共 50 条
- [21] Survey: Security in the system development life cycle [J]. PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 310 - 316
- [22] An improved algorithm of pattern matching for information security audit system [J]. J. Comput. Inf. Syst., 2008, 5 (2221-2228):
- [23] Design and Implementation of Cluster Monitoring on Information Security Audit System [J]. PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 718 - 721
- [25] A life-cycle model of information system security engineering based on SSE-CMM [J]. PROCEEDINGS OF 2002 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, VOLS I AND II, 2002, : 238 - 242
- [26] Life Cycle Analysis of Study Projects in "Projects Cloud" Information System [J]. INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM-2018), 2019, 2116
- [27] Understanding cyberbullying as an information security attack—life cycle modeling [J]. Annals of Telecommunications, 2021, 76 : 235 - 253
- [28] Limitations of the Information Security Management System Assessment Approaches in the Context of Information Security Policy Assessment [J]. WMSCI 2010: 14TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV (POST-CONFERENCE EDITION), 2010, : 148 - 150
- [30] Integrated knowledge and information audit: a case study [J]. REVISTA GENERAL DE INFORMACION Y DOCUMENTACION, 2016, 26 (01): : 43 - 64