共 12 条
- [1] Analyzing and Assessing the Security-Related Defects 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 21 - 25
- [4] Assessing Architecture Conformance to Security-Related Practices in Infrastructure as Code Based Deployments 2022 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2022), 2022, : 123 - 133
- [6] Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-related Behavior: An Expectancy Theory Approach 2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 3930 - 3940
- [7] A Self-adaptive Approach for Assessing the Criticality of Security-Related Static Analysis Alerts COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2021, PT VII, 2021, 12955 : 289 - 305
- [9] 'Privacy and insecurity' - The role of legal control mechanisms in reducing the risks to fundamental rights posed by national security-related secret intelligence gathering INFORMACIOS TARSADALOM, 2017, 17 (01): : 24 - +
- [10] The Evaluation of Information Technology Governance and the Prioritization of Process Improvement Using Control Objectives for Information and Related Technology Version 5: Case Study on the Ministry of Foreign Affairs 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS), 2016, : 189 - 194