共 31 条
[1]
Ahmad A., 2013, P 11 AUSTR INF SEC M, DOI [10.4225/75/57b56667cd8-5, DOI 10.4225/75/57B56667CD8-5]
[2]
Al Amro S, 2012, STUD COMPUT INTELL, V394, P35
[3]
Information Security Management in Saudi Arabian Organizations
[J].
10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS,
2015, 56
:213-216
[4]
[Anonymous], 2013, Global Journal of Flexible Systems Management, DOI [DOI 10.1007/S40171-013-0047-4, 10.1007/s40171-013-0047-4]
[5]
[Anonymous], 2011, ADV DECISION MAKING
[6]
[Anonymous], 270052011 ISOIEC
[7]
[Anonymous], 2013, FUZZYLITE FUZZY LOGI
[9]
Benova M., 2015, MAN INF BEZP MAL STR, P14
[10]
Bolek V., 2015, MAN INF BEZP MAL STR, P22