共 50 条
- [21] Prioritizing Information Flow Violations: Generation of Ranked Security Assertions for Hardware Designs 2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 128 - 138
- [22] Meta-analysis of network information security and Web data mining techniques PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INFORMATION SCIENCES, MACHINERY, MATERIALS AND ENERGY (ICISMME 2015), 2015, 126 : 1974 - 1977
- [23] Neutralization: New insights into the problem of employee information systems security policy violations MIS Quarterly: Management Information Systems, 2010, 34 (SPEC. ISSUE 3): : 487 - 502
- [24] ANALYSIS OF THE SECURITY OF LINEAR BLINDING TECHNIQUES FROM AN INFORMATION THEORETICAL POINT OF VIEW 2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2011, : 5852 - 5855
- [28] Information security based on soft computing techniques IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 271 - 275
- [29] Huge information extraction techniques of Data Security PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 179 - 183
- [30] Discussion on Information Security Techniques Curriculum Construction ICFCSE 2011: 2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SUPPORTED EDUCATION, VOL 1, 2011, : 182 - 184