共 108 条
[1]
(2020)
[2]
Ahanger T.A., Aljumah A., Atiquzzaman M., State-of-the-art survey of artificial intelligent techniques for IoT security, Comput. Netw., 206, (2022)
[3]
Akinsanya O.O., Papadaki M., Sun L., Towards a maturity model for health-care cloud security (M2HCS), Inform. Comput. Secur., 28, pp. 321-345, (2020)
[4]
AlDaajeh S., Alrabaee S., Strategic cybersecurity, Comput. Secur., 141, (2024)
[5]
AlDaajeh S., Saleous H., Alrabaee S., Barka E., Breitinger F., Raymond Choo K.K., The role of national cybersecurity strategies on the improvement of cybersecurity education, Comput. Secur., 119, (2022)
[6]
Aliyu A., Maglaras L., He Y., Yevseyeva I., Boiten E., Cook A., Janicke H., A holistic cybersecurity maturity assessment framework for higher education institutions in the United Kingdom, Appl. Sci. (Switzerland), 10, pp. 1-14, (2020)
[7]
Al-Karaki J.N., Gawanmeh A., El-Yassami S., GoSafe: on the practical characterization of the overall security posture of an organization information system using smart auditing and ranking, J. King Saud Univ. Comput. Inform. Sci., (2020)
[8]
Alladi T., Chamola V., Zeadally S., Industrial control systems: cyberattack trends and countermeasures, Comput. Commun., 155, pp. 1-8, (2020)
[9]
Allan A., Perkins E., (2009)
[10]
Al-Matari O.M.M., Helal I.M.A., Mazen S.A., Elhennawy S., Adopting security maturity model to the organizations’ capability model, Egyptian Inform. J., 22, pp. 193-199, (2021)