Inteligencia artificial al servicio de la auditoría: una revisión sistemática de literatura
AYM Hernandez, FJV Duque - Revista Ibérica de Sistemas e …, 2020 - search.proquest.com
Applying artificial intelligence techniques in the field of auditing promises to be an effective
strategy when improving efficiency and productivity in these processes and therefore in the …
strategy when improving efficiency and productivity in these processes and therefore in the …
[PDF][PDF] IMPLEMENTING AN EFFICIENT EXPERT SYSTEM FOR SERVICES CENTER MANAGEMENT BY FUZZY LOGIC CONTROLLER.
MKABD GHANI, MA Mohammed… - Journal of Theoretical …, 2017 - researchgate.net
Expert System (ES) is considered to be the prominent reasoning practices which are
commonly employed towards various application domains. Considering expert systems …
commonly employed towards various application domains. Considering expert systems …
Fuzzy logic and fog based secure architecture for internet of things (flfsiot)
SR Zahra, MA Chishti - Journal of ambient intelligence and humanized …, 2023 - Springer
Motivated by the recent explosion of interest around the Internet of Things (IoT), this paper is
focused on the dynamics of its security. It is a fact that at present, there is a dearth of …
focused on the dynamics of its security. It is a fact that at present, there is a dearth of …
Expert systems for information security management and audit. Implementation phase issues
M Kanatov, L Atymtayeva… - 2014 Joint 7th …, 2014 - ieeexplore.ieee.org
Auditing of information security constitutes a key part of security operations taken inside
organizations. Often information security problems must be addressed as quickly as …
organizations. Often information security problems must be addressed as quickly as …
Building a knowledge base for expert system in information security
L Atymtayeva, K Kozhakhmet, G Bortsova - Soft computing in artificial …, 2014 - Springer
In the days of technological advancement, a role of information security (IS) is very
important. There is an urgent need in implementing and assessing information security at a …
important. There is an urgent need in implementing and assessing information security at a …
Automated expert system knowledge base development method for information security risk analysis
D Vitkus, Ž Steckevičius, N Goranin… - International journal of …, 2019 - vb.vgtu.lt
Abstract [eng] Information security risk analysis is a compulsory requirement both from the
side of regulating documents and information security management decision making …
side of regulating documents and information security management decision making …
Identifying high-risk over-entitlement in access control policies using fuzzy logic
S Parkinson, S Khana - Cybersecurity, 2022 - Springer
Analysing access control policies is an essential process for ensuring over-prescribed
permissions are identified and removed. This is a time-consuming and knowledge-intensive …
permissions are identified and removed. This is a time-consuming and knowledge-intensive …
[PDF][PDF] Application of computer assisted audit techniques in public accounting firm
BL Handoko, ASL Lindawati… - International Journal of …, 2020 - academia.edu
ABSTRACT Facing the industrial revolution 4.0, every profession in the world must improve,
every professional workforce involved in it, must begin to add one skill that is computer …
every professional workforce involved in it, must begin to add one skill that is computer …
Methodology and ontology of expert system for information security audit
Information security auditing plays key role in providing any organization's good security
level. By reason of high expenses of the audit process implementation, the automation of it …
level. By reason of high expenses of the audit process implementation, the automation of it …
Assessing information security vulnerabilities and threats to implementing security mechanism and security policy audit
MAM Afifi - Journal of Computer Science, 2020 - research.skylineuniversity.ac.ae
In spite of the massive investment of money, time and efforts an organization devotes to
growth and enhancement with continuous improvements of a sound information security …
growth and enhancement with continuous improvements of a sound information security …