共 50 条
- [32] Achieving Critical Infrastructure Protection through the Interaction of Computer Security and Network Forensics [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 23 - 30
- [33] Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection) [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 14, 2006, 14 : 37 - 40
- [34] Supply Chain Management Security: The Weak Link of Australian Critical Infrastructure Protection [J]. PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 240 - 246
- [35] Security of Classified Information as Part of the National Critical Infrastructure Protection: Macedonian Experience [J]. COMPREHENSIVE APPROACH AS SINE QUA NON FOR CRITICAL INFRASTRUCTURE PROTECTION, 2015, 39 : 107 - 119
- [36] Security of strategic infrastructures - the European and Austrian Critical Infrastructure Protection (CIP) program [J]. Elektrotechnik und Informationstechnik, 2010, 127 (09): : 242 - 244
- [37] Challenges in Critical Infrastructure Security [J]. DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 1 - 1
- [38] Security Levels of Critical Infrastructure [J]. JOURNAL OF APPLIED SECURITY RESEARCH, 2014, 9 (03) : 328 - 337
- [39] A SURVEY OF CRITICAL INFRASTRUCTURE SECURITY [J]. CRITICAL INFRASTRUCTURE PROTECTION VIII, 2014, 441 : 127 - 138
- [40] Leadership for Critical Infrastructure Protection [J]. SUSTAINABLE LEADERSHIP FOR ENTREPRENEURS AND ACADEMICS, ESAL2018, 2019, : 389 - 397