共 77 条
- [32] Horne CA., 2017, ARXIV PREPRINT ARXIV, V21
- [33] Imran-Daud M., 2016, P 8 INT C AG ART INT
- [34] Ismail A., 2017, P EGICE
- [35] Jayant B.D., 2014, International Journal of Computer Applications, V104, P6, DOI [10.5120/18196-9115, DOI 10.5120/18196-9115]
- [36] Classification of security threats in information systems [J]. 5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 489 - 496
- [37] Kale V., 2019, Digital Transformation of Enterprise Architecture
- [38] Kangsoo Jung, 2013, International Journal of Computer Theory and Engineering, V5, P533, DOI 10.7763/IJCTE.2013.V5.744
- [39] Kayes A., 2018, 2018 IEEE 32 INT C A
- [40] Korman M., 2016, COMPLEX SYST INFORM, V7, P1, DOI [10.7250/csimq.2016-7.01, DOI 10.7250/CSIMQ.2016-7.01]