks, application sources, network protocol stack, audit data, audit data accumulation, Linux, Unix, security of data, auditing, network operating systems, computer network management, system calls, host-based intrusion detection |
18 | Christoph C. Michael, Anup K. Ghosh |
Two State-based Approaches to Program-based Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 21-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
state-based approaches, program-based anomaly detection, intrusion detection algorithms, execution audit data, statistical deviation monitoring, finite state machines, finite-state machine, security of data, software performance evaluation, experimental results, auditing, n-grams, algorithm performance |
18 | Bruce Schneier, John Kelsey |
Secure Audit Logs to Support Computer Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(2), pp. 159-176, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
authenthication, intrusion detection, auditing, computer forensics, hash chains, audit logs |
18 | R. Geoff Dromey |
A Model for Software Product Quality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 21(2), pp. 146-162, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
product evaluation, code auditing, quality defect classification, software characteristics, quality-carrying properties, Software quality, maintainability, quality attributes, quality model, ISO-9126 |
18 | John H. Baumert |
Process Assessment with a Project Focus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 11(2), pp. 89-91, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
project focus, Computer Science Corporation, software process audit method, software capability evaluations, project level, organizational level, process-audit approach, CSC, process audit, standards, software quality, project management, process improvement, conformance testing, auditing, capability maturity model, CMM, SCA, conformance, SPA, process assessment, process maturity, software process assessments, Software Engineering Institute, SEI |
18 | Paul Helman, Gunar E. Liepins |
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 19(9), pp. 886-901, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
audit trail analysis, computer misuse, computer transactions, stationary stochastic processes, misuse detectors, detection accuracy, transaction attributes, statistical foundations, modeling, transaction processing, NP-hard, security of data, stochastic processes, auditing, density estimation, system security, computer crime, heuristic approach |
18 | Eric L. Denna, James V. Hansen, Rayman D. Meservy |
Development and Application of Expert System in Audit Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 3(2), pp. 172-184, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
audit domain, audit process, future efforts, representational forms, audit complexity, expert system validation, knowledge representation, expert systems, knowledge acquisition, knowledge acquisition, rule-based systems, auditing, expert judgment |
13 | Jinliang Chen, Tianqi Zhou, Sai Ji, Haowen Tan, Wenying Zheng |
Efficient public auditing scheme for non-administrator group with secure user revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 80, pp. 103676, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ansar Isak Sheikh, M. Sadish Sendil, P. Sridhar, M. I. Thariq Hussan, Shafiqul Abidin, Ravi Kumar, Reyazur Rashid Irshad, Muniyandy Elangovan, Solleti Phani Kumar |
Revolutionizing collaborative auditing: A dynamic blockchain-based cloud storage framework for data updates and assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 46(3), pp. 6553-6564, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Dengzhi Liu, Yongdong Ding, Geng Yu, Zhaoman Zhong, Yuanzhao Song |
Privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 25, pp. 101084, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel |
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 23(2), pp. 981-997, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Pichai Subramanian Apirajitha, Godfrey Winster Sathianesan |
On developing Block-Chain based Secure Storage Model (BSSM) with auditing and integrity analysis in the cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 36(7), 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Liping Qiao, Yanping Li 0001, Yong Ding 0005, Bo Yang 0003 |
Lightweight and Decentralized Cross-Cloud Auditing With Data Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Serv. Comput. ![In: IEEE Trans. Serv. Comput. 17(1), pp. 60-73, January - February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Fei Li 0006, Dongqing Xie, Wei Gao 0007, Kefei Chen, Guilin Wang, Roberto Metere |
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 15(2), pp. 1317-1326, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Fatemeh Stodt, Mohammed B. M. Kamel, Christoph Reich, Fabrice Theoleyre, Péter Ligeti |
Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 26747-26758, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Paromita Goswami, Neetu Faujdar, Ghanshyam Singh, Kanta Prasad Sharma, Ajoy Kumar Khan, Somen Debnath |
