共 8 条
[1]
Bangor A, 2009, J USABILITY STUD, V4, P114
[2]
Barnum S., 2014, Structured threat information expression (STIXTM), P1
[3]
Denning T., 2013, P ACM C COMP COMM SE, DOI [10.1145/2508859.2516753, DOI 10.1145/2508859.2516753]
[4]
Nah Fiona Fui-Hoon, 2014, HCI in Business. First International Conference, HCIB 2014. Held as Part of HCI International 2014. Proceedings: LNCS 8527, P401, DOI 10.1007/978-3-319-07293-7_39
[5]
Shostack Adam., 2014, USENIX Summit on Gaming, Games, and Gamification in Security Education, P1
[6]
Watson Colin, 2012, OWASP CORNUCOPIA ECO
[7]
White G.B., 2016, TECH REP