共 50 条
- [1] The Information Security System Synthesis Using the Graphs Theory [J]. PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 148 - 151
- [3] Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures [J]. Automatic Control and Computer Sciences, 2019, 53 : 922 - 931
- [4] ISRAM: information security risk analysis method [J]. COMPUTERS & SECURITY, 2005, 24 (02) : 147 - 159
- [5] Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs [J]. RISK ASSESSMENT AND RISK-DRIVEN QUALITY ASSURANCE, RISK 2016, 2017, 10224 : 37 - 52
- [6] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252
- [7] Information security risk assessment using the AHP method [J]. IV INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN ENGINEERING SCIENCE (CMES'19), 2019, 710
- [8] Information security for big data using the NTRUEncrypt method [J]. Measurement: Sensors, 2023, 27
- [9] A Business Aware Information Security Risk Analysis Method [J]. INFORMATION TECHNOLOGY AND INNOVATION TRENDS IN ORGANIZATIONS, 2011, : 453 - 460
- [10] Analysis of Information Security of Distributed Information Systems [J]. 2017 9TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2017, : 96 - 100