共 50 条
- [33] Solar Powered Wireless Sensor Systems for Border Security [J]. SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE IX, 2010, 7666
- [34] Evaluating Security Measures of a Layered System [J]. IEEE TIC-STH 09: 2009 IEEE TORONTO INTERNATIONAL CONFERENCE: SCIENCE AND TECHNOLOGY FOR HUMANITY, 2009, : 296 - 301
- [35] A framework for evaluating storage system security [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FAST'02 CONFERENCE ON FILE AND STORAGE TECHNOLOGIES, 2002, : 15 - 30
- [36] EVALUATING EFFECTIVENESS OF AN ELECTRONIC SECURITY SYSTEM [J]. COLLEGE & RESEARCH LIBRARIES, 1978, 39 (04): : 263 - 267
- [37] Security Requirements of a Mobile Device Management System [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 353 - 358
- [39] Expert system for business decisions on security requirements [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: OTM 2007 WORKSHOPS, PT 1, PROCEEDINGS, 2007, 4805 : 46 - 47
- [40] Security Requirements of Web Content Protection System [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 317 - 325