共 51 条
[1]
Ahmed S., 2011, Proceedings of the 2011 13th International Conference on Advanced Communication Technology (ICACT). Smart Service Innovation through Mobile Interactivity, P1579
[2]
Ajmi L., 2019, 2019 2nd International Conference on Computer Applications Information Security (ICCAIS), P1, DOI [10.1109/CAIS.2019.8769470, DOI 10.1109/CAIS.2019.8769470]
[3]
Al Hamed T., 2016, International Journal of Hybrid Information Technology, V9, P99, DOI DOI 10.14257/IJHIT.2016.9.11.10
[4]
Al Sheikh A., 2017, CYBER SECURITY FRAME
[5]
Alharthi A., 2017, International Journal of Intelligent Computing Research, V8, P817, DOI [DOI 10.20533/IJICR.2042.4655.2017, 10.20533/ijicr.2042.4655.2017.0100, DOI 10.20533/IJICR.2042.4655.2017.0100]
[6]
Alhussain R., 2012, CONCEPTUAL FRAMEWORK
[7]
Ali W., 2020, Higher Education Studies, V10, P16, DOI DOI 10.5539/HES.V10N3P16
[8]
A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom
[J].
APPLIED SCIENCES-BASEL,
2020, 10 (10)
[9]
Almuhammadi S., 2017, Information Security Maturity Model for Nist Cyber Security Framework, V7, P51, DOI DOI 10.5121/CSIT.2017.70305
[10]
Alshehri Y.A., 2020, Creative Education, V11, P985, DOI [10.4236/ce.2020.117071, DOI 10.4236/CE.2020.117071]