Filter your results
- 4
- 4
- 4
- 1
- 1
- 2
- 4
- 4
- 3
- 1
- 1
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Towards the Definition of Domain Concepts and Knowledge through the Application of the User Story Mapping Method9th International Conference on Product Lifecycle Management (PLM), Jul 2012, Montreal, QC, Canada. pp.58-69, ⟨10.1007/978-3-642-35758-9_6⟩
Conference papers
hal-01526136v1
|
||
|
Detecting Collusive Fraud in Enterprise Resource Planning Systems7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.143-153, ⟨10.1007/978-3-642-24212-0_11⟩
Conference papers
hal-01569559v1
|
||
|
Fraud Detection in ERP Systems Using Scenario Matching25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.112-123, ⟨10.1007/978-3-642-15257-3_11⟩
Conference papers
hal-01054523v1
|
||
|
Attribute-Based Encryption with Break-Glass4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.237-244, ⟨10.1007/978-3-642-12368-9_18⟩
Conference papers
hal-01056083v1
|