Author:
Kim Bong-Hyun,Kim Ki-Chan,Hong Sung-Eon,Oh Sang-Young
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference16 articles.
1. Barnett SF (1996) Computer security training and education:a needs analysis. IEEE Symposium on Security and Privacy, pp 26–27
2. Brancheau JC, Janz BD, Weatherbe JC (1996) Key issues in information systems management: 1994–95 SIM Delphi results. MIS Q 20(2):225–242
3. Denning D (1986) An intrusion detection system. Proc. Symp. Security and Privacy, IEEE Computer Soc. Press, Los Alamitos, Calif., pp 118–131
4. Dutta A, Roy R (2008) Dynamics of organizational information security. Syst Dyn Rev 24(3):349–375
5. Harrison M, Ruzzo W, Ullman J (1976) Protection in operating systems. Commun ACM 19(8):461–471
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献