共 50 条
- [1] Issues in modeling information security [J]. INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2007, : 325 - 328
- [4] A Security Technique for Authentication and Security of Medical Images in Health Information Systems [J]. 2015 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA), 2015, : 8 - 13
- [5] Modeling of information systems to their security evaluation [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 295 - 298
- [6] Modeling and Simulating Information Security Management [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2008, 5141 : 327 - +
- [7] Critical Information Infrastructures Security Modeling [J]. PROCEEDINGS OF THE 24TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2019, : 82 - 88
- [8] Security Plans for SaaS [J]. NEW FRONTIERS IN INFORMATION AND SOFTWARE AS SERVICES: SERVICE AND APPLICATION DESIGN CHALLENGES IN THE CLOUD, 2011, 74 : 81 - 111
- [9] Adaptive model of information security technique investment [J]. Kongzhi yu Juece/Control and Decision, 2008, 23 (05): : 535 - 540
- [10] AlertVision: Visualizing Security Alerts [J]. INFORMATION SECURITY APPLICATIONS, WISA 2018, 2019, 11402 : 173 - 184