has been cited by the following article(s):
[1]
|
A quantitative framework for security assurance evaluation and selection of cloud services: a case study
International Journal of Information Security,
2023
DOI:10.1007/s10207-023-00709-8
|
|
|
[2]
|
A quantitative framework for security assurance evaluation and selection of cloud services: a case study
International Journal of Information Security,
2023
DOI:10.1007/s10207-023-00709-8
|
|
|
[3]
|
LCCI: A framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs)
International Journal of Information Management Data Insights,
2022
DOI:10.1016/j.jjimei.2022.100080
|
|
|
[4]
|
The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses
Computers & Security,
2021
DOI:10.1016/j.cose.2021.102385
|
|
|
[5]
|
The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses
Computers & Security,
2021
DOI:10.1016/j.cose.2021.102385
|
|
|
[6]
|
Information Security Practice and Experience
Lecture Notes in Computer Science,
2019
DOI:10.1007/978-3-030-34339-2_20
|
|
|
[7]
|
Secure software engineering: Evaluation of emerging trends
2017 8th International Conference on Information Technology (ICIT),
2017
DOI:10.1109/ICITECH.2017.8079952
|
|
|