共 50 条
- [31] NATO AND CYBER SECURITY VOLGOGRADSKII GOSUDARSTVENNYI UNIVERSITET-VESTNIK-SERIYA 4-ISTORIYA REGIONOVEDENIE MEZHDUNARODNYE OTNOSHENIYA, 2012, 17 (02): : 109 - 114
- [33] Governing Cyber Security through Networks: An Analysis of Cyber Security Coordination in Belgium INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2018, 12 (01): : 300 - 315
- [34] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198
- [36] Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 332 - 337
- [37] Cyber Security Threat Intelligence Sharing Model Based on Blockchain Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (04): : 836 - 846
- [38] Information Visualization Metrics and Methods for Cyber Security Evaluation 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 292 - 294
- [39] CYBER (IN)SECURITY OF PERSONAL DATA AND INFORMATION IN TIMES OF DIGITIZATION MEDICINE LAW & SOCIETY, 2022, 15 (02): : 287 - 304
- [40] Leveraging Information Security Continuous Monitoring for Cyber Defense PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 401 - 408