共 50 条
- [33] The Need, Use and Efficiency of Trustworthy Security Model in Cloud Computing for Information Assurance 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 69 - 73
- [35] Identifying Information Security Risks in a Social Network Using Self-Organising Maps INFORMATION SECURITY EDUCATION: EDUCATION IN PROACTIVE INFORMATION SECURITY, WISE 12, 2019, 557 : 114 - 126
- [38] A Review on Information, Information Security and Security Processes JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2006, 9 (03): : 165 - 174
- [40] Social engineering in online social networks: a case study on the exposure of personal information and the need for information security strategies REVISTA IBERO-AMERICANA DE CIENCIA DA INFORMACAO, 2013, 6 (02): : 37 - 55