共 50 条
- [21] Identity mapping -: An approach to unravel enterprise security management policies INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 79 - 88
- [22] A reference model for enterprise security -: High assurance enterprise security ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2007, : 355 - +
- [23] Subsidiarity Approach to Food Security: Practical Models and Applications LOGOS-VILNIUS, 2024, (120):
- [24] A Practical Approach for Enhancing Security in Mobile RFID Environment FUTURE INFORMATION TECHNOLOGY, 2011, 13 : 85 - 90
- [25] A comprehensive and practical approach for power system security assessment POWERCON 2002: INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY, VOLS 1-4, PROCEEDINGS, 2002, : 2336 - 2339
- [26] A Practical, Provably Unbreakable Approach to Physical Layer Security 2019 16TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2019,
- [27] Approach to estimation of level of information security at enterprise based on genetic algorithm INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
- [28] A Graph-Based Approach for Managing Enterprise Information System Security 2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 137 - +