Subject
Law,General Computer Science
Reference64 articles.
1. Nugraha Y, Kautsarina, Sastrosubroto AS. “Towards data sovereignty in cyberspace,ȁ 2015 3rd International Conference on Information and Communication Technology (ICoICT), 2015, pp. 465–471, doi:10.1109/ICoICT.2015.7231469. https://ieeexplore.ieee.org/abstract/document/7231469.
2. An adaptive wideband delphi method to study state cyber-defence requirements;Nugraha;IEEE Trans. Emerg. Top. Comput.,2016
3. A test-based security certification scheme for web services;Anisetti;Proc. ACM Trans. Web,2013
4. Security Audits Revisited;Bo¨hme,2012
5. Investigating security capabilities in service level agreements as trust-enhancing instruments;Nugraha,2017
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献