共 50 条
- [21] Method of Constructing a Visualization of Threat Model of Information Security 2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020), 2020,
- [24] Fuzzy risk assessment of information security threat scenario Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2013, 36 (06): : 89 - 92
- [25] Information Security: End Users' Perspective INNOVATION AND KNOWLEDGE MANAGEMENT IN TWIN TRACK ECONOMIES: CHALLENGES & SOLUTIONS, VOLS 1-3, 2009, : 568 - 569
- [26] Simulation of Automotive Security Threat Warnings to Analyze Driver Interpretations and Emotional Transitions COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2015, 2015, 9337 : 47 - 58
- [27] GNSS Threat Identification and Mitigation, Cyber-Security aspects in Automotive Scenarios 2023 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR AUTOMOTIVE, METROAUTOMOTIVE, 2023, : 127 - 131
- [28] Information security on the logistical network: An end-to-end approach SECOND IEEE INTERNATIONAL SECURITY IN STORAGE WORKSHOP, PROCEEDINGS, 2004, : 31 - 37
- [30] The concept of hate speech as a threat to the information security of Internet communication VESTNIK OF SAINT PETERSBURG UNIVERSITY-LAW-VESTNIK SANKT-PETERBURGSKOGO UNIVERSITETA-PRAVO, 2021, 12 (03): : 555 - 573