|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 809 occurrences of 533 keywords
|
|
|
Results
Found 1957 publication records. Showing 1955 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Timothy Neville, Matthew Sorell |
Audit Log for Forensic Photography. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
crime investigation, forensic investigation, digital negative, Digital photography |
23 | Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely |
Towards a Theory of Accountability and Audit. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Malcolm J. Beynon |
The Application of Fuzzy Decision Trees in Company Audit Fee Evaluation: A Sensitivity Analysis. |
Soft Computing Applications in Business |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Cai Zhiming, Yin Jun |
The Process Conducting and Member Audit in the Distributed Enterprise Modeling. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Ruixuan Li 0001, Cuihua Zuo, Yuntian He, Zhengding Lu |
A Credit Mechanism Based on Automatic Audit in P2P File Sharing Systems. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
23 | MyungJoo Ham, Gul A. Agha |
A Robust Audit Mechanism to Prevent Malicious Behaviors in Multi-robot Systems. |
SASO |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Gabriel Murray, Thomas Kleinbauer, Peter Poller, Steve Renals, Jonathan Kilgour, Tilman Becker |
Extrinsic Summarization Evaluation: A Decision Audit Task. |
MLMI |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Birgit Pfitzmann |
Multi-layer Audit of Access Rights. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Naga Ayachitula, Melissa J. Buco, Yixin Diao, Bradford Fisher, David Loewenstern, Christopher Ward |
IT Service Management Automation - An Automation Centric Approach Leveraging Configuration Control, Audit Verification and Process Analytics. |
DSOM |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Brian Shand, Jem Rashbass |
Middleware Support for Monitoring: Privacy and Audit in Healthcare Applications. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Lillian Røstad, Ole Edsberg |
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson |
Universally Composable Time-Stamping Schemes with Audit. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Bengt Carlsson, Dejan Baca |
Software Security Analysis - Execution Phase Audit. |
EUROMICRO-SEAA |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Darren Davis, Fabian Monrose, Michael K. Reiter |
Time-Scoped Searching of Encrypted Audit Logs. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Mati Golani, Shlomit S. Pinter |
Generating a Process Model from a Process Audit Log. |
Business Process Management |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vilbert |
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection. |
IEEE Trans. Computers |
2002 |
DBLP DOI BibTeX RDF |
multivariate statistical analysis, chi-square test and Hotelling's rm T^2 test, intrusion detection, Computer security |
23 | Mark Keil 0001, Joan Mann |
Understanding the Nature and Extent of IS Project Escalation: Results from a Survey of IS Audit and Control Professionals. |
HICSS (3) |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Maria Chiara Leva, Alison M. Kay, Joan Cahill, Gabriel Losa, Sharon Keating, Diogo Serradas, Nick McDonald |
Unique Reporting Form: Flight Crew Auditing of Everyday Performance in an Airline Safety Management System. |
HCI (9) |
2009 |
DBLP DOI BibTeX RDF |
threat & error management, safety management systems, Human Factors, performance monitoring, task support |
19 | Wei Wang 0012, Florent Masseglia, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier |
A general framework for adaptive and online detection of web attacks. |
WWW |
2009 |
DBLP DOI BibTeX RDF |
clustering, intrusion detection, anomaly detection |
19 | Yurdaer N. Doganata, Francisco Curbera |
Effect of Using Automated Auditing Tools on Detecting Compliance Failures in Unmanaged Processes. |
BPM |
2009 |
DBLP DOI BibTeX RDF |
Topics covered BPM Governance and Compliance, Management Issues and Empirical Studies, Non-traditional BPM Scenarios |
19 | Nikhil Kumar, Dinakar Sosale, Sadhana Nivedita Konuganti, Ajay Rathi |
Enabling the adoption of aspects - testing aspects: a risk model, fault model and patterns. |
