共 50 条
- [31] Security in the Cloud Based Systems: Structure and Breaches 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 542 - 547
- [32] The crux and the myth - breaches in security vendor websites Computer Fraud and Security, 2009, 2009 (07): : 11 - 13
- [33] Automatic detection and tracking of security breaches in airports SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 : 542 - 552
- [35] Users’ perceptions about mobile security breaches Information Systems and e-Business Management, 2016, 14 : 857 - 882
- [38] TrustBox: A Security Architecture for Preventing Data Breaches PROCEEDINGS OF THE 19TH INTERNATIONAL EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING, 2011, : 635 - 639
- [39] Service security breaches: the impact of comparative optimism SERVICE INDUSTRIES JOURNAL, 2022, 42 (15-16): : 1190 - 1210