A Risk Screening System by Network Diagram Recognition for Information Security Audit
暂无分享,去创建一