Identifying Technical Requirements for a Mobile Business Analytics Application
暂无分享,去创建一个
[1] Miklos A. Vasarhelyi,et al. Impact of business analytics and enterprise systems on managerial accounting , 2017, Int. J. Account. Inf. Syst..
[2] Jin-Young Choi,et al. Detecting SQL injection attacks using query result size , 2014, Comput. Secur..
[3] Kyong-Ho Lee,et al. Extracting logical structures from HTML tables , 2008, Comput. Stand. Interfaces.
[4] Debabrata Kar,et al. SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM , 2016, Comput. Secur..
[5] Kim Hua Tan,et al. Harvesting big data to enhance supply chain innovation capabilities: An analytic infrastructure based on deduction graph , 2015 .
[6] Dursun Delen,et al. Research challenges and opportunities in business analytics , 2018 .
[7] Gene Schultz. ssh Protocol Warning: Using ssh: Do security risks outweigh the benefits? , 2004 .
[8] Lwin Khin Shar,et al. Automated removal of cross site scripting vulnerabilities in web applications , 2012, Inf. Softw. Technol..
[9] M. Pushpalatha,et al. A survey on various applications of prescriptive analytics , 2020 .
[10] Daniel J. Power,et al. Defining business analytics: an empirical approach , 2018 .
[11] Manik Lal Das,et al. On the security of SSL/TLS-enabled applications , 2014 .
[12] Richard Braganza. Cross-Site Scripting: Cross-site scripting - an alternative view , 2006 .
[13] Pall Rikhardsson,et al. Business intelligence & analytics in management accounting research: Status and future focus , 2018, Int. J. Account. Inf. Syst..
[14] Tuncay Bayrak,et al. A Review of Business Analytics: A Business Enabler or Another Passing Fad☆ , 2015 .
[15] Hao Chen,et al. Noncespaces: Using randomization to defeat cross-site scripting attacks , 2012, Comput. Secur..
[16] M. Janssen,et al. Factors influencing big data decision-making quality , 2017 .
[17] Kyong-Ho Lee,et al. Logical structure analysis: From HTML to XML , 2007, Comput. Stand. Interfaces.
[18] Cui Tao,et al. Automating the extraction of data from HTML tables with unknown structure , 2005, Data Knowl. Eng..
[19] Veda C. Storey,et al. Big data technologies and Management: What conceptual modeling can do , 2017, Data Knowl. Eng..
[20] In Lee,et al. Big data: Dimensions, evolution, impacts, and challenges , 2017 .
[21] Murtaza Haider,et al. Beyond the hype: Big data concepts, methods, and analytics , 2015, Int. J. Inf. Manag..
[22] Dimitris Mitropoulos,et al. SDriver: Location-specific signatures prevent SQL injection attacks , 2009, Comput. Secur..
[23] Feng Li,et al. Managing knowledge on the Web - Extracting ontology from HTML Web , 2009, Decis. Support Syst..
[24] Rajeev Sharma,et al. Transforming Decision-Making Processes Transforming decision-making processes : a research agenda for understanding the impact of business analytics on organizations , 2017 .