Author:
Barria Cristian,Cordero David,Galeazzi Lorena,Acuña Alejandra
Publisher
Springer International Publishing
Reference12 articles.
1. Rea, A., Sánchez, I., San Feliu, T., Calvo, J.: Maturity models in cybersecurity: a systematic review. In: 12th Iberian Conference on Information Systems and Technologies (CISTI), pp. 284–289 (2017)
2. Barría, C., Cordero, D.: Proposed classification of malware, based on obfuscation. In: IEEE 6th International Conference on Computers Communications and Control (ICCCC), Oradea, Romania (2016)
3. Chopra, A., Chaudhary, M.: Implementing an Information Security Management System. Apress, New York (2020)
4. De Haes, S., Van Grembergen, W.: Enterprise Governance of Information Technology, 2nd edn. Springer, Belgium (2015)
5. Thompson, E.C.: Building a HIPAA-Compliant Cybersecurity Program. Apress, New York (2017)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献