共 50 条
- [41] Does Cyber Insurance Promote Cyber Security Best Practice? An Analysis Based on Insurance Application Forms DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (03):
- [42] On the Use of Security Principles and Practices for Architecting Cyber-Physical Systems ACM PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE WORKSHOPS (ECSA-W), 2016,
- [43] Best Security Measures to Reduce Cyber-Incident and Data Breach Risks DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2021, 2022, 13140 : 3 - 19
- [44] Evaluation of Wireless Access Point Security and Best Practices for Mitigation 2021 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER TECHNOLOGIES AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2021, : 422 - 427
- [45] Disaster Recovery on Cloud - Security Compliance Challenges and Best Practices PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 149 - 158
- [48] Best Practices for Notification Studies for Security and Privacy Issues on the Internet ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
- [49] Next generation SCADA security: Best practices and client puzzles Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2005, : 426 - 427
- [50] Decrypting SSL traffic: best practices for security, compliance and productivity Network Security, 2019, 2019 (08): : 17 - 19