|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 809 occurrences of 533 keywords
|
|
|
Results
Found 1957 publication records. Showing 1955 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Timothy Neville, Matthew Sorell |
Audit Log for Forensic Photography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 142-152, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
crime investigation, forensic investigation, digital negative, Digital photography |
23 | Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely |
Towards a Theory of Accountability and Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 152-167, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Malcolm J. Beynon |
The Application of Fuzzy Decision Trees in Company Audit Fee Evaluation: A Sensitivity Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Computing Applications in Business ![In: Soft Computing Applications in Business, pp. 73-91, 2008, Springer, 978-3-540-79004-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Cai Zhiming, Yin Jun |
The Process Conducting and Member Audit in the Distributed Enterprise Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 416-420, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Ruixuan Li 0001, Cuihua Zuo, Yuntian He, Zhengding Lu |
A Credit Mechanism Based on Automatic Audit in P2P File Sharing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2044-2049, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | MyungJoo Ham, Gul A. Agha |
A Robust Audit Mechanism to Prevent Malicious Behaviors in Multi-robot Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASO ![In: Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2008, 20-24 October 2008, Venice, Italy, pp. 35-44, 2008, IEEE Computer Society, 978-0-7695-3404-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Gabriel Murray, Thomas Kleinbauer, Peter Poller, Steve Renals, Jonathan Kilgour, Tilman Becker |
Extrinsic Summarization Evaluation: A Decision Audit Task. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLMI ![In: Machine Learning for Multimodal Interaction, 5th International Workshop, MLMI 2008, Utrecht, The Netherlands, September 8-10, 2008. Proceedings, pp. 349-361, 2008, Springer, 978-3-540-85852-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Birgit Pfitzmann |
Multi-layer Audit of Access Rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 18-32, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Naga Ayachitula, Melissa J. Buco, Yixin Diao, Bradford Fisher, David Loewenstern, Christopher Ward |
IT Service Management Automation - An Automation Centric Approach Leveraging Configuration Control, Audit Verification and Process Analytics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Managing Virtualization of Networks and Services, 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007, Proceedings, pp. 195-198, 2007, Springer, 978-3-540-75693-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Brian Shand, Jem Rashbass |
Middleware Support for Monitoring: Privacy and Audit in Healthcare Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 3-4, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Lillian Røstad, Ole Edsberg |
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 175-186, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson |
Universally Composable Time-Stamping Schemes with Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 359-373, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Bengt Carlsson, Dejan Baca |
Software Security Analysis - Execution Phase Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO-SEAA ![In: 31st EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2005), 30 August - 3 September 2005, Porto, Portugal, pp. 240-247, 2005, IEEE Computer Society, 0-7695-2431-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Darren Davis, Fabian Monrose, Michael K. Reiter |
Time-Scoped Searching of Encrypted Audit Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 532-545, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Mati Golani, Shlomit S. Pinter |
Generating a Process Model from a Process Audit Log. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Business Process Management ![In: Business Process Management, International Conference, BPM 2003, Eindhoven, The Netherlands, June 26-27, 2003, Proceedings, pp. 136-151, 2003, Springer, 3-540-40318-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vilbert |
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 51(7), pp. 810-820, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
multivariate statistical analysis, chi-square test and Hotelling's rm T^2 test, intrusion detection, Computer security |
23 | Mark Keil 0001, Joan Mann |
Understanding the Nature and Extent of IS Project Escalation: Results from a Survey of IS Audit and Control Professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (3) ![In: 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 7-10 January 1997, Maui, Hawaii, USA, pp. 139-148, 1997, IEEE Computer Society, 0-8186-7734-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Maria Chiara Leva, Alison M. Kay, Joan Cahill, Gabriel Losa, Sharon Keating, Diogo Serradas, Nick McDonald |
Unique Reporting Form: Flight Crew Auditing of Everyday Performance in an Airline Safety Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (9) ![In: Human Interface and the Management of Information. Information and Interaction, Symposium on Human Interface 2009, Held as part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Proceedings, Part II, pp. 806-815, 2009, Springer, 978-3-642-02558-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
