• Helios

  • Referenced in 16 articles [sw36255]
  • Helios: web-based open-audit voting. Voting with cryptographic auditing, sometimes called open-audit voting ... result, the benefits of cryptographically audited elections have remained elusive. We present Helios, the first ... based, open-audit voting system. Helios is publicly accessible today: any- one can create ... election, and any willing ob- server can audit the entire process. Helios is ideal...
  • PERUSE

  • Referenced in 17 articles [sw00703]
  • obtaining small amounts of pertment information, and auditing model content or structure. The command syntax...
  • AgenaRisk

  • Referenced in 13 articles [sw07338]
  • that is repeatable and auditable. The AgenaRisk solution includes predictive analytics and scales...
  • AURA

  • Referenced in 10 articles [sw11482]
  • AURA, a programming language for authorization and audit. This paper presents AURA, a programming language...
  • KDD Cup

  • Referenced in 10 articles [sw22251]
  • standard set of data to be audited, which includes a wide variety of intrusions simulated...
  • Ivy

  • Referenced in 9 articles [sw41668]
  • purpose, it presents concrete finite counterexamples, automatically audits proofs for decidability of verification conditions...
  • ProM

  • Referenced in 8 articles [sw04977]
  • transaction logs in an ERP system or audit trails in a WFM system...
  • ADAM

  • Referenced in 7 articles [sw34891]
  • design and experiences with the ADAM (Audit Data Analysis and Mining) system, which...
  • Pixy

  • Referenced in 5 articles [sw25249]
  • therefore, low enough to permit effective security audits...
  • Accord.NET

  • Referenced in 3 articles [sw05891]
  • building production-grade computer vision, computer audition, signal processing and statistics applications even for commercial...
  • GDSL

  • Referenced in 3 articles [sw13118]
  • gained importance due to the need to audit larger and larger programs for security vulnerabilities...
  • auditor

  • Referenced in 3 articles [sw26115]
  • package auditor: Model Audit - Verification, Validation, and Error Analysis. Provides an easy to use unified...
  • Privman

  • Referenced in 3 articles [sw35845]
  • code that needs to be carefully audited. While the technique...
  • COVID-Net

  • Referenced in 3 articles [sw41186]
  • clinicians in improved screening, but also audit COVID-Net in a responsible and transparent manner...
  • LogGC

  • Referenced in 1 article [sw39052]
  • LogGC: garbage collecting audit log. System-level audit logs capture the interactions between applications ... recovery from it. A key challenge of audit log-based forensics in practice ... this paper, we propose LogGC, an audit logging system with garbage collection (GC) capability ... results show that LogGC can reduce audit log size by 14 times for regular user...
  • TweetNaCl

  • Referenced in 2 articles [sw13115]
  • impact of TweetNaCl’s conciseness upon auditability.{par}TweetNaCl consists of a single C source...
  • EMBERS

  • Referenced in 2 articles [sw27603]
  • specific evaluation criteria. EMBERS also provides an audit trail interface that enables the investigation...
  • Kaskade

  • Referenced in 2 articles [sw32518]
  • that we maintain at Microsoft to enable auditing, service analytics, and advanced system optimizations...
  • Equity3

  • Referenced in 1 article [sw16176]
  • reported in an open, transparent and auditable manner, to show the entire decision process from...
  • ez

  • Referenced in 1 article [sw17525]
  • include design visualization for pre-analysis data auditing, and correlation matrix visualization. Finally, this package...