共 50 条
- [1] Modeling Dependencies of ISO/IEC 27002:2013 Security Controls [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 354 - 367
- [3] A Database System for Effective Utilization of ISO/IEC 27002 [J]. FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 607 - 612
- [6] From ISO/IEC 27002:2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance [J]. COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 238 - 257
- [7] On Scalable Security Audit for Web Application According to ISO 27002 [J]. COMPUTER NETWORKS, 2011, 160 : 289 - 297
- [9] THE STATUS OF INFORMATION SECURITY MANAGEMENT PERFORMANCE IN LIBRARIES OF STATE MEDICAL SCIENCES UNIVERSITIES IN TEHRAN BASED ON ISO/IEC 27002 STANDARDS [J]. INDO AMERICAN JOURNAL OF PHARMACEUTICAL SCIENCES, 2018, 5 (08): : 7540 - 7545
- [10] An ISO/IEC 15504 Security Extension [J]. SOFTWARE PROCESS IMPROVEMENT AND CAPABILITY DETERMINATION, 2011, 155 : 64 - 72