threat & error management, safety management systems, Human Factors, performance monitoring, task support |
19 | Wei Wang 0012, Florent Masseglia, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier |
A general framework for adaptive and online detection of web attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 1141-1142, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
clustering, intrusion detection, anomaly detection |
19 | Yurdaer N. Doganata, Francisco Curbera |
Effect of Using Automated Auditing Tools on Detecting Compliance Failures in Unmanaged Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BPM ![In: Business Process Management, 7th International Conference, BPM 2009, Ulm, Germany, September 8-10, 2009. Proceedings, pp. 310-326, 2009, Springer, 978-3-642-03847-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Topics covered BPM Governance and Compliance, Management Issues and Empirical Studies, Non-traditional BPM Scenarios |
19 | Nikhil Kumar, Dinakar Sosale, Sadhana Nivedita Konuganti, Ajay Rathi |
Enabling the adoption of aspects - testing aspects: a risk model, fault model and patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AOSD ![In: Proceedings of the 8th International Conference on Aspect-Oriented Software Development, AOSD 2009, Charlottesville, Virginia, USA, March 2-6, 2009, pp. 197-206, 2009, ACM, 978-1-60558-442-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
weaver, woven code, testing, aspect-oriented programming, eclipse, aspectj, bytecode, decompilation |
19 | Cédric Fournet, Nataliya Guts, Francesco Zappa Nardelli |
A Formal Implementation of Value Commitment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 17th European Symposium on Programming, ESOP 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings, pp. 383-397, 2008, Springer, 978-3-540-78738-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Vikram Goyal, Shyam K. Gupta 0001, Manish Singh, Anand Gupta |
Auditing Inference Based Disclosures in Dynamic Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings, pp. 67-81, 2008, Springer, 978-3-540-85258-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Magnus Almgren, Ulf Lindqvist, Erland Jonsson |
A Multi-Sensor Model to Improve Automated Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 291-310, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
alert reasoning, intrusion detection |
19 | Chunfu Jia, Deqiang Chen, Kai Lin |
The Application of the Relative Entropy Density Divergence in Intrusion Detection Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 951-954, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Liqun Zhang, Haiyang Wang |
A Block-Structured Mining Approach to Support Process Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (4) ![In: Fifth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 18-20 October 2008, Jinan, Shandong, China, Proceedings, Volume 4, pp. 289-294, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Emilio Soler, Juan Trujillo 0001, Eduardo Fernández-Medina, Mario Piattini |
Application of QVT for the Development of Secure Data Warehouses: A case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 829-836, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Florian Kerschbaum |
Distance-preserving pseudonymization for timestamps and spatial data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 68-71, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, hash functions, pseudonymization, distributed intrusion detection |
19 | Wei Chen 0135, Jin-cheng Zhang, Yu-quan Jiang |
One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E (2) ![In: Integration and Innovation Orient to E-Society, Volume 2, Seventh IFIP International Conference on e-Business, e-Services, and e-Society (I3E2007), October 10-12, Wuhan, China, pp. 521-528, 2007, Springer, 978-0-387-75493-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Xin Jin, Sylvia L. Osborn |
Architecture for Data Collection in Database Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 96-107, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
database IDS, intrusion detection, database security |
19 | Apu Kapadia, Prasad Naldurg, Roy H. Campbell |
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 141-150, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Jorge Coelho 0001, Mário Florido |
Type-Based Static and Dynamic Website Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: International Conference on Internet and Web Applications and Services (ICIW 2007), May 13-19, 2007, Le Morne, Mauritius, pp. 32, 2007, IEEE Computer Society, 0-7695-2844-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Brian Shand, Jem Rashbass |
Traceability and Timeliness in Messaging Middleware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part II, pp. 1551-1554, 2006, Springer, 3-540-48273-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | William P. Murphy III |
EMS: a homegrown identity management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, Edmonton, Alberta, Canada, November 5-8, 2006, pp. 281-286, 2006, ACM, 1-59593-438-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
HR, peoplesoft, username, web, email, identity, website, web-based, PHP, inventory, MySQL, human resources, ID, employee |
19 | Jeffrey M. Stanton, Isabelle J. Fagnot |
Extracting Useful Information from Security Assessment Interviews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Juan Trujillo 0001, Mario Piattini |
Using UML Packages for Designing Secure Data Warehouses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 1024-1034, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Dong Seong Kim 0001, Sang Min Lee 0018, Jong Sou Park |
Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006, Proceedings, pp. 981-989, 2006, Springer, 3-540-49860-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Data mining, Intrusion Detection System, Random Forest |
19 | Christian W. Probst, René Rydhof Hansen, Flemming Nielson |
Where Can an Insider Attack? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers, pp. 127-142, 2006, Springer, 978-3-540-75226-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Seung Jun, Mark Astley |
Low-Overhead Message Tracking for Distributed Messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware ![In: Middleware 2006, ACM/IFIP/USENIX 7th International Middleware Conference, Melbourne, Australia, November 27-December 1, 2006, Proceedings, pp. 363-381, 2006, Springer, 3-540-49023-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Fernando Godínez, Dieter Hutter, Raúl Monroy |
On the Role of Information Compaction to Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSADS ![In: Advanced Distributed Systems: 5th International School and Symposium, ISSADS 2005, Guadalajara, Mexico, January 24-28, 2005, Revised Selected Papers, pp. 83-97, 2005, Springer, 3-540-28063-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Bruce Christianson, Partha Das Chowdhury, James A. Malcolm |
Auditable Anonymous Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 66-76, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Anne Rozinat, Wil M. P. van der Aalst |
Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Business Process Management Workshops ![In: Business Process Management Workshops, BPM 2005 International Workshops, BPI, BPD, ENEI, BPRM, WSCOBPM, BPS, Nancy, France, September 5, 2005, Revised Selected Papers, pp. 163-176, 2005, 3-540-32595-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Ulf Larson, Emilie Lundin Barse, Erland Jonsson |
METAL - A Tool for Extracting Attack Manifestations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings, pp. 85-102, 2005, Springer, 3-540-26613-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Automated attack analysis, log data, intrusion detection, system calls |
19 | Ling Lan |
Enhancing e-Democracy Via Fiscal Transparency: A Discussion Based on China's Experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCGOV ![In: E-Government: Towards Electronic Democracy, International Conference, TCGOV 2005, Bolzano, Italy, March 2-4, 2005, Proceedings, pp. 57-69, 2005, Springer, 3-540-25016-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Roy A. Maxion, Tahlia N. Townsend |
Masquerade detection augmented with error analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 53(1), pp. 124-147, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Henry M. Gladney |
Trustworthy 100-year digital objects: Evidence after every witness is dead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 22(3), pp. 406-436, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Aki Namioka, Cary Bran |
eXtreme ISO ?!? ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2004, October 24-28, 2004, Vancouver, BC, Canada, pp. 260-263, 2004, ACM, 1-58113-833-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ISO 9001 compliance, eXtreme programming, agile methodologies |
19 | Bruce Christianson |
Anonymous Authentication (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 306-311, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Matthias Grabert, Markus Prechtel, Tomas Hrycej, Winfried Günther |
An Early Warning System for Vehicle Related Quality Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Advances in Data Mining, Applications in Image Mining, Medicine and Biotechnology, Management and Environmental Control, and Telecommunications, 4th Industrial Conference on Data Mining, ICDM 2004, Leipzig, Germany, July 4-7, 2004, Revised Selected Papers, pp. 88-95, 2004, Springer, 3-540-24054-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Mikhail Petrovskiy |
A Fuzzy Kernel-Based Method for Real-Time Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICS ![In: Innovative Internet Community Systems, Third International Workshop, IICS 2003, Leipzig, Germany, June 19-21, 2003, Revised Papers, pp. 189-200, 2003, Springer, 3-540-20436-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Xian Rao, Cun-xi Dong, Shao-quan Yang |
Statistic Learning and Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSFDGrC ![In: Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing, 9th International Conference, RSFDGrC 2003, Chongqing, China, May 26-29, 2003, Proceedings, pp. 652-659, 2003, Springer, 3-540-14040-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
statistic learning intrusion detection network security support vector machines neural network |
19 | Guohun Zhu, YuQing Miao |
Co-operative Monitor Web Page Based on MD5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (2) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part II, pp. 179-182, 2003, Springer, 3-540-21993-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Christoph C. Michael, Anup K. Ghosh |
Simple, state-based approaches to program-based anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(3), pp. 203-237, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
machine learning, intrusion detection, Anomaly detection, finite automata, information system security |
19 | Wenke Lee |
Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 4(2), pp. 35-42, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Bayesian detection rate, model efficiency, intrusion detection, feature construction |
