A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Towards a Cyber Ontology for Insider Threats in the Financial Sector
2015
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
Upadhyaya, “A data-centric approach to insider attack
detection in database systems,” in Proc. of the 13th International Conference on Recent Advances in
Intrusion Detection (RAID’10), Ottawa ...
Stolfo, “Modeling user search behavior for masquerade detection,” in Proc. of
the 14th International Conference on Recent Advances in Intrusion Detection (RAID’11), Menlo Park,
California, USA ...
doi:10.22667/jowua.2015.12.31.064
dblp:journals/jowua/KulU15
fatcat:puhqqglttzechohyqhrkxilxsi
Fraud in Mexico's Government Procurement Sector
[article]
2019
Comparing the policies and laws that make up the regulatory framework of public procurement in Canada and Mexico, this study seeks to extract the best practices that can improve the Mexican system. ...
This thesis analyzes the problem of corruption in the Mexican government procurement system, aiming to provide a mix of legal and policy solutions to combat and prevent it. ...
//www.ippa.org/IPPC5/Proceedings/Part6/PAPER6-10.pdf>, accessed 15 th September 2017, at 1481. Robert C. Taylor, Lisa M. Bolton. ...
doi:10.20381/ruor-23349
fatcat:rcde5ctp75dl3g6oa7earde5zy