共 50 条
- [31] Data mining techniques for information security applications WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03): : 221 - 229
- [32] INFORMATION TECHNIQUES AND CRIME - FORMS AND SECURITY MEASURES BETRIEBSWIRTSCHAFTLICHE FORSCHUNG UND PRAXIS, 1990, 42 (03): : 177 - 187
- [33] On Information Theoretic Security: Mathematical Models and Techniques INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 73 - 75
- [34] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252
- [35] The use of business process modelling in information systems security analysis and design Information Management and Computer Security, 2000, 8 (03): : 107 - 116
- [37] Analysis of Security Testing Techniques INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 29 (01): : 291 - 306
- [38] "I do it because they do it": Social-Neutralisation in Information Security Practices of Saudi Medical Interns RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2019), 2020, 12026 : 227 - 243