共 50 条
- [41] Mitigating Cyber-Security Risks using MILS 2017 40TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2017, : 1 - 7
- [42] Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2019), 2020, 11777 : 3 - 17
- [43] External Auditors' Assessments of Cyber-Security Risks 2021 IEEE 19TH WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI 2021), 2021, : 323 - 328
- [46] Saudi Arabia's Response to Cyber Conflict: A case study of the Shamoon malware incident 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 73 - 75
- [47] A Study of a Smart Multi-layered Modular System for Portal Sites Security-A case of TMIC in Taiwan WMSCI 2008: 12TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VII, PROCEEDINGS, 2008, : 1 - 6
- [49] Managing Outsourced IT Projects' Security Risks: A Case Study ICIME 2018: PROCEEDINGS OF THE 2018 10TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, 2018, : 21 - 26
- [50] SMARTPHONE SECURITY EVALUATION The Malware Attack Case SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 25 - 36