AOSD |
2009 |
DBLP DOI BibTeX RDF |
weaver, woven code, testing, aspect-oriented programming, eclipse, aspectj, bytecode, decompilation |
19 | Cédric Fournet, Nataliya Guts, Francesco Zappa Nardelli |
A Formal Implementation of Value Commitment. |
ESOP |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Vikram Goyal, Shyam K. Gupta 0001, Manish Singh, Anand Gupta |
Auditing Inference Based Disclosures in Dynamic Databases. |
Secure Data Management |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Magnus Almgren, Ulf Lindqvist, Erland Jonsson |
A Multi-Sensor Model to Improve Automated Attack Detection. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
alert reasoning, intrusion detection |
19 | Chunfu Jia, Deqiang Chen, Kai Lin |
The Application of the Relative Entropy Density Divergence in Intrusion Detection Models. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Liqun Zhang, Haiyang Wang |
A Block-Structured Mining Approach to Support Process Discovery. |
FSKD (4) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Emilio Soler, Juan Trujillo 0001, Eduardo Fernández-Medina, Mario Piattini |
Application of QVT for the Development of Secure Data Warehouses: A case study. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Florian Kerschbaum |
Distance-preserving pseudonymization for timestamps and spatial data. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
privacy, hash functions, pseudonymization, distributed intrusion detection |
19 | Wei Chen 0135, Jin-cheng Zhang, Yu-quan Jiang |
One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA). |
I3E (2) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Xin Jin, Sylvia L. Osborn |
Architecture for Data Collection in Database Intrusion Detection Systems. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
database IDS, intrusion detection, database security |
19 | Apu Kapadia, Prasad Naldurg, Roy H. Campbell |
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Jorge Coelho 0001, Mário Florido |
Type-Based Static and Dynamic Website Verification. |
ICIW |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Brian Shand, Jem Rashbass |
Traceability and Timeliness in Messaging Middleware. |
OTM Workshops (2) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | William P. Murphy III |
EMS: a homegrown identity management system. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
HR, peoplesoft, username, web, email, identity, website, web-based, PHP, inventory, MySQL, human resources, ID, employee |
19 | Jeffrey M. Stanton, Isabelle J. Fagnot |
Extracting Useful Information from Security Assessment Interviews. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Juan Trujillo 0001, Mario Piattini |
Using UML Packages for Designing Secure Data Warehouses. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Dong Seong Kim 0001, Sang Min Lee 0018, Jong Sou Park |
Toward Lightweight Intrusion Detection System Through Simultaneous Intrinsic Model Identification. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Data mining, Intrusion Detection System, Random Forest |
19 | Christian W. Probst, René Rydhof Hansen, Flemming Nielson |
Where Can an Insider Attack? |
Formal Aspects in Security and Trust |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Seung Jun, Mark Astley |
Low-Overhead Message Tracking for Distributed Messaging. |
Middleware |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Fernando Godínez, Dieter Hutter, Raúl Monroy |
On the Role of Information Compaction to Intrusion Detection. |
ISSADS |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Bruce Christianson, Partha Das Chowdhury, James A. Malcolm |
Auditable Anonymous Delegation. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Anne Rozinat, Wil M. P. van der Aalst |
Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models. |
Business Process Management Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Ulf Larson, Emilie Lundin Barse, Erland Jonsson |
METAL - A Tool for Extracting Attack Manifestations. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
Automated attack analysis, log data, intrusion detection, system calls |
19 | Ling Lan |
Enhancing e-Democracy Via Fiscal Transparency: A Discussion Based on China's Experience. |
