共 30 条
[1]
Baer W., 2003, Contemporary security policy, V24, P190, DOI DOI 10.1080/13523260312331271869
[4]
Böhme R, 2010, LECT NOTES COMPUT SC, V6442, P21, DOI 10.1007/978-3-642-17197-0_2
[5]
Applying ROI analysis to support SOA information security investment decisions
[J].
2008 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, VOLS 1 AND 2,
2008,
:359-+
[6]
Stakeholder value driven threat modeling for off the shelf based systems
[J].
29TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: ICSE 2007 COMPANION VOLUME, PROCEEDINGS,
2007,
:91-+
[7]
Denyer D., 2009, The Sage handbook of organizational research methods, P671
[10]
Frühwirth C, 2009, INT SYMP EMP SOFTWAR, P536