共 50 条
- [31] Tools for information security assurance arguments DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 287 - 296
- [32] A reference model for enterprise security -: High assurance enterprise security ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2007, : 355 - +
- [35] Authenticity as a Component of Information Assurance and Security PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 101 - 108
- [36] COMPUTER ASSURANCE - SECURITY, SAFETY, AND ECONOMICS COMPASS 89 : PROCEEDINGS OF THE FOURTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE: SYSTEMS INTEGRITY, SOFTWARE SAFETY AND PROCESS SECURITY, 1989, : 1 - 7
- [37] An Immune Intelligent Approach for Security Assurance 2015 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA), 2015,
- [38] Software security assurance SOUP to NUTS Axelrod, C. Warren (waxelrod@delta-risk.net), 2015, U.S. Department of Defense (28): : 37 - 43
- [40] Strategic planning for information security and assurance PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 466 - 471