A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is
Upadhyaya, “A data-centric approach to insider attack detection in database systems,” in Proc. of the 13th International Conference on Recent Advances in Intrusion Detection (RAID’10), Ottawa ... Stolfo, “Modeling user search behavior for masquerade detection,” in Proc. of the 14th International Conference on Recent Advances in Intrusion Detection (RAID’11), Menlo Park, California, USA ...doi:10.22667/jowua.2015.12.31.064 dblp:journals/jowua/KulU15 fatcat:puhqqglttzechohyqhrkxilxsi
Comparing the policies and laws that make up the regulatory framework of public procurement in Canada and Mexico, this study seeks to extract the best practices that can improve the Mexican system. ... This thesis analyzes the problem of corruption in the Mexican government procurement system, aiming to provide a mix of legal and policy solutions to combat and prevent it. ... //www.ippa.org/IPPC5/Proceedings/Part6/PAPER6-10.pdf>, accessed 15 th September 2017, at 1481. Robert C. Taylor, Lisa M. Bolton. ...doi:10.20381/ruor-23349 fatcat:rcde5ctp75dl3g6oa7earde5zy