TCGOV |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Roy A. Maxion, Tahlia N. Townsend |
Masquerade detection augmented with error analysis. |
IEEE Trans. Reliab. |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Henry M. Gladney |
Trustworthy 100-year digital objects: Evidence after every witness is dead. |
ACM Trans. Inf. Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Aki Namioka, Cary Bran |
eXtreme ISO ?!? |
OOPSLA Companion |
2004 |
DBLP DOI BibTeX RDF |
ISO 9001 compliance, eXtreme programming, agile methodologies |
19 | Bruce Christianson |
Anonymous Authentication (Transcript of Discussion). |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Matthias Grabert, Markus Prechtel, Tomas Hrycej, Winfried Günther |
An Early Warning System for Vehicle Related Quality Data. |
ICDM |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Mikhail Petrovskiy |
A Fuzzy Kernel-Based Method for Real-Time Network Intrusion Detection. |
IICS |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Xian Rao, Cun-xi Dong, Shao-quan Yang |
Statistic Learning and Intrusion Detection. |
RSFDGrC |
2003 |
DBLP DOI BibTeX RDF |
statistic learning intrusion detection network security support vector machines neural network |
19 | Guohun Zhu, YuQing Miao |
Co-operative Monitor Web Page Based on MD5. |
GCC (2) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Christoph C. Michael, Anup K. Ghosh |
Simple, state-based approaches to program-based anomaly detection. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
machine learning, intrusion detection, Anomaly detection, finite automata, information system security |
19 | Wenke Lee |
Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility. |
SIGKDD Explor. |
2002 |
DBLP DOI BibTeX RDF |
Bayesian detection rate, model efficiency, intrusion detection, feature construction |
19 | Ibrahim Khalil, Torsten Braun |
Automated service provisioning in heterogeneous large-scale environment. |
NOMS |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Yingjiu Li, Lingyu Wang 0001, Xiaoyang Sean Wang, Sushil Jajodia |
Auditing Interval-Based Inference. |
CAiSE |
2002 |
DBLP DOI BibTeX RDF |
|
19 | B. Clifford Neuman |
Condition-Driven Integration of Security Services. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Chapman Flack, Mikhail J. Atallah |
Better Logging through Formality. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
CIDF, reliability, interoperability, specification, documentation, grammar, formal, log, BSM |
19 | Raymond J. Butler |
Is This Spreadsheet a Tax Evader? How H.M. Customs and Excise Test Spreadsheet Applications. |
HICSS |
2000 |
DBLP DOI BibTeX RDF |
Testing, Errors, Auditing, Spreadsheets, End-Users |
19 | Michael zur Muehlen, Michael Rosemann |
Workflow-based Process Monitoring and Controlling - Technical and Organizational Issues. |
HICSS |
2000 |
DBLP DOI BibTeX RDF |
Process Evaluation, Process Information Systems, Office Systems, Collaborative Work Systems, Monitoring, Controlling, Workflow Management, Business Process Management, Management Information Systems |
19 | Santosh K. Shrivastava |
Inter-task Co-ordination in Long-Lived Distributed Applications. |
DISC |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Kay M. Nelson, Alexander Kogan, Rajendra P. Srivastava, Miklos A. Vasarhelyi |
Virtual Auditing Agents: The Edgar Agent Example. |
HICSS (4) |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Laurence James |
Automatic requirements specification update processing from a requirements management tool perspective. |
ECBS |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Chee-Kit Looi, S. L. Tan, P. C. Teow, H. S. Chan |
A knowledge-based approach for internal control evaluation. |
IEA/AIE (1) |
1989 |
DBLP DOI BibTeX RDF |
|
16 | Solange Ghernaouti-Helie, David Simms, Igli Tashi |
Protecting Information in a Connected World: A Question of Security and of Confidence in Security. |
NBiS |
2011 |
DBLP DOI BibTeX RDF |
Networked society, security doctrine, complexity, dependency, information security, risk management, audit, vulnerability, compliance, confidence |
16 | David W. Chadwick, Stijn F. Lievens, Jerry den Hartog, Andreas Pashalidis, Joseph Alhadeff |
My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud. |
IEEE CLOUD |
