共 33 条
[1]
Pavlov G., Karakaneva J., Information security management system in organization, Trakia J Sci, 9, 4, pp. 20-25, (2011)
[2]
Mizhera M.A., Sulaiman R., Abdalla A.M.A., An improved simple flexible cryptosystem for 3D objects with texture maps and 2D images, J Inf Sec Appl, 47, pp. 390-409, (2019)
[3]
Alwi A., Zainol Ariffin K.A., Information Security Risk Assessment for the Malaysian Aeronautical Information Management System, Cyber Resilience Conference, (2018)
[4]
Kashmar A.H., Hassn A.K., Ismail E.S., Hybrid chaotic keystream generation (HCKG) for symmetric image encryption, J Theor Appl Inf Tech, 97, 3, pp. 984-993, (2019)
[5]
Jouinia M., Rabaia L.B.A., Ben Aissab A., Classification of security threats in information systems, 5th Intl Conf Ambient Systems, (2014)
[6]
Legg P.A., Buckley O., Goldsmith M., Creese S.S., Caught in the act of an insider attack: detection and assessment of insider threat, IEEE Int Symposium on Technologies for Homeland Security, (2015)
[7]
Eggenschwiler J., Agrafiotis I., Nurse J.R.C., Insider threat response and recovery strategies in financial services firms, Comput Fraud Security, 11, pp. 12-19, (2016)
[8]
Price A., Choi Y.B., Human factors in information security, Int J Comput Inf Tech, 4, 5, pp. 833-847, (2015)
[9]
Ismail W.W.B., Yusof M.M., Mitigation strategies for unintentional insider threats on information leaks, Int J Secur Appl, 12, 1, pp. 37-46I, (2018)
[10]
Ismail W.W.H.B., Yusof M.M., Assessing data leakage prevention for data-in-use, Pacific Asia Conference on Information Systems, (2017)