Stub Signature-Based Efficient Public Data Auditing System Using Dynamic Procedures in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 58502-58518, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Taichi Takemura, Ryo Yamamoto, Kuniyasu Suzaki |
TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 26536-26549, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Markus Schwarz, Ludwig Christian G. Hinske, Ulrich Mansmann, Fady Albashiti |
Designing an ML Auditing Criteria Catalog as Starting Point for the Development of a Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 39953-39967, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | João Henriques, Filipe Caldeira, Tiago Cruz 0001, Paulo Simões 0001 |
A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 2409-2444, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Jiangtao Li 0003, Zhaoheng Song, Zihou Zhang, Yufeng Li 0002, Chenhong Cao |
In-Vehicle Digital Forensics for Connected and Automated Vehicles With Public Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(4), pp. 6368-6383, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Jinyong Chang, Xinyu Hao |
Certificateless Dynamic Data Sharing Scheme With File Recommendation and Integrity Auditing Functions in Cloud-Fog Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(6), pp. 9630-9644, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Matti Minkkinen, Anniina Niukkanen, Matti Mäntymäki |
What about investors? ESG analyses as tools for ethics-based AI auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI Soc. ![In: AI Soc. 39(1), pp. 329-343, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Leandro Ferreira Pereira, Mariana Résio, Renato Lopes da Costa, Álvaro Dias 0001, Rui Gonçalves |
Artificial intelligence in strategic business management: the case of auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Bus. Inf. Syst. ![In: Int. J. Bus. Inf. Syst. 45(1), pp. 57-100, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Rajesh Bingu, S. Jothilakshmi 0001 |
Cloud auditing and authentication scheme for establishing privacy preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(15), pp. 43849-43870, May 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Qingqing Gan, Xiaoming Wang, Daxin Huang, Jianwei Li, Changji Wang, Zhen Liu |
Online/offline remote data auditing with strong key-exposure resilience for cloud storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 88, pp. 103798, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yi Li, Jian Shen 0001, Pandi Vijayakumar, Chin-Feng Lai, Audithan Sivaraman, Pradip Kumar Sharma |
Next-Generation Consumer Electronics Data Auditing Scheme Toward Cloud-Edge Distributed and Resilient Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 70(1), pp. 2244-2256, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | K. B. Aruna, C. Arunachalaperumal |
Development of hybrid heuristic-assisted dynamic data auditing strategy in cloud sector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 35(2), February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Peyman Khordadpour, Saeed Ahmadi |
Security and Privacy Enhancing in Blockchain-based IoT Environments via Anonym Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.01356, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Kristian Schwethelm, Johannes Kaiser, Moritz Knolle, Daniel Rueckert, Georgios Kaissis, Alexander Ziller |
Visual Privacy Auditing with Diffusion Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.07588, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Aleksandra Urman, Mykola Makhortykh, Aniko Hannak |
Mapping the Field of Algorithm Auditing: A Systematic Literature Review Identifying Research Trends, Linguistic and Geographical Disparities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.11194, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Lara Groves, Jacob Metcalf, Alayna Kennedy, Briana Vecchione, Andrew Strait |
Auditing Work: Exploring the New York City algorithmic bias audit regime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.08101, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Karan Chadha, Matthew Jagielski, Nicolas Papernot, Christopher A. Choquette-Choo, Milad Nasr |
Auditing Private Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.09403, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Zekun Wu 0003, Sahan Bulathwela, María Pérez-Ortiz 0001, Adriano Soares Koshiyama |
Auditing Large Language Models for Enhanced Text-Based Stereotype Detection and Probing-Based Bias Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2404.01768, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Tariqul Islam 0001, Faisal Haque Bappy, Md Nafis Ul Haque Shifat, Farhan Ahmad, Kamrul Hasan, Tarannum Shaila Zaman |
An Efficient and Scalable Auditing Scheme for Cloud Data Storage using an Enhanced B-tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.08953, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Cheng-Long Wang, Qi Li, Zihang Xiang, Di Wang |