2011 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trust, Reputation, Audit, Trust Negotiation, Sticky Policies |
16 | Romuald Thion, Daniel Le Métayer |
FLAVOR: A Formal Language for a Posteriori Verification of Legal Rules. |
POLICY |
2011 |
DBLP DOI BibTeX RDF |
audit, compliance, obligations |
16 | James McGovern, Gunnar Peterson |
10 Quick, Dirty, and Cheap Things to Improve Enterprise Security. |
IEEE Secur. Priv. |
2010 |
DBLP DOI BibTeX RDF |
software development, software security, security and privacy, threat modeling, enterprise software, audit logging |
16 | Zhonghua Deng, Ying Wu |
Overcoming Disadvantages by Making Full Use of Extrinsic Objects: Advancing Information Resource Construction by ISA. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Information system audit, Management, Information resource |
16 | Bonnie W. Morris, Cynthia D. Tanner, Joseph D'Alessandro |
Enabling Trust through Continuous Compliance Assurance. |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
Embedded Audit Process, Monitored Information Exchange, XML Based Processing, Trusted Information Sharing, Regulatory Compliance |
16 | Sebastian Schmerl, Michael Vogel, René Rietz, Hartmut König |
Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
Audit Data Analysis, Attack Signatures, Intrusion Detection, Computer Security, Data Visualization, Computer Forensic, Misuse Detection |
16 | Chrysovalantis Gaganis, Constantin Zopounidis |
Multicriteria Decision Support Methodologies for Auditing Decisions. |
Encyclopedia of Optimization |
2009 |
DBLP DOI BibTeX RDF |
Qualified audit reports, Classification, Auditing, Multicriteria decision aid |
16 | Joseph D'Alessandro, Cynthia D. Tanner, Bonnie W. Morris, Tim Menzies |
Is Continuous Compliance Assurance Possible? |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
Embedded Audit Process, Monitored Information Exchange, XML Based Processing, Regulatory Compliance |
16 | Javier Andrade Garda, Juan Ares Casal, Rafael García, Santiago Rodríguez Yáñez, María Seoane, Sonia Suárez |
A Knowledge-Based System for CMM Evaluation. |
New Challenges in Applied Intelligence Technologies |
2008 |
DBLP DOI BibTeX RDF |
Key Process Area, Knowledge-Based System, Audit, Capability Maturity Model, Clips, CommonKADS |
16 | Haixun Wang, Jian Yin 0002, Chang-Shing Perng, Philip S. Yu |
Dual encryption for query integrity assurance. |
CIKM |
2008 |
DBLP DOI BibTeX RDF |
database outsourcing, security, integrity, encryption, audit |
16 | Thusitha De Silva Mabotuwana, Jim Warren 0001 |
A Semantic Web Technology Based Approach to Identify Hypertensive Patients for Follow-Up/Recall. |
CBMS |
2008 |
DBLP DOI BibTeX RDF |
Clinical audit, medication possession ratio, hypertension |
16 | Sugan C. Jain, Dilip Kumar Sen, Muinuddin Khan, Swapan Kumar Bala |
An analytical study on social responsibility performance evaluation as an accounting measure of management efficiency. |
AI Soc. |
2007 |
DBLP DOI BibTeX RDF |
Corporate social responsibility, Management and social audit, Management efficiency, Performance evaluation |
16 | Michael Elliott, Ray Dawson, Janet Edwards |
An analysis of software quality management at AWE plc. |
Softw. Qual. J. |
2007 |
DBLP DOI BibTeX RDF |
ISO900:2001, Implementation, Culture, Audit |
16 | Yolanta Beres, Adrian Baldwin, Simon Shiu |
Model-based assurance of security controls. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
control effectiveness, models, risk, audit, assurance |
16 | Teresa Fernandez, Michael Grinnell, Eric Weakland |
Poof: no more viruses. |
SIGUCCS |
2007 |
DBLP DOI BibTeX RDF |
cisco clean access, network admission control, requirements selection, transition strategy, deployment, malware, audit, virus, microsoft windows, remediation, enforcement, infection |
16 | Hyun-A Park, Dong Hoon Lee 0001, Jongin Lim 0001, Sang Hyun Cho |
PPIDS: Privacy Preserving Intrusion Detection System. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Host-based IDS, Privacy, Intrusion Detection System, Audit log, Privacy Homomorphism |
16 | Yin Pan |
Security auditing course development. |
SIGITE Conference |
2007 |
DBLP DOI BibTeX RDF |
security, IT education, curriculum development, IT audit |
16 | Giuseppe Ateniese, Chris Riley, Christian Scheideler |
