Introduction to IT-security in open systems

被引:0
|
作者
Jerman-Blazic, B [1 ]
Schneider, W [1 ]
Schwiderski-Grosche, S [1 ]
机构
[1] Jozef Stefan Inst, Ljubljana, Slovenia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:3 / 19
页数:17
相关论文
共 50 条
  • [1] Artificial Immune Systems for IT-Security
    Stibor, Thomas
    Eckert, Claudia
    Timmis, Jonathan
    IT-INFORMATION TECHNOLOGY, 2006, 48 (03): : 168 - 173
  • [2] Holistic IT-Security
    不详
    ATP EDITION, 2009, (09): : 22 - 22
  • [3] IT-Security in Produkten
    Frank Hißen
    Wirtschaftsinformatik & Management, 2016, 8 (4) : 8 - 15
  • [4] IT-security challenges in IoT environments and autonomous systems
    Heun, Ulrich
    MICRO- AND NANOTECHNOLOGY SENSORS, SYSTEMS, AND APPLICATIONS IX, 2017, 10194
  • [5] Conceptual Information Systems discussed through an IT-security tool
    Becker, K
    Stumme, G
    Wille, R
    Wille, U
    Zickwolff, M
    KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT, PROCEEDINGS: METHODS, MODELS, AND TOOLS, 2000, 1937 : 352 - 365
  • [6] MAXIMIZE THE LEARNING SUCCESS IN IT-SECURITY
    Fruhmann, M.
    Gebeshuber, K.
    EDULEARN19: 11TH INTERNATIONAL CONFERENCE ON EDUCATION AND NEW LEARNING TECHNOLOGIES, 2019, : 8379 - 8385
  • [7] Security, with particular reference to multilateral IT-security
    Rannenberg, Kai
    Pfitzmann, A.
    Müller, G.
    IT - Information Technology, 1996, 38 (04): : 7 - 10
  • [8] The Method of Implementation of the Numerical IT-Security Metrics in Management Systems
    Livshitz, Ilya
    Lontsikh, Pavel
    Eliseev, Sergey
    PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 242 - 247
  • [9] Reference Project for IT-Security protects Systems against Attacks
    不详
    ATP EDITION, 2016, (1-2): : 9 - 9
  • [10] IT-SECURITY AND COMPUTER CRIME
    VONGRAVENREUTH, GF
    WIRTSCHAFTSINFORMATIK, 1992, 34 (04): : 419 - 424