Has Approximate Machine Unlearning been evaluated properly? From Auditing to Side Effects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.12830, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Martijn de Vos, Akash Dhasade, Jade Garcia Bourrée, Anne-Marie Kermarrec, Erwan Le Merrer, Benoît Rottembourg, Gilles Trédan |
Fairness Auditing with Multi-Agent Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.08522, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Wei Ma, Daoyuan Wu, Yuqiang Sun 0001, Tianwen Wang, Shangqing Liu, Jian Zhang, Yue Xue, Yang Liu |
Combining Fine-Tuning and LLM-based Agents for Intuitive Smart Contract Auditing with Justifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.16073, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Maryam Amirizaniani, Tanya Roosta, Aman Chadha, Chirag Shah |
AuditLLM: A Tool for Auditing Large Language Models Using Multiprobe Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.09334, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Daniel Hsu 0001, Jizhou Huang, Brendan Juba |
Polynomial time auditing of statistical subgroup fairness for Gaussian data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.16439, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yewon Byun, Dylan Sam, Michael Oberst, Zachary C. Lipton, Bryan Wilder |
Auditing Fairness under Unobserved Confounding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.14713, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Chufan Gao, Nicholas Gisolfi, Artur Dubrawski |
Signal Quality Auditing for Time-series Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.00803, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Maryam Amirizaniani, Jihan Yao, Adrian Lavergne, Elizabeth Snell Okada, Aman Chadha, Tanya Roosta, Chirag Shah |
Developing a Framework for Auditing Large Language Models Using Human-in-the-Loop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.09346, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Alexander Ek, Philip B. Stark, Peter J. Stuckey, Damjan Vukcevic |
Efficient Weighting Schemes for Auditing Instant-Runoff Voting Elections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.15400, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yuying Du, Xueyan Tang |
Evaluation of ChatGPT's Smart Contract Auditing Capabilities Based on Chain of Thought. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.12023, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Amit Haim, Alejandro Salinas, Julian Nyarko |
What's in a Name? Auditing Large Language Models for Race and Gender Bias. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.14875, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Abeba Birhane, Ryan Steed, Victor Ojewale, Briana Vecchione, Inioluwa Deborah Raji |
AI auditing: The Broken Bus on the Road to AI Accountability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.14462, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Preetika Verma, Kokil Jaidka, Svetlana Churina |
Auditing Counterfire: Evaluating Advanced Counterargument Generation with Evidence and Style. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.08498, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Abhisek Dash, Abhijnan Chakraborty, Saptarshi Ghosh 0001, Animesh Mukherjee 0001, Jens Frankenreiter, Stefan Bechtold, Krishna P. Gummadi |
Antitrust, Amazon, and Algorithmic Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.18623, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Hidde Lycklama, Alexander Viand, Nicolas Küchler, Christian Knabenhans, Anwar Hithnawi |
Holding Secrets Accountable: Auditing Privacy-Preserving Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.15780, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Mishaal Kazmi, Hadrien Lautraite, Alireza Akbari, Mauricio Soroco, Qiaoyue Tang, Tao Wang, Sébastien Gambs, Mathias Lécuyer |
PANORAMIA: Privacy Auditing of Machine Learning Models without Retraining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.09477, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Daniel I. Prajogo, Janto Haman, Adegoke Oke |
The Effects of Auditors' Quality and Peripheral Services on Client-Firms' Satisfaction in ISO 9001 Quality System Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Engineering Management ![In: IEEE Trans. Engineering Management 71, pp. 4406-4417, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | K. Vivekrabinson, K. Ragavan, P. Jothi Thilaga, J. Bharath Singh |
Secure Cloud-Based Electronic Health Records: Cross-Patient Block-Level Deduplication with Blockchain Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Medical Syst. ![In: J. Medical Syst. 48(1), pp. 33, December 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Chuan Zhang 0003, Haojun Xuan, Tong Wu 0011, Ximeng Liu, Guomin Yang, Liehuang Zhu |
Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 1979-1993, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Roberto Ulloa, Mykola Makhortykh, Aleksandra Urman |
Scaling up search engine audits: Practical insights for algorithm auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. ![In: J. Inf. Sci. 50(2), pp. 404-419, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Xueyan Tang, Lingzhi Shi, Xun Wang, Kyle Charbonnet, Shixiang Tang, Shixiao Sun |