Survivable Monitoring in Dynamic Networks. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Monitoring, network intrusion detection, emergency communication, audit logs, survivable storage |
16 | Cindy Dooling, Jeff White, Cathy Lee |
Software management. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
administrative support, communication, training, computers, audit, licenses, software management, principles |
16 | Masato Masuya, Takashi Yamanoue, Shinichiro Kubota |
An experience of monitoring university network security using a commercial service and DIY monitoring. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
fire wall, security, network, monitor, policy, IDS, audit |
16 | Rajendra Bose, James Frew |
Lineage retrieval for scientific data processing: a survey. |
ACM Comput. Surv. |
2005 |
DBLP DOI BibTeX RDF |
scientific workflow, audit, data provenance, scientific data, Data lineage |
16 | Giuseppe Ateniese, Chris Riley, Christian Scheideler |
Survivable Monitoring in Dynamic Networks. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
monitoring, network intrusion detection, emergency communication, audit logs, survivable storage |
16 | Rajendra P. Srivastava, Liping Liu |
Applications of Belief Functions in Business Decisions: A Review. |
Inf. Syst. Frontiers |
2003 |
DBLP DOI BibTeX RDF |
Dempster-Shafer theory of belief functions, linear belief functions, audit decision, hierarchical evidence, versatile evidence, statistical evidence, judgment under ambiguity |
16 | Ramzi A. Haraty |
C2 Secure Database Management Systems - A Comparative Study. |
SAC |
1999 |
DBLP DOI BibTeX RDF |
security policy, audit, discretionary access control |
16 | Bob Briscoe, Ian Fairman |
Nark: receiver-based multicast non-repudiation and key management. |
EC |
1999 |
DBLP DOI BibTeX RDF |
Internet, multicast, watermark, key management, smartcard, non-repudiation, audit trail |
16 | Shiuh-Pyng Shieh, Virgil D. Gligor |
On a Pattern-Oriented Model for Intrusion Detection. |
IEEE Trans. Knowl. Data Eng. |
1997 |
DBLP DOI BibTeX RDF |
Access misuse, audit analysis, context-dependent intrusion, operational security problems, rule-based methods, intrusion detection, statistical methods, secure systems |
16 | P. Rolin, Laurent Toutain, Sylvain Gombault |
Network Security Probe. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
Network Security Probe, security, access control, audit, intrusion |
16 | Joost Verhofstad |
Recovery and Carsh Resistance in a Filing System. |
SIGMOD Conference |
1977 |
DBLP DOI BibTeX RDF |
audit trial, backing out, crash resistance, recovery cache (=recursive cache), fault tolerance, consistency, filing system, error recovery, recovery block |
13 | Jie Li |
Digital engineering audit management strategy based on machine learning combined with wireless communication network. |
J. Intell. Fuzzy Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Xiong Wang, Fernando A. F. Ferreira, Pengyu Yan |
Correction to: A multi-objective optimization approach for integrated risk-based internal audit planning. |
Ann. Oper. Res. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Christi Sevits, Alex D. McAllister |
Developing an Introductory Diversity Audit at Liberty Public Library: An Action Research Approach. |
Public Libr. Q. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Daniel Hechter, Hanlie Smuts |
Performing a Knowledge Audit Within a South African Chemical Manufacturer: A Case Study. |
Int. J. Knowl. Manag. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Jianhua Wang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yixiang Wang |
PASS: A Parameter Audit-Based Secure and Fair Federated Learning Scheme Against Free-Rider Attack. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yilin Yuan, Fan Yang, Xiao Wang, Yimin Tian, Zichen Li |
Multi-replicas integrity checking scheme with supporting probability audit for cloud-based IoT. |
PeerJ Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Mark McGowan, Filipe Correia Martins, Jodi-Louise Keen, Amelia Whitehead, Ellie Davis, Pubudu Pathiraja, Helen Bolton, Peter Baldwin |
Can natural language processing be effectively applied for audit data analysis in gynaecological oncology at a UK cancer centre? |
Int. J. Medical Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 1955 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|