{"labels":{"en":"Effectiveness of Information Security Control using Audit Logs"},"descriptions":{"en":"scientific paper published in CEUR-WS Volume 3991"},"claims":{"P31":"Q13442814","P1433":"Q138721341","P1476":{"text":"Effectiveness of Information Security Control using Audit Logs","language":"en"},"P407":"Q1860","P953":"https://ceur-ws.org/Vol-3991/paper37.pdf","P50":[],"P2093":[{"value":"Yuliia Kostiuk","qualifiers":{"P1545":"1"}},{"value":"Pavlo Skladannyi","qualifiers":{"P1545":"2"}},{"value":"Volodymyr Sokolov","qualifiers":{"P1545":"3"}},{"value":"Oleksii Zhyltsov","qualifiers":{"P1545":"4"}},{"value":"Yevhen Ivanichenko","qualifiers":{"P1545":"5"}}]}}