Information technology security audit

Known as: Operating system audit, Computer security audit, Audit (disambiguation) 
A computer security audit is a manual or systematic measurable technical assessment of a system or application. Manual assessments include… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Security Audit Compliance For Cloud Computing Frank Hans-Ulrich Doelitzscher MSc Cloud computing has grown largely over the past… (More)
Is this relevant?
2011
2011
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing… (More)
Is this relevant?
2011
2011
  • Predrag Tasevski
  • 2011
Nowadays, attacking the passwords is one of the most straightforward attack vectors, which authorize access to information system… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
The information and communication technologies advances made available enormous and vast amounts of information. This… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In this paper, a new learning algorithm for adaptive network intrusion detection using naive Bayesian classifier and decision… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
The Political Resource Curse The paper studies the effect of additional government revenues on political corruption and on the… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is… (More)
  • table 1
  • table 2
  • table 4
  • figure 1
  • table 5
Is this relevant?
2008
2008
In this paper, an approach for automated transformations from a security requirements model to a consistent architectural model… (More)
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
Dependency between business and resources that ensure the normal function of the business has increased dramatically in size and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
1987
1987
A log service provides efficient storage and retrieval of data that is written sequentially (append-only) and not subsequently… (More)
  • figure 11
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?