19 | Ibrahim Khalil, Torsten Braun |
Automated service provisioning in heterogeneous large-scale environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: Management Solutions for the New Communications World, 8th IEEE/IFIP Network Operations and Management Symposium, NOMS 2002, Florence, Italy, April 15-19, 2002. Proceedings, pp. 575-588, 2002, IEEE, 0-7803-7383-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Yingjiu Li, Lingyu Wang 0001, Xiaoyang Sean Wang, Sushil Jajodia |
Auditing Interval-Based Inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 14th International Conference, CAiSE 2002, Toronto, Canada, May 27-31, 2002, Proceedings, pp. 553-567, 2002, Springer, 3-540-43738-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | B. Clifford Neuman |
Condition-Driven Integration of Security Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 176, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Chapman Flack, Mikhail J. Atallah |
Better Logging through Formality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings, pp. 1-16, 2000, Springer, 3-540-41085-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
CIDF, reliability, interoperability, specification, documentation, grammar, formal, log, BSM |
19 | Raymond J. Butler |
Is This Spreadsheet a Tax Evader? How H.M. Customs and Excise Test Spreadsheet Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 4-7 January, 2000, Maui, Hawaii, USA, 2000, IEEE Computer Society, 0-7695-0493-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Testing, Errors, Auditing, Spreadsheets, End-Users |
19 | Michael zur Muehlen, Michael Rosemann |
Workflow-based Process Monitoring and Controlling - Technical and Organizational Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 4-7 January, 2000, Maui, Hawaii, USA, 2000, IEEE Computer Society, 0-7695-0493-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Process Evaluation, Process Information Systems, Office Systems, Collaborative Work Systems, Monitoring, Controlling, Workflow Management, Business Process Management, Management Information Systems |
19 | Santosh K. Shrivastava |
Inter-task Co-ordination in Long-Lived Distributed Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 12th International Symposium, DISC '98, Andros, Greece, September 24-26, 1998, Proceedings, pp. 20-21, 1998, Springer, 3-540-65066-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Kay M. Nelson, Alexander Kogan, Rajendra P. Srivastava, Miklos A. Vasarhelyi |
Virtual Auditing Agents: The Edgar Agent Example. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (4) ![In: Thirty-First Annual Hawaii International Conference on System Sciences, Kohala Coast, Hawaii, USA, January 6-9, 1998, pp. 396-404, 1998, IEEE Computer Society, 0-8186-8255-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Laurence James |
Automatic requirements specification update processing from a requirements management tool perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 1997 Workshop on Engineering of Computer-Based Systems (ECBS '97), March 24-28, 1997, Monterey, CA, USA, pp. 2-9, 1997, IEEE Computer Society, 0-8186-7889-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Chee-Kit Looi, S. L. Tan, P. C. Teow, H. S. Chan |
A knowledge-based approach for internal control evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE (1) ![In: Proceedings of the Second International Conference on Industrial & Engineering Applications of Artificial Intelligence & Expert Systems, IEA/AIE 1989, June 6-9, 1989, Tullahoma, TN, USA - Volume 1, pp. 254-261, 1989, ACM, 0-89791-320-5. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
16 | Solange Ghernaouti-Helie, David Simms, Igli Tashi |
Protecting Information in a Connected World: A Question of Security and of Confidence in Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011, pp. 208-212, 2011, IEEE Computer Society, 978-1-4577-0789-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Networked society, security doctrine, complexity, dependency, information security, risk management, audit, vulnerability, compliance, confidence |
16 | David W. Chadwick, Stijn F. Lievens, Jerry den Hartog, Andreas Pashalidis, Joseph Alhadeff |
My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: IEEE International Conference on Cloud Computing, CLOUD 2011, Washington, DC, USA, 4-9 July, 2011, pp. 752-753, 2011, IEEE Computer Society, 978-1-4577-0836-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trust, Reputation, Audit, Trust Negotiation, Sticky Policies |
16 | Romuald Thion, Daniel Le Métayer |
FLAVOR: A Formal Language for a Posteriori Verification of Legal Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 1-8, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
audit, compliance, obligations |
16 | James McGovern, Gunnar Peterson |
10 Quick, Dirty, and Cheap Things to Improve Enterprise Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 8(2), pp. 83-85, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
software development, software security, security and privacy, threat modeling, enterprise software, audit logging |
16 | Zhonghua Deng, Ying Wu |
Overcoming Disadvantages by Making Full Use of Extrinsic Objects: Advancing Information Resource Construction by ISA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IITSI ![In: Third International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, Jinggangshan, China, April 2-4, 2010, pp. 658-662, 2010, IEEE Computer Society, 978-0-7695-4020-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Information system audit, Management, Information resource |
