共 82 条
[3]
Performance Evaluation of Topological Infrastructure in Internet-of-Things-Enabled Serious Games
[J].
CMC-COMPUTERS MATERIALS & CONTINUA,
2022, 71 (02)
:2653-2666
[4]
Ahmed S.R., 2007, Secure software development: Identification of security activities and their integration in software development lifecycle
[5]
DF-C2M2: A Capability Maturity Model for Digital Forensics Organisations
[J].
2014 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW 2014),
2014,
:57-60
[6]
Alghamdi M. I., 2021, Materials Today: Proceedings, DOI [https://doi.org/10.1016/j.matpr.2021.04.093, DOI 10.1016/J.MATPR.2021.04.093]
[7]
A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom
[J].
APPLIED SCIENCES-BASEL,
2020, 10 (10)
[8]
Almuhammadi S., 2017, Information Security Maturity Model for Nist Cyber Security Framework, V7, P51, DOI DOI 10.5121/CSIT.2017.70305
[9]
Alwan H.B., 2019, International Journal of Legal Information, V47, P70
[10]
[Anonymous], IEEE Journals & Magazine