-
1
Key Technology About Security Audit of Mobile Network Traffic for Telecom Operator
Published 2015-12-01Subjects: Get full text
Article -
2
Discussion on Small Probability Correlation Analysis Technique of Security Audit System for Telecom Operator
Published 2013-04-01Subjects: “…security audit…”
Get full text
Article -
3
A method of SQL access logs pretreatment for power business system
Published 2015-12-01Subjects: Get full text
Article -
4
A method of SQL access logs pretreatment for power business system
Published 2015-12-01Subjects: “…power business;security audit;logs compression;pretreatment…”
Get full text
Article -
5
USING THE ANYLOGIC ENVIRONMENT FOR MODELING AND ANALYSIS OF THE INFORMATION SECURITY AUDIT PROCESS
Published 2025-05-01Subjects: “…information security audit, simulation modeling, anylogic, agent-based approach, time costs.…”
Get full text
Article -
6
BASIC PRINCIPLES OF ESTIMATION OF SOFTWARE SAFETY AND PROSPECTS OF THEIR DEVELOPMENT
Published 2016-08-01Subjects: Get full text
Article -
7
-
8
Research on the security audit model in intrusion prevention based on write-related support vector data description
Published 2007-01-01Subjects: “…intrusion prevention;intrusion detection;security audit;one-class classifier;write-related support vector data description…”
Get full text
Article -
9
Dynamic modeling in the functioning of security systems in the field of information security
Published 2024-01-01Subjects: Get full text
Article -
10
Audit Keamanan Sistem Informasi Manajemen Rumah Sakit Dengan Framework COBIT 2019 Pada RSUD Palembang BARI
Published 2023-06-01Subjects: “…Security Audit…”
Get full text
Article -
11
-
12
Draft concept of Information Security Auditing at a university
Published 2020-01-01Subjects: “…university, information security, information security auditing, audit stages, risks and standards, documents…”
Get full text
Article -
13
A Study on a Scenario-Based Security Incident Prediction System for Cybersecurity
Published 2024-12-01Subjects: Get full text
Article