The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Audit with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1977 (18) 1980-1984 (21) 1985-1988 (17) 1989-1990 (15) 1991-1992 (15) 1993-1995 (17) 1996-1997 (26) 1998 (15) 1999 (28) 2000 (35) 2001 (33) 2002 (35) 2003 (47) 2004 (65) 2005 (76) 2006 (87) 2007 (98) 2008 (113) 2009 (72) 2010 (55) 2011 (60) 2012 (49) 2013 (38) 2014 (55) 2015 (65) 2016 (54) 2017 (60) 2018 (65) 2019 (80) 2020 (87) 2021 (133) 2022 (161) 2023 (127) 2024 (33)
Publication types (Num. hits)
article(763) book(2) data(1) incollection(11) inproceedings(1159) phdthesis(18) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 809 occurrences of 533 keywords

Results
Found 1957 publication records. Showing 1955 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23Timothy Neville, Matthew Sorell Audit Log for Forensic Photography. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF crime investigation, forensic investigation, digital negative, Digital photography
23Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely Towards a Theory of Accountability and Audit. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Malcolm J. Beynon The Application of Fuzzy Decision Trees in Company Audit Fee Evaluation: A Sensitivity Analysis. Search on Bibsonomy Soft Computing Applications in Business The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Cai Zhiming, Yin Jun The Process Conducting and Member Audit in the Distributed Enterprise Modeling. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Ruixuan Li 0001, Cuihua Zuo, Yuntian He, Zhengding Lu A Credit Mechanism Based on Automatic Audit in P2P File Sharing Systems. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23MyungJoo Ham, Gul A. Agha A Robust Audit Mechanism to Prevent Malicious Behaviors in Multi-robot Systems. Search on Bibsonomy SASO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Gabriel Murray, Thomas Kleinbauer, Peter Poller, Steve Renals, Jonathan Kilgour, Tilman Becker Extrinsic Summarization Evaluation: A Decision Audit Task. Search on Bibsonomy MLMI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Birgit Pfitzmann Multi-layer Audit of Access Rights. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Naga Ayachitula, Melissa J. Buco, Yixin Diao, Bradford Fisher, David Loewenstern, Christopher Ward IT Service Management Automation - An Automation Centric Approach Leveraging Configuration Control, Audit Verification and Process Analytics. Search on Bibsonomy DSOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Brian Shand, Jem Rashbass Middleware Support for Monitoring: Privacy and Audit in Healthcare Applications. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Lillian Røstad, Ole Edsberg A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson Universally Composable Time-Stamping Schemes with Audit. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Bengt Carlsson, Dejan Baca Software Security Analysis - Execution Phase Audit. Search on Bibsonomy EUROMICRO-SEAA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Darren Davis, Fabian Monrose, Michael K. Reiter Time-Scoped Searching of Encrypted Audit Logs. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Mati Golani, Shlomit S. Pinter Generating a Process Model from a Process Audit Log. Search on Bibsonomy Business Process Management The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vilbert Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multivariate statistical analysis, chi-square test and Hotelling's rm T^2 test, intrusion detection, Computer security
23Mark Keil 0001, Joan Mann Understanding the Nature and Extent of IS Project Escalation: Results from a Survey of IS Audit and Control Professionals. Search on Bibsonomy HICSS (3) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
19Maria Chiara Leva, Alison M. Kay, Joan Cahill, Gabriel Losa, Sharon Keating, Diogo Serradas, Nick McDonald Unique Reporting Form: Flight Crew Auditing of Everyday Performance in an Airline Safety Management System. Search on Bibsonomy HCI (9) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF threat & error management, safety management systems, Human Factors, performance monitoring, task support
19Wei Wang 0012, Florent Masseglia, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier A general framework for adaptive and online detection of web attacks. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, intrusion detection, anomaly detection
19Yurdaer N. Doganata, Francisco Curbera Effect of Using Automated Auditing Tools on Detecting Compliance Failures in Unmanaged Processes. Search on Bibsonomy BPM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Topics covered BPM Governance and Compliance, Management Issues and Empirical Studies, Non-traditional BPM Scenarios
19Nikhil Kumar, Dinakar Sosale, Sadhana Nivedita Konuganti, Ajay Rathi Enabling the adoption of aspects - testing aspects: a risk model, fault model and patterns. Search on Bibsonomy AOSD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF weaver, woven code, testing, aspect-oriented programming, eclipse, aspectj, bytecode, decompilation
19Cédric Fournet, Nataliya Guts, Francesco Zappa Nardelli A Formal Implementation of Value Commitment. Search on Bibsonomy ESOP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Vikram Goyal, Shyam K. Gupta 0001, Manish Singh, Anand Gupta Auditing Inference Based Disclosures in Dynamic Databases. Search on Bibsonomy Secure Data Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Magnus Almgren, Ulf Lindqvist, Erland Jonsson A Multi-Sensor Model to Improve Automated Attack Detection. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF alert reasoning, intrusion detection
