共 19 条
[1]
Security as a Service Model for Cloud Storage
[J].
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2016,
2017, 533
:225-233
[3]
Governance Practices and Critical Success factors suitable for Business Information Security
[J].
2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN),
2015,
:1097-1104
[4]
Chen H., 2015, LECT NOTES ELECT ENG, V330, P1359
[5]
Security Aspects of Cloud Based Mobile Health Care Application
[J].
NATURE OF COMPUTATION AND COMMUNICATION,
2015, 144
:202-211
[6]
Dionysiou Ioanna, 2011, International Journal of Services and Standards, V7, P197, DOI 10.1504/IJSS.2011.045049
[7]
Grahn K, 2017, STUD COMPUT INTELL, V691, P175, DOI 10.1007/978-3-319-44257-0_8
[8]
Hlaca B, 2008, POMORSTVO, V22, P245
[9]
Holik F., 2015, 2015 25 INT C RAD RA, DOI [10.1109/RADIOELEK.2015.7128984, DOI 10.1109/RADIOELEK.2015.7128984]
[10]
IPv6 Firewall Functions Analysis
[J].
COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2016, PT II,
2016, 9876
:219-228