共 50 条
- [31] On The Detection and Handling of Security Incidents and Perimeter Breaches - A Modular and Flexible Honeytoken based Framework 2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
- [33] Distributed intrusion detection system based on grid security model DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2008, 2008, 6973
- [34] Construction of Information System Security Precaution in Digital Library 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS FOR CRISIS RESPONSE AND MANAGEMENT & 4TH INTERNATIONAL SYMPOSIUM ON GEO-INFORMATION FOR DISASTER MANAGEMENT, 2008, : 263 - 268
- [35] INFORMATION SECURITY MANAGEMENT SYSTEM AND DIGITAL FORENSIC ANALYSIS PROCEEDINGS OF THE INTERNATIONAL CONFERENCE: LIBEREC INFORMATICS FORUM 2016, 2016, : 27 - 34
- [36] Component based simulator of digital system MIXDES 2008: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2008, : 395 - 400
- [37] BLP-based information security model in secure operating system Jisuanji Gongcheng/Computer Engineering, 2005, 31 (19): : 133 - 135
- [38] Matrix correction method based information system security assessment model 1600, Tsinghua University (60): : 393 - 401
- [39] Configurable integrated maintenance system based on digital production model 2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 1289 - +
- [40] Information security defense method of electric power control system based on digital watermark PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING, MANUFACTURING TECHNOLOGY AND CONTROL, 2016, 67 : 174 - 179