共 64 条
[11]
Blythe J., 2012, 2012 IEEE CS Security and Privacy Workshops (SPW 2012), P86, DOI 10.1109/SPW.2012.31
[12]
Blythe Jim, 2011, INT C INTELLIGENT US, P295, DOI DOI 10.1145/1943403.1943449
[13]
CORAS, CORAS METH
[14]
ENISA, INV RISK MAN RISK AS
[17]
Gabriel T, 2011, COMPUT FRAUD SECUR, P8, DOI 10.1016/S1361-3723(11)70082-3
[18]
Gros S., 2011, 2011 Proceedings of 34th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 20111), P1522
[19]
Halevi T, 2013, PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), P737
[20]
Hansch Norman, 2014, 2014 25th International Workshop on Database and Expert Systems Applications (DEXA), P326, DOI 10.1109/DEXA.2014.71