19Chunfu Jia, Deqiang Chen, Kai Lin The Application of the Relative Entropy Density Divergence in Intrusion Detection Models. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Liqun Zhang, Haiyang Wang A Block-Structured Mining Approach to Support Process Discovery. Search on Bibsonomy FSKD (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Emilio Soler, Juan Trujillo 0001, Eduardo Fernández-Medina, Mario Piattini Application of QVT for the Development of Secure Data Warehouses: A case study. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Florian Kerschbaum Distance-preserving pseudonymization for timestamps and spatial data. Search on Bibsonomy WPES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, hash functions, pseudonymization, distributed intrusion detection
19Wei Chen 0135, Jin-cheng Zhang, Yu-quan Jiang One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA). Search on Bibsonomy I3E (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Xin Jin, Sylvia L. Osborn Architecture for Data Collection in Database Intrusion Detection Systems. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF database IDS, intrusion detection, database security
19Apu Kapadia, Prasad Naldurg, Roy H. Campbell Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall. Search on Bibsonomy POLICY The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Jorge Coelho 0001, Mário Florido Type-Based Static and Dynamic Website Verification. Search on Bibsonomy ICIW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Brian Shand, Jem Rashbass Traceability and Timeliness in Messaging Middleware. Search on Bibsonomy OTM Workshops (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19William P. Murphy III EMS: a homegrown identity management system. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF HR, peoplesoft, username, web, email, identity, website, web-based, PHP, inventory, MySQL, human resources, ID, employee
19Jeffrey M. Stanton, Isabelle J. Fagnot Extracting Useful Information from Security Assessment Interviews. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Juan Trujillo 0001, Mario Piattini Using UML Packages for Designing Secure Data Warehouses. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Dong Seong Kim 0001, Sang Min Lee 0018, Jong Sou Park Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data mining, Intrusion Detection System, Random Forest
19Christian W. Probst, René Rydhof Hansen, Flemming Nielson Where Can an Insider Attack? Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Seung Jun, Mark Astley Low-Overhead Message Tracking for Distributed Messaging. Search on Bibsonomy Middleware The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Fernando Godínez, Dieter Hutter, Raúl Monroy On the Role of Information Compaction to Intrusion Detection. Search on Bibsonomy ISSADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Bruce Christianson, Partha Das Chowdhury, James A. Malcolm Auditable Anonymous Delegation. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Anne Rozinat, Wil M. P. van der Aalst Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models. Search on Bibsonomy Business Process Management Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Ulf Larson, Emilie Lundin Barse, Erland Jonsson METAL - A Tool for Extracting Attack Manifestations. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Automated attack analysis, log data, intrusion detection, system calls
19Ling Lan Enhancing e-Democracy Via Fiscal Transparency: A Discussion Based on China's Experience. Search on Bibsonomy TCGOV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Roy A. Maxion, Tahlia N. Townsend Masquerade detection augmented with error analysis. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Henry M. Gladney Trustworthy 100-year digital objects: Evidence after every witness is dead. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Aki Namioka, Cary Bran eXtreme ISO ?!? Search on Bibsonomy OOPSLA Companion The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ISO 9001 compliance, eXtreme programming, agile methodologies
19Bruce Christianson Anonymous Authentication (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Matthias Grabert, Markus Prechtel, Tomas Hrycej, Winfried Günther An Early Warning System for Vehicle Related Quality Data. Search on Bibsonomy ICDM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Mikhail Petrovskiy A Fuzzy Kernel-Based Method for Real-Time Network Intrusion Detection. Search on Bibsonomy IICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Xian Rao, Cun-xi Dong, Shao-quan Yang Statistic Learning and Intrusion Detection. Search on Bibsonomy RSFDGrC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF statistic learning intrusion detection network security support vector machines neural network
19Guohun Zhu, YuQing Miao Co-operative Monitor Web Page Based on MD5. Search on Bibsonomy GCC (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Christoph C. Michael, Anup K. Ghosh Simple, state-based approaches to program-based anomaly detection. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF machine learning, intrusion detection, Anomaly detection, finite automata, information system security
19Wenke Lee Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Bayesian detection rate, model efficiency, intrusion detection, feature construction
