共 49 条
[2]
[Anonymous], 1992, 10 LECT WAVELETS
[6]
Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
[7]
Computer security impaired by legitimate users
[J].
COMPUTERS & SECURITY,
2004, 23 (03)
:253-264