共 13 条
[1]
Anwar M.M., 2007, INT C EL ENG 2007 IC, P1, DOI DOI 10.1109/ICEE.2007.4287288
[2]
Information Security Risk Assessment in Healthcare: the Experience of an Italian Paediatric Hospital
[J].
2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009),
2009,
:321-+
[3]
Cao J, 2004, INT C COMP SUPP COOP, P563
[4]
Cheng XY, 2006, PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, P3573
[5]
Ontology-based Decision Support for Information Security Risk Management
[J].
2009 FOURTH INTERNATIONAL CONFERENCE ON SYSTEMS (ICONS),
2009,
:80-+
[6]
An inclusive information society needs a global approach of information security
[J].
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2,
2009,
:658-662
[7]
Integrating information security engineering with system engineering with system engineering tools
[J].
SEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '98),
1998,
:320-326
[8]
Kajava J., 2006, IEEE. ss, P2091
[9]
Study on Information Security of Industry Management
[J].
2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 1, PROCEEDINGS,
2009,
:522-+
[10]
Peng W, 2009, INT C COMP AID IND D, P1, DOI [10.1109/CAIDCD.2009.5375185, 10.1109/PLASMA.2009.5227264]