16 | Bonnie W. Morris, Cynthia D. Tanner, Joseph D'Alessandro |
Enabling Trust through Continuous Compliance Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 708-713, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Embedded Audit Process, Monitored Information Exchange, XML Based Processing, Trusted Information Sharing, Regulatory Compliance |
16 | Sebastian Schmerl, Michael Vogel, René Rietz, Hartmut König |
Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2010, Oakland, CA, USA, May 20, 2010, pp. 109-118, 2010, IEEE Computer Society, 978-0-7695-4052-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Audit Data Analysis, Attack Signatures, Intrusion Detection, Computer Security, Data Visualization, Computer Forensic, Misuse Detection |
16 | Chrysovalantis Gaganis, Constantin Zopounidis |
Multicriteria Decision Support Methodologies for Auditing Decisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Optimization ![In: Encyclopedia of Optimization, Second Edition, pp. 2362-2372, 2009, Springer, 978-0-387-74758-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Qualified audit reports, Classification, Auditing, Multicriteria decision aid |
16 | Joseph D'Alessandro, Cynthia D. Tanner, Bonnie W. Morris, Tim Menzies |
Is Continuous Compliance Assurance Possible? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 1599, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Embedded Audit Process, Monitored Information Exchange, XML Based Processing, Regulatory Compliance |
16 | Javier Andrade Garda, Juan Ares Casal, Rafael García, Santiago Rodríguez Yáñez, María Seoane, Sonia Suárez |
A Knowledge-Based System for CMM Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Challenges in Applied Intelligence Technologies ![In: New Challenges in Applied Intelligence Technologies, pp. 183-191, 2008, Springer, 978-3-540-79354-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Key Process Area, Knowledge-Based System, Audit, Capability Maturity Model, Clips, CommonKADS |
16 | Haixun Wang, Jian Yin 0002, Chang-Shing Perng, Philip S. Yu |
Dual encryption for query integrity assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM 2008, Napa Valley, California, USA, October 26-30, 2008, pp. 863-872, 2008, ACM, 978-1-59593-991-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
database outsourcing, security, integrity, encryption, audit |
16 | Thusitha De Silva Mabotuwana, Jim Warren 0001 |
A Semantic Web Technology Based Approach to Identify Hypertensive Patients for Follow-Up/Recall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBMS ![In: Proceedings of the Twenty-First IEEE International Symposium on Computer-Based Medical Systems, June 17-19, 2008, Jyväskylä, Finland, pp. 318-323, 2008, IEEE Computer Society, 978-0-7695-3165-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Clinical audit, medication possession ratio, hypertension |
16 | Sugan C. Jain, Dilip Kumar Sen, Muinuddin Khan, Swapan Kumar Bala |
An analytical study on social responsibility performance evaluation as an accounting measure of management efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI Soc. ![In: AI Soc. 21(3), pp. 251-266, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Corporate social responsibility, Management and social audit, Management efficiency, Performance evaluation |
16 | Michael Elliott, Ray Dawson, Janet Edwards |
An analysis of software quality management at AWE plc. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Qual. J. ![In: Softw. Qual. J. 15(4), pp. 347-363, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ISO900:2001, Implementation, Culture, Audit |
16 | Yolanta Beres, Adrian Baldwin, Simon Shiu |
Model-based assurance of security controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 55, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
control effectiveness, models, risk, audit, assurance |
16 | Teresa Fernandez, Michael Grinnell, Eric Weakland |
Poof: no more viruses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 35th Annual ACM SIGUCCS Conference on User Services 2007, Orlando, Florida, USA, October 7-10, 2007, pp. 96-100, 2007, ACM, 978-1-59593-634-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cisco clean access, network admission control, requirements selection, transition strategy, deployment, malware, audit, virus, microsoft windows, remediation, enforcement, infection |
16 | Hyun-A Park, Dong Hoon Lee 0001, Jongin Lim 0001, Sang Hyun Cho |
PPIDS: Privacy Preserving Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 269-274, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Host-based IDS, Privacy, Intrusion Detection System, Audit log, Privacy Homomorphism |
16 | Yin Pan |
Security auditing course development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 8th Conference on Information Technology Education, SIGITE 2007, Destin, Florida, USA, October 18-20, 2007, pp. 259-266, 2007, ACM, 978-1-59593-920-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, IT education, curriculum development, IT audit |
16 | Giuseppe Ateniese, Chris Riley, Christian Scheideler |
Survivable Monitoring in Dynamic Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 5(9), pp. 1242-1254, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Monitoring, network intrusion detection, emergency communication, audit logs, survivable storage |
16 | Cindy Dooling, Jeff White, Cathy Lee |
Software management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, Edmonton, Alberta, Canada, November 5-8, 2006, pp. 89-93, 2006, ACM, 1-59593-438-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
