共 50 条
- [22] A Security Technique for Authentication and Security of Medical Images in Health Information Systems [J]. 2015 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA), 2015, : 8 - 13
- [23] Using of Fuzzy Cognitive Modeling in Information Security Systems Constructing [J]. 2015 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOLS 1-2, 2015, : 408 - 411
- [24] Information security culture [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 203 - 214
- [25] Analyzing information security culture: Increased trust by an appropriate information security culture [J]. 14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 405 - 409
- [26] Conceptual Information Systems discussed through an IT-security tool [J]. KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT, PROCEEDINGS: METHODS, MODELS, AND TOOLS, 2000, 1937 : 352 - 365
- [28] An Approach to Assessing Information Security Effectiveness in Control Systems [J]. Automatic Control and Computer Sciences, 2020, 54 : 879 - 887