共 50 条
- [31] Developing an Information Security Policy: A Case Study Approach [J]. 4TH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE (ISICO 2017), 2017, 124 : 691 - 697
- [32] IMMUNE INSPIRED SECURITY APPROACH FOR MANETS: A CASE STUDY [J]. PROCEEDINGS OF THE FOURTH GLOBAL CONFERENCE ON POWER CONTROL AND OPTIMIZATION, 2011, 1337 : 191 - 197
- [33] Comprehensive Approach to Increase Cyber Security and Resilience [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 686 - 692
- [34] Comprehensive approach to designing internet security taxonomy [J]. 2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 1380 - +
- [35] The value of the CIO in the top management team on performance in the case of information security breaches [J]. Information Systems Frontiers, 2016, 18 : 1205 - 1215
- [37] Independent Security Testing on Agile Software Development: a Case Study in a Software Company [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 522 - 531
- [39] Network security project management: A security policy-based approach [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789