共 45 条
[1]
Agudelo C. A., 2016, P 27 AUSTR C INF SYS, P1
[2]
Al Harthy K, 2018, INT CONF E BUS ENG, P289, DOI 10.1109/ICEBE.2018.00055
[3]
Ali MI., 2019, Int J Eng Adv Technol, V8, P1602, DOI [10.35940/ijeat.F8202.088619, DOI 10.35940/IJEAT.F8202.088619]
[4]
Ali Saqib, 2015, Journal of Theoretical and Applied Information Technology, V79, P514
[5]
Ali S, 2015, 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), P56, DOI 10.1109/CIACS.2015.7395567
[6]
[Anonymous], 2019, ITIL Foundation-ITIL, V4
[7]
Towards data-driven decision support for organizational IT security audits
[J].
IT-INFORMATION TECHNOLOGY,
2018, 60 (04)
:207-217
[8]
Chang S. I., 2016, PAC AS C INF SYST PA
[10]
Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation
[J].
CYBER SECURITY, CNCERT 2018,
2019, 970
:165-176