共 41 条
[1]
Ahlan A. R., 2011, 2011 7th International Conference on Information Assurance and Security (IAS), P246, DOI 10.1109/ISIAS.2011.6122827
[3]
Al-Omari Ahmad, 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P3317, DOI 10.1109/HICSS.2012.516
[4]
Aloul Fadi A., 2012, Journal of Advances in Information Technology, V3, P176, DOI 10.4304/jait.3.3.176-183
[5]
Amankwa E, 2014, INT CONF INTERNET, P248, DOI 10.1109/ICITST.2014.7038814
[6]
[Anonymous], P 2015 ACM SIGMIS C
[7]
[Anonymous], 2010, J INF ASSUR CYBERSEC, DOI DOI 10.5171/2010.305412
[8]
[Anonymous], 2012, COMPUT FRAUD SEC MAR
[9]
[Anonymous], 2006, INNOVATIONS INFORM T
[10]
[Anonymous], DTIC DOCUMENT