共 50 条
- [11] CAN Transceivers with cyber security functions [J]. AUTOMOTIVE SECURITY, 2017, 2017, 2310 : 53 - 57
- [12] A Maturity Model for Part of the African Union Convention on Cyber Security [J]. 2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1316 - 1320
- [13] A Readiness Model for Measuring the Maturity of Cyber Security Incident Management [J]. ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, 2019, 23 : 283 - 293
- [14] Evaluation of cyber security in agile manufacturing: Maturity of Technologies and Applications [J]. 2022 IEEE/SICE INTERNATIONAL SYMPOSIUM ON SYSTEM INTEGRATION (SII 2022), 2022, : 784 - 789
- [15] A New Adaptive Cyber-security Capability Maturity Model [J]. 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 298 - 304
- [17] Deception Planning Models for Cyber Security [J]. PROCEEDINGS OF THE 2017 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2017), 2017,
- [19] Cyber Security Maturity Model and Maqasid al-Shari'ah [J]. PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR THE MUSLIM WORLD (ICT4M), 2018, : 266 - 271
- [20] An Evolution Roadmap for Community Cyber Security Information Sharing Maturity Model [J]. PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2369 - 2378