Inteligencia artificial al servicio de la auditoría: una revisión sistemática de literatura

AYM Hernandez, FJV Duque - Revista Ibérica de Sistemas e …, 2020 - search.proquest.com
Applying artificial intelligence techniques in the field of auditing promises to be an effective
strategy when improving efficiency and productivity in these processes and therefore in the …

[PDF][PDF] IMPLEMENTING AN EFFICIENT EXPERT SYSTEM FOR SERVICES CENTER MANAGEMENT BY FUZZY LOGIC CONTROLLER.

MKABD GHANI, MA Mohammed… - Journal of Theoretical …, 2017 - researchgate.net
Expert System (ES) is considered to be the prominent reasoning practices which are
commonly employed towards various application domains. Considering expert systems …

Fuzzy logic and fog based secure architecture for internet of things (flfsiot)

SR Zahra, MA Chishti - Journal of ambient intelligence and humanized …, 2023 - Springer
Motivated by the recent explosion of interest around the Internet of Things (IoT), this paper is
focused on the dynamics of its security. It is a fact that at present, there is a dearth of …

Expert systems for information security management and audit. Implementation phase issues

M Kanatov, L Atymtayeva… - 2014 Joint 7th …, 2014 - ieeexplore.ieee.org
Auditing of information security constitutes a key part of security operations taken inside
organizations. Often information security problems must be addressed as quickly as …

Building a knowledge base for expert system in information security

L Atymtayeva, K Kozhakhmet, G Bortsova - Soft computing in artificial …, 2014 - Springer
In the days of technological advancement, a role of information security (IS) is very
important. There is an urgent need in implementing and assessing information security at a …

Automated expert system knowledge base development method for information security risk analysis

D Vitkus, Ž Steckevičius, N Goranin… - International journal of …, 2019 - vb.vgtu.lt
Abstract [eng] Information security risk analysis is a compulsory requirement both from the
side of regulating documents and information security management decision making …

Identifying high-risk over-entitlement in access control policies using fuzzy logic

S Parkinson, S Khana - Cybersecurity, 2022 - Springer
Analysing access control policies is an essential process for ensuring over-prescribed
permissions are identified and removed. This is a time-consuming and knowledge-intensive …

[PDF][PDF] Application of computer assisted audit techniques in public accounting firm

BL Handoko, ASL Lindawati… - International Journal of …, 2020 - academia.edu
ABSTRACT Facing the industrial revolution 4.0, every profession in the world must improve,
every professional workforce involved in it, must begin to add one skill that is computer …

Methodology and ontology of expert system for information security audit

LB Atymtayeva, GK Bortsova, A Inoue… - The 6th International …, 2012 - ieeexplore.ieee.org
Information security auditing plays key role in providing any organization's good security
level. By reason of high expenses of the audit process implementation, the automation of it …

Assessing information security vulnerabilities and threats to implementing security mechanism and security policy audit

MAM Afifi - Journal of Computer Science, 2020 - research.skylineuniversity.ac.ae
In spite of the massive investment of money, time and efforts an organization devotes to
growth and enhancement with continuous improvements of a sound information security …