19Ibrahim Khalil, Torsten Braun Automated service provisioning in heterogeneous large-scale environment. Search on Bibsonomy NOMS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Yingjiu Li, Lingyu Wang 0001, Xiaoyang Sean Wang, Sushil Jajodia Auditing Interval-Based Inference. Search on Bibsonomy CAiSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19B. Clifford Neuman Condition-Driven Integration of Security Services. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Chapman Flack, Mikhail J. Atallah Better Logging through Formality. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF CIDF, reliability, interoperability, specification, documentation, grammar, formal, log, BSM
19Raymond J. Butler Is This Spreadsheet a Tax Evader? How H.M. Customs and Excise Test Spreadsheet Applications. Search on Bibsonomy HICSS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Testing, Errors, Auditing, Spreadsheets, End-Users
19Michael zur Muehlen, Michael Rosemann Workflow-based Process Monitoring and Controlling - Technical and Organizational Issues. Search on Bibsonomy HICSS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Process Evaluation, Process Information Systems, Office Systems, Collaborative Work Systems, Monitoring, Controlling, Workflow Management, Business Process Management, Management Information Systems
19Santosh K. Shrivastava Inter-task Co-ordination in Long-Lived Distributed Applications. Search on Bibsonomy DISC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Kay M. Nelson, Alexander Kogan, Rajendra P. Srivastava, Miklos A. Vasarhelyi Virtual Auditing Agents: The Edgar Agent Example. Search on Bibsonomy HICSS (4) The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Laurence James Automatic requirements specification update processing from a requirements management tool perspective. Search on Bibsonomy ECBS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
19Chee-Kit Looi, S. L. Tan, P. C. Teow, H. S. Chan A knowledge-based approach for internal control evaluation. Search on Bibsonomy IEA/AIE (1) The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
16Solange Ghernaouti-Helie, David Simms, Igli Tashi Protecting Information in a Connected World: A Question of Security and of Confidence in Security. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Networked society, security doctrine, complexity, dependency, information security, risk management, audit, vulnerability, compliance, confidence
16David W. Chadwick, Stijn F. Lievens, Jerry den Hartog, Andreas Pashalidis, Joseph Alhadeff My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud. Search on Bibsonomy IEEE CLOUD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Security, Privacy, Trust, Reputation, Audit, Trust Negotiation, Sticky Policies
16Romuald Thion, Daniel Le Métayer FLAVOR: A Formal Language for a Posteriori Verification of Legal Rules. Search on Bibsonomy POLICY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF audit, compliance, obligations
16James McGovern, Gunnar Peterson 10 Quick, Dirty, and Cheap Things to Improve Enterprise Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF software development, software security, security and privacy, threat modeling, enterprise software, audit logging
16Zhonghua Deng, Ying Wu Overcoming Disadvantages by Making Full Use of Extrinsic Objects: Advancing Information Resource Construction by ISA. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Information system audit, Management, Information resource
16Bonnie W. Morris, Cynthia D. Tanner, Joseph D'Alessandro Enabling Trust through Continuous Compliance Assurance. Search on Bibsonomy ITNG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Embedded Audit Process, Monitored Information Exchange, XML Based Processing, Trusted Information Sharing, Regulatory Compliance
16Sebastian Schmerl, Michael Vogel, René Rietz, Hartmut König Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development. Search on Bibsonomy SADFE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Audit Data Analysis, Attack Signatures, Intrusion Detection, Computer Security, Data Visualization, Computer Forensic, Misuse Detection
16Chrysovalantis Gaganis, Constantin Zopounidis Multicriteria Decision Support Methodologies for Auditing Decisions. Search on Bibsonomy Encyclopedia of Optimization The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Qualified audit reports, Classification, Auditing, Multicriteria decision aid
16Joseph D'Alessandro, Cynthia D. Tanner, Bonnie W. Morris, Tim Menzies Is Continuous Compliance Assurance Possible? Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Embedded Audit Process, Monitored Information Exchange, XML Based Processing, Regulatory Compliance
16Javier Andrade Garda, Juan Ares Casal, Rafael García, Santiago Rodríguez Yáñez, María Seoane, Sonia Suárez A Knowledge-Based System for CMM Evaluation. Search on Bibsonomy New Challenges in Applied Intelligence Technologies The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Key Process Area, Knowledge-Based System, Audit, Capability Maturity Model, Clips, CommonKADS
16Haixun Wang, Jian Yin 0002, Chang-Shing Perng, Philip S. Yu Dual encryption for query integrity assurance. Search on Bibsonomy CIKM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF database outsourcing, security, integrity, encryption, audit
16Thusitha De Silva Mabotuwana, Jim Warren 0001 A Semantic Web Technology Based Approach to Identify Hypertensive Patients for Follow-Up/Recall. Search on Bibsonomy CBMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Clinical audit, medication possession ratio, hypertension
16Sugan C. Jain, Dilip Kumar Sen, Muinuddin Khan, Swapan Kumar Bala An analytical study on social responsibility performance evaluation as an accounting measure of management efficiency. Search on Bibsonomy AI Soc. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Corporate social responsibility, Management and social audit, Management efficiency, Performance evaluation
