Showing 1 - 13 results of 13 for search '"security audit"', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    A method of SQL access logs pretreatment for power business system by Weiwei LI, Tao ZHANG, Yuanyuan MA, Cheng ZHOU

    Published 2015-12-01
    Subjects: “…power business;security audit;logs compression;pretreatment…”
    Get full text
    Article
  5. 5

    USING THE ANYLOGIC ENVIRONMENT FOR MODELING AND ANALYSIS OF THE INFORMATION SECURITY AUDIT PROCESS by Kamilla M. Khuranova, Igor D. Kologorov, Sergey A. Reznichenko, Leonid N. Kessarinskiy

    Published 2025-05-01
    Subjects: “…information security audit, simulation modeling, anylogic, agent-based approach, time costs.…”
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Research on the security audit model in intrusion prevention based on write-related support vector data description by LUO Jun, PAN Zhi-song, MIAO Zhi-min, HU Gu-yu

    Published 2007-01-01
    Subjects: “…intrusion prevention;intrusion detection;security audit;one-class classifier;write-related support vector data description…”
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12

    Draft concept of Information Security Auditing at a university by V. N. Yasenev, A. V. Dorozhkin, A. L. Sochkov

    Published 2020-01-01
    Subjects: “…university, information security, information security auditing, audit stages, risks and standards, documents…”
    Get full text
    Article
  13. 13