共 50 条
- [31] Using Eyetracking to Analyse How Flowcharts Are Understood 2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 394 - 399
- [37] An interactive application to analyse the existence of limit cycles using the describing function IFAC PAPERSONLINE, 2022, 55 (17): : 291 - 295
- [38] How Good is a Security Policy against Real Breaches? A HIPAA Case Study 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2017, : 530 - 540
- [39] How SMEs can prevent third-party vendor data breaches Computer Fraud and Security, 2022, 2022 (05):