Publisher
Springer International Publishing
Reference24 articles.
1. Lallie, H.S., et al.: Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Compute. Secur. 105, 102248 (2021)
2. Miao, Y., Chen, C., Pan, L., Han, Q. L., Zhang, J., Xiang, Y.: Machine learning based cyber attacks targeting on controlled information: a survey. arXiv preprint arXiv:2102.07969 (2021)
3. Yamin, M.M., Ullah, M., Ullah, H., Katt, B.: Weaponized AI for cyber attacks. J. Inf. Secur. Appl. 57, 102722 (2021)
4. Golyash, I., Sachenko, S., Rippa, S.: Improving the information security audit of enterprise using XML technologies. In: Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, vol. 2, pp. 795–798. IEEE, Sept 2011
5. Steinbart, P.J., Raschke, R.L., Gal, G., Dilla, W.N.: The influence of a good relationship between the internal audit and information security functions on information security outcomes. Acc. Organ. Soc. 71, 15–29 (2018)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cyber threats to the Private Academic Cloud;International Journal of Electronics and Telecommunications;2024-06-25
2. Software Package for Information Leakage Threats Relevance Assessment;Cybernetics Perspectives in Systems;2022