administrative support, communication, training, computers, audit, licenses, software management, principles |
16 | Masato Masuya, Takashi Yamanoue, Shinichiro Kubota |
An experience of monitoring university network security using a commercial service and DIY monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, Edmonton, Alberta, Canada, November 5-8, 2006, pp. 225-230, 2006, ACM, 1-59593-438-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
fire wall, security, network, monitor, policy, IDS, audit |
16 | Rajendra Bose, James Frew |
Lineage retrieval for scientific data processing: a survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 37(1), pp. 1-28, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
scientific workflow, audit, data provenance, scientific data, Data lineage |
16 | Giuseppe Ateniese, Chris Riley, Christian Scheideler |
Survivable Monitoring in Dynamic Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 33-47, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
monitoring, network intrusion detection, emergency communication, audit logs, survivable storage |
16 | Rajendra P. Srivastava, Liping Liu |
Applications of Belief Functions in Business Decisions: A Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 5(4), pp. 359-378, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Dempster-Shafer theory of belief functions, linear belief functions, audit decision, hierarchical evidence, versatile evidence, statistical evidence, judgment under ambiguity |
16 | Ramzi A. Haraty |
C2 Secure Database Management Systems - A Comparative Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 1999 ACM Symposium on Applied Computing, SAC'99, San Antonio, Texas, USA, February 28 - March 2, 1999, pp. 216-220, 1999, ACM, 1-58113-086-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
security policy, audit, discretionary access control |
16 | Bob Briscoe, Ian Fairman |
Nark: receiver-based multicast non-repudiation and key management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings of the First ACM Conference on Electronic Commerce (EC-99), Denver, CO, USA, November 3-5, 1999, pp. 22-30, 1999, ACM, 1-58113-176-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Internet, multicast, watermark, key management, smartcard, non-repudiation, audit trail |
16 | Shiuh-Pyng Shieh, Virgil D. Gligor |
On a Pattern-Oriented Model for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 9(4), pp. 661-667, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Access misuse, audit analysis, context-dependent intrusion, operational security problems, rule-based methods, intrusion detection, statistical methods, secure systems |
16 | P. Rolin, Laurent Toutain, Sylvain Gombault |
Network Security Probe. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 229-240, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Network Security Probe, security, access control, audit, intrusion |
16 | Joost Verhofstad |
Recovery and Carsh Resistance in a Filing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1977 ACM SIGMOD International Conference on Management of Data, Toronto, Canada, August 3-5, 1977., pp. 158-167, 1977, ACM, 978-1-4503-7343-2. The full citation details ...](Pics/full.jpeg) |
1977 |
DBLP DOI BibTeX RDF |
audit trial, backing out, crash resistance, recovery cache (=recursive cache), fault tolerance, consistency, filing system, error recovery, recovery block |
13 | Jie Li |
Digital engineering audit management strategy based on machine learning combined with wireless communication network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 46(2), pp. 5391-5403, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Xiong Wang, Fernando A. F. Ferreira, Pengyu Yan |
Correction to: A multi-objective optimization approach for integrated risk-based internal audit planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 332(1), pp. 1163, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Christi Sevits, Alex D. McAllister |
Developing an Introductory Diversity Audit at Liberty Public Library: An Action Research Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Libr. Q. ![In: Public Libr. Q. 43(3), pp. 286-306, May 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Daniel Hechter, Hanlie Smuts |
Performing a Knowledge Audit Within a South African Chemical Manufacturer: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Knowl. Manag. ![In: Int. J. Knowl. Manag. 20, pp. 1-21, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Jianhua Wang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yixiang Wang |
PASS: A Parameter Audit-Based Secure and Fair Federated Learning Scheme Against Free-Rider Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(1), pp. 1374-1384, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yilin Yuan, Fan Yang, Xiao Wang, Yimin Tian, Zichen Li |
Multi-replicas integrity checking scheme with supporting probability audit for cloud-based IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PeerJ Comput. Sci. ![In: PeerJ Comput. Sci. 10, pp. e1790, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Mark McGowan, Filipe Correia Martins, Jodi-Louise Keen, Amelia Whitehead, Ellie Davis, Pubudu Pathiraja, Helen Bolton, Peter Baldwin |
Can natural language processing be effectively applied for audit data analysis in gynaecological oncology at a UK cancer centre? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Medical Informatics ![In: Int. J. Medical Informatics 182, pp. 105306, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 1955 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|