共 50 条
- [41] Key technologies in information security - A review [J]. IETE TECHNICAL REVIEW, 2005, 22 (03) : 173 - 181
- [42] Information security based on soft computing techniques [J]. IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 271 - 275
- [43] A Review on Gamification for Information Security Training [J]. 2021 INTERNATIONAL CONFERENCE OF MODERN TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY INDUSTRY (MTICTI 2021), 2021, : 123 - 130
- [44] Information security matters: fifty years of information security [J]. ISACA Journal, 2019, 1 : 4 - 6
- [45] Applications of trusted review to information security [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 305 - 319
- [46] Discussion on Information Security Techniques Curriculum Construction [J]. ICFCSE 2011: 2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SUPPORTED EDUCATION, VOL 1, 2011, : 182 - 184
- [47] Huge information extraction techniques of Data Security [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 179 - 183
- [48] Information security management: A bibliographic review [J]. PROFESIONAL DE LA INFORMACION, 2016, 25 (06): : 931 - 948
- [49] Data mining techniques for information security applications [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03): : 221 - 229
- [50] INFORMATION TECHNIQUES AND CRIME - FORMS AND SECURITY MEASURES [J]. BETRIEBSWIRTSCHAFTLICHE FORSCHUNG UND PRAXIS, 1990, 42 (03): : 177 - 187