Author of the publication

Fraud detection in ERP systems using scenario matching

, , , , , , and . International Information Security Conference (SEC 2010) : Security and Privacy : Silver Linings in the Cloud, page 112--123. Brisbane Convention & Exhibition Centre, Brisbane, Queensland, Springer, (September 2010)Accepted papers will be presented at the conference and published in the IFIP AICT (Advances in Information and Communication Technology) Series by Springer..

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A state of the art survey of fraud detection technology, , and . Insider threats in cyber security, (2010)Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces., , , , and . SADFE, page 22-31. IEEE, (2020)Praktikabler Datenschutz für Log-Daten. Proceedings of the 10th DFN-CERT Workshop on Sicherheit in vernetzten Systemen, page F-1--F-20. (2003)Evaluating the Design of an Audit Data Pseudonymizer Using Basic Building Blocks for Anonymity.. Sicherheit, volume P-62 of LNI, page 221-232. GI, (2005)Vereinfachung der Signaturentwicklung durch Wiederverwendung., , and . Sicherheit, volume P-77 of LNI, page 201-212. GI, (2006)Secure Mediation: Design and Architecture, , , and . ???, (2003)Fraud detection in ERP systems using scenario matching, , , , , , and . International Information Security Conference (SEC 2010) : Security and Privacy : Silver Linings in the Cloud, page 112--123. Brisbane Convention & Exhibition Centre, Brisbane, Queensland, Springer, (September 2010)Accepted papers will be presented at the conference and published in the IFIP AICT (Advances in Information and Communication Technology) Series by Springer..Ausgleich von Datenschutz und Überwachung mit technischer Zweckbindung am Beispiel eines Pseudonymisierers., and . GI Jahrestagung, volume P-19 of LNI, page 488-494. GI, (2002)Ein Architektur-Modell für anonyme Autorisierungen und Überwachungsdaten.. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), volume P-36 of LNI, page 293-304. GI, (2003)Secure Mediation: Requirements, Design, and Architecture. Journal of Computer Security, (2003)