Zero-Knowledge Proof Vulnerability Analysis and Security Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 514, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
13 | Taimur Bakhshi, Bogdan Ghita 0003, Ievgeniia Kuzminykh |
A Review of IoT Firmware Vulnerabilities and Auditing Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 24(2), pp. 708, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Tung-Hsien Wu, Shaio Yan Huang, An-An Chiu, David C. Yen |
IT governance and IT controls: Analysis from an internal auditing perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Account. Inf. Syst. ![In: Int. J. Account. Inf. Syst. 52, pp. 100663, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Judy Flavia B, Balika J. Chelliah |
BO-LCNN: butterfly optimization based lightweight convolutional neural network for remote data integrity auditing and data sanitizing model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 85(4), pp. 623-647, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Aleksandra Urman, Ivan Smirnov, Jana Lasser |
The right to audit and power asymmetries in algorithm auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EPJ Data Sci. ![In: EPJ Data Sci. 13(1), pp. 19, December 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Jingze Yu, Wenting Shen |
Secure cloud storage auditing with deduplication and efficient data transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 27(2), pp. 2203-2215, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yongliang Xu, Chunhua Jin, Wenyu Qin, Jie Zhao, Guanhua Chen, Fugeng Zeng |
BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Archit. ![In: J. Syst. Archit. 147, pp. 103053, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Gemma Bel Bordes, Alan Perotti |
Auditing Fairness and Explainability in Chest X-Ray Image Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAART (3) ![In: Proceedings of the 16th International Conference on Agents and Artificial Intelligence, ICAART 2024, Volume 3, Rome, Italy, February 24-26, 2024., pp. 1308-1315, 2024, SCITEPRESS, 978-989-758-680-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Fabio Junior Bertinatto, Daniel Arioza, Jéferson Campos Nobre, Lisandro Zambenedetti Granville |
Container-Level Auditing in Container Orchestrators with eBPF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (4) ![In: Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 4, pp. 412-423, 2024, Springer, 978-3-031-57915-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ioanna Tzialla, Jeffery Wang, Jingyi Zhu, Aurojit Panda, Michael Walfish |
Efficient Auditing of Event-driven Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the Nineteenth European Conference on Computer Systems, EuroSys 2024, Athens, Greece, April 22-25, 2024, pp. 1208-1224, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yewon Byun, Dylan Sam, Michael Oberst, Zachary C. Lipton, Bryan Wilder |
Auditing Fairness under Unobserved Confounding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISTATS ![In: International Conference on Artificial Intelligence and Statistics, 2-4 May 2024, Palau de Congressos, Valencia, Spain., pp. 4339-4347, 2024, PMLR. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
13 | Song Li, Hong Zhong 0001, Liangmin Wang 0001, Jie Cui 0004, Jinguang Han, Zuobin Ying, Guannan Yang |
SecuCar: Data Loss Prevention for Cloud Assisted VSS Based on Public Auditing Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 72(11), pp. 14815-14827, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin |
Distributed auditing protocol for untraceable transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 73, pp. 103429, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Jakob Mökander |
Auditing of AI: Legal, Ethical and Technical Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Soc. ![In: Digit. Soc. 2(3), pp. 49, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | S. Suganya, S. Selvamuthukumaran |
Auditing of hadoop log file for dynamic detection of threats using H-ISSM-MIM and convolutional neural network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 45(4), pp. 6617-6628, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Yangsibo Huang, Chun-Yin Huang, Xiaoxiao Li, Kai Li 0001 |
A Dataset Auditing Method for Collaboratively Trained Machine Learning Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Medical Imaging ![In: IEEE Trans. Medical Imaging 42(7), pp. 2081-2090, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Zhixin Chen, Xiang Ji, Mingjun Li, Jingyan Li |
How corporate social responsibility auditing interacts with supply chain information transparency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 329(1), pp. 1221-1240, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Laila Dahabiyeh, Omar Mowafi |
Challenges of using RPA in auditing: A socio-technical systems approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intell. Syst. Account. Finance Manag. ![In: Intell. Syst. Account. Finance Manag. 30(2), pp. 76-86, April/June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 2122 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|