共 9 条
[2]
Beyond zero: analysing threat trends[J] . Will Gragido. Network Security . 2011 (7)
[3]
Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems[J] . Huseyin Cavusoglu,Srinivasan Raghunathan,Hasan Cavusoglu. Information Systems Research . 2009 (2)
[4]
Analysing business losses caused by information systems risk: a business process analysis approach[J] . Salmela,Hannu. Journal of Information Technology . 2008 (3)
[5]
Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements[J] . Sandip C. Patel,James H. Graham,Patricia A.S. Ralston. International Journal of Information Management . 2008 (6)
[7]
Threats and countermeasures for information system security: A cross-industry study[J] . Quey-Jen Yeh,Arthur Jung-Ting Chang. Information & Management . 2007 (5)
[8]
Game strategies in network security[J] . Kong-wei Lye,Jeannette M. Wing. International Journal of Information Security . 2005 (1)