16Michael Elliott, Ray Dawson, Janet Edwards An analysis of software quality management at AWE plc. Search on Bibsonomy Softw. Qual. J. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ISO900:2001, Implementation, Culture, Audit
16Yolanta Beres, Adrian Baldwin, Simon Shiu Model-based assurance of security controls. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF control effectiveness, models, risk, audit, assurance
16Teresa Fernandez, Michael Grinnell, Eric Weakland Poof: no more viruses. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cisco clean access, network admission control, requirements selection, transition strategy, deployment, malware, audit, virus, microsoft windows, remediation, enforcement, infection
16Hyun-A Park, Dong Hoon Lee 0001, Jongin Lim 0001, Sang Hyun Cho PPIDS: Privacy Preserving Intrusion Detection System. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Host-based IDS, Privacy, Intrusion Detection System, Audit log, Privacy Homomorphism
16Yin Pan Security auditing course development. Search on Bibsonomy SIGITE Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, IT education, curriculum development, IT audit
16Giuseppe Ateniese, Chris Riley, Christian Scheideler Survivable Monitoring in Dynamic Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Monitoring, network intrusion detection, emergency communication, audit logs, survivable storage
16Cindy Dooling, Jeff White, Cathy Lee Software management. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF administrative support, communication, training, computers, audit, licenses, software management, principles
16Masato Masuya, Takashi Yamanoue, Shinichiro Kubota An experience of monitoring university network security using a commercial service and DIY monitoring. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fire wall, security, network, monitor, policy, IDS, audit
16Rajendra Bose, James Frew Lineage retrieval for scientific data processing: a survey. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF scientific workflow, audit, data provenance, scientific data, Data lineage
16Giuseppe Ateniese, Chris Riley, Christian Scheideler Survivable Monitoring in Dynamic Networks. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF monitoring, network intrusion detection, emergency communication, audit logs, survivable storage
16Rajendra P. Srivastava, Liping Liu Applications of Belief Functions in Business Decisions: A Review. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Dempster-Shafer theory of belief functions, linear belief functions, audit decision, hierarchical evidence, versatile evidence, statistical evidence, judgment under ambiguity
16Ramzi A. Haraty C2 Secure Database Management Systems - A Comparative Study. Search on Bibsonomy SAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF security policy, audit, discretionary access control
16Bob Briscoe, Ian Fairman Nark: receiver-based multicast non-repudiation and key management. Search on Bibsonomy EC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Internet, multicast, watermark, key management, smartcard, non-repudiation, audit trail
16Shiuh-Pyng Shieh, Virgil D. Gligor On a Pattern-Oriented Model for Intrusion Detection. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Access misuse, audit analysis, context-dependent intrusion, operational security problems, rule-based methods, intrusion detection, statistical methods, secure systems
16P. Rolin, Laurent Toutain, Sylvain Gombault Network Security Probe. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Network Security Probe, security, access control, audit, intrusion
16Joost Verhofstad Recovery and Carsh Resistance in a Filing System. Search on Bibsonomy SIGMOD Conference The full citation details ... 1977 DBLP  DOI  BibTeX  RDF audit trial, backing out, crash resistance, recovery cache (=recursive cache), fault tolerance, consistency, filing system, error recovery, recovery block
13Jie Li Digital engineering audit management strategy based on machine learning combined with wireless communication network. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Xiong Wang, Fernando A. F. Ferreira, Pengyu Yan Correction to: A multi-objective optimization approach for integrated risk-based internal audit planning. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Christi Sevits, Alex D. McAllister Developing an Introductory Diversity Audit at Liberty Public Library: An Action Research Approach. Search on Bibsonomy Public Libr. Q. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Daniel Hechter, Hanlie Smuts Performing a Knowledge Audit Within a South African Chemical Manufacturer: A Case Study. Search on Bibsonomy Int. J. Knowl. Manag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Jianhua Wang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yixiang Wang PASS: A Parameter Audit-Based Secure and Fair Federated Learning Scheme Against Free-Rider Attack. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yilin Yuan, Fan Yang, Xiao Wang, Yimin Tian, Zichen Li Multi-replicas integrity checking scheme with supporting probability audit for cloud-based IoT. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Mark McGowan, Filipe Correia Martins, Jodi-Louise Keen, Amelia Whitehead, Ellie Davis, Pubudu Pathiraja, Helen Bolton, Peter Baldwin Can natural language processing be effectively applied for audit data analysis in gynaecological oncology at a UK cancer centre? Search on Bibsonomy Int. J. Medical Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 1955 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license