共 50 条
- [42] Documentation Requirements and Quantified versus Qualitative Audit Risk Assessments AUDITING-A JOURNAL OF PRACTICE & THEORY, 2011, 30 (04): : 223 - 248
- [46] Hazard analysis for security protocol requirements ADVANCES IN NETWORK AND DISTRIBUTED SYSTEMS SECURITY, 2001, 78 : 75 - 92
- [47] Quantum Cryptography - The Analysis of Security Requirements ICTON: 2009 11TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOLS 1 AND 2, 2009, : 814 - 817
- [48] Counterfactual Risk Assessments, Evaluation, and Fairness FAT* '20: PROCEEDINGS OF THE 2020 CONFERENCE ON FAIRNESS, ACCOUNTABILITY, AND TRANSPARENCY, 2020, : 582 - 593
- [49] THE SECURITY ENGINEERING DESIGN PROCESS, AN EVALUATION PROCEDURE FOR PHYSICAL SECURITY REQUIREMENTS STRUCTURES FOR ENHANCED SAFETY AND PHYSICAL SECURITY, 1989, : 61 - 72