共 38 条
[1]
Algarni A., 2014, International Journal of Computer, Information Science and Engineering, P71
[2]
Algarni Abdullah M., 2016, 2016 2nd International Conference on Information Management (ICIM), P26, DOI 10.1109/INFOMAN.2016.7477530
[3]
Algarni A. M, 2013, P INT C SECURITY MAN, P1
[4]
Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems
[J].
APPLIED SCIENCES-BASEL,
2021, 11 (08)
[5]
Allodi L., 2012, P ESSOS DOCTORAL S
[6]
Economic Factors of Vulnerability Trade and Exploitation
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1483-1499
[7]
Anderson R., 2008, ISSE 2008 SECURING E, P57
[8]
Arbaugh WA, 2000, COMPUTER, V33, P52, DOI 10.1109/2.889093
[9]
Arnold Benjamin, 2020, 2020 International Conference on Computational Science and Computational Intelligence (CSCI), P1743, DOI 10.1109/CSCI51800.2020.00323