has been cited by the following article(s):
[1]
|
Taxonomy of Cyber Risk Mitigation Cost Benefit Analysis Methods for Energy Infrastructure
2024 IEEE International Conference on Cyber Security and Resilience (CSR),
2024
DOI:10.1109/CSR61664.2024.10679375
|
|
|
[2]
|
Privacy Law Protection Based on the Information Security Assurance Algorithm
Computational Intelligence and Neuroscience,
2022
DOI:10.1155/2022/8006605
|
|
|
[3]
|
Defense-In-Depth Security Strategy in Log4j Vulnerability Analysis
2022 International Conference Advancement in Data Science, E-learning and Information Systems (ICADEIS),
2022
DOI:10.1109/ICADEIS56544.2022.10037384
|
|
|
[4]
|
Handbook of Multimedia Information Security: Techniques and Applications
2019
DOI:10.1007/978-3-030-15887-3_2
|
|
|