共 50 条
- [31] A game theory model of cybersecurity investments with information asymmetry NETNOMICS, 2015, 16 (1-2): : 127 - 148
- [32] A Game Theoretical Model of Information Dissemination in Social Network PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 213 - 218
- [34] Collaborative Ordering of Enterprises with Differentiated Products under the Protection of Sensitive Information 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 658 - +
- [36] Identification of Sensitive Content in Data Repositories to Support Personal Information Protection RECENT TRENDS AND FUTURE TECHNOLOGY IN APPLIED INTELLIGENCE, IEA/AIE 2018, 2018, 10868 : 898 - 910
- [38] A sensitive information protection scheme in Named Data Networking using attribute-based ring-signcryption 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 187 - 194
- [39] Research on Topic Recognition of Network Sensitive information Based on SW-LDA Model IEEE ACCESS, 2019, 7 : 21527 - 21538
- [40] Research on the Benefit Allocation Model in Ecological Supply Chain Information Share Based on Game Theory 2012 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, 2012, : 583 - 588