共 50 条
- [4] Automatically building an information-security vulnerability database [J]. 2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 376 - +
- [5] Information security risk assessment model for risk management [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30