共 50 条
- [41] Information security through semi-fragile watermarking ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 235 - 239
- [42] The establishment of collaboration in managing information security through multisourcing Computers and Security, 2019, 80 : 224 - 237
- [43] Analyzing Information Security Awareness through Networks of Association TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 227 - +
- [45] The Information Systems Security Process: Through an Anthropological Lens INFORMATION SYSTEMS DEVELOPMENT: CHALLENGES IN PRACTICE, THEORY AND EDUCATION, VOLS 1AND 2, 2009, : 741 - 752
- [46] Assessing the risk of an information infrastructure through security dependencies CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 42 - +
- [47] Improving Internet Security Through Mandatory Information Disclosure 2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 4813 - 4823
- [48] Information Security Through Encrypted Domain Data Hiding INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 370 - 379
- [49] Age of Information in a Network of Preemptive Servers IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 118 - 123
- [50] Improving Scrum Model Using Inclusion Information Security Practices through Information Security Master and Backlog Framework INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (06): : 99 - 111