共 50 条
- [21] Analysis and design methodology for enterprise information system development [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XII, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS: II, 2003, : 88 - 93
- [22] A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0 [J]. TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 40 - 57
- [23] Quantitative metallography of two-phase titanium alloys [J]. MATERIALS CHARACTERIZATION, 2001, 46 (2-3) : 149 - 154
- [24] Statistics Based Information Security Risk Management Methodology [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (10): : 117 - 123
- [26] Enterprise architecture to enhance security and risk management of information systems [J]. Qinghua Daxue Xuebao, 2009, SUPPL. 2 (2073-2086):
- [28] METHODOLOGY OF QUANTITATIVE PHASE MAGNETIC ANALYSIS [J]. INDUSTRIAL LABORATORY, 1990, 56 (10): : 1201 - 1203
- [30] Two-Phase Security Protection for the Internet of Things Object [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2018, 14 (06): : 1431 - 1437