共 50 条
- [42] THE RELATIONSHIP BETWEEN INFORMATION SYSTEMS RESOURCES AND INFORMATION SECURITY 4TH INTERNATIONAL CONFERENCE ON EDUCATION AND SOCIAL SCIENCES (INTCESS 2017), 2017, : 884 - 894
- [43] Uncovering Information Flow Policy Violations in C Programs (Extended Abstract) COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 26 - 46
- [44] The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security GAMES, 2020, 11 (02): : 1 - 13
- [46] Prioritizing Information Flow Violations: Generation of Ranked Security Assertions for Hardware Designs 2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 128 - 138
- [48] STANDING TO ALLEGE VIOLATIONS OF THE DOCTRINE OF SPECIALTY - AN EXAMINATION OF THE RELATIONSHIP BETWEEN THE INDIVIDUAL AND THE SOVEREIGN UNIVERSITY OF CHICAGO LAW REVIEW, 1995, 62 (03): : 1187 - 1213
- [50] INFORMATION POLICY AS AN ELEMENT OF ENFORCING THE STATE'S INFORMATION SECURITY AD ALTA-JOURNAL OF INTERDISCIPLINARY RESEARCH, 2022, 12 (01): : 110 - 114