共 43 条
[3]
Alhogail A. R. E. E. J., 2014, J THEOR APPL INF TEC, V64
[5]
Angell I. O., 1993, Proceedings of COMPSEC International 1993, P382
[6]
[Anonymous], 2018, ESET SECURITY REPORT
[7]
Bair J., 2018, SEEK TRUTH MOB EVID, P283
[9]
Computer security impaired by legitimate users
[J].
COMPUTERS & SECURITY,
2004, 23 (03)
:253-264