共 83 条
- [1] Accorsi R, 2012, P 27 ANN ACM S APPL, P1709, DOI DOI 10.1145/2245276.2232051
- [2] Safekeeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges [J]. IMF 2009: 5TH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSIC, 2009, : 94 - 110
- [3] Context-Aware Trace Alignment with Automated Planning [J]. 2022 4TH INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2022), 2022, : 104 - 111
- [4] Adriansyah A., 2011, 2011 11th International Conference on Application of Concurrency to System Design (ACSD), P57, DOI 10.1109/ACSD.2011.19
- [6] Risk-Based Cybersecurity Compliance Assessment System (RC2AS) [J]. APPLIED SCIENCES-BASEL, 2023, 13 (10):
- [7] Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance [J]. APPLIED SCIENCES-BASEL, 2021, 11 (08):
- [8] Amaral Claudio A. L., 2019, Information Technology for Management Emerging Research and Applications. 15th Conference (AITM 2018) and 13th Conference (ISM 2018). Held as Part of FedCSIS. Revised and Extended Selected Papers. Lecture Notes in Business Information Processing (LNBIP 346), P3, DOI 10.1007/978-3-030-15154-6_1
- [9] Angelini M, 2022, Arxiv, DOI arXiv:2207.03269
- [10] [Anonymous], 2013, ISO/IEC 27035:2013 (E)