共 50 条
- [1] A Comparative Review of Cloud Security Proposals with ISO/IEC 27002 [J]. WOSIS 2011: SECURITY IN INFORMATION SYSTEMS, 2011, : 3 - 12
- [3] Modeling Dependencies of ISO/IEC 27002:2013 Security Controls [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 354 - 367
- [4] An Expert System for Risk Assessment of Information System Security Based on ISO 27002 [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON KNOWLEDGE ENGINEERING AND APPLICATIONS (ICKEA 2016), 2016, : 56 - 61
- [5] Better Security Assessment Communication: Combining ISO 27002 Controls with UML Sequence Diagrams [J]. 3RD INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS (ENCYCRIS 2022), 2022, : 49 - 56
- [6] Business Model for the Security of a Large-Scale PACS, Compliance with ISO/27002:2013 Standard [J]. Journal of Digital Imaging, 2015, 28 : 481 - 491