共 50 条
- [1] A New Adaptive Cyber-security Capability Maturity Model [J]. 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 298 - 304
- [2] Cyber-Security and a Potential Role for the Maritime Cloud [J]. PROCEEDINGS OF THE 30TH INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2017), 2017, : 1800 - 1808
- [3] Scalable Cyber-Security for Terabit Cloud Computing [J]. 2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC), 2012, : 1607 - 1616
- [5] State-of-The-Art of Cloud Computing Cyber-Security [J]. PROCEEDINGS OF 2015 THIRD IEEE WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2015,
- [6] Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph [J]. IEEE ACCESS, 2020, 8 : 177041 - 177052
- [8] An Overview of the State-of-the-Art of Cloud Computing Cyber-Security [J]. CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 56 - 67
- [9] Cyber-Security for the Controller Area Network (CAN) Communication Protocol [J]. 2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 1 - 7
- [10] Arabic Twitter User Profiling: Application to Cyber-security [J]. WEBIST: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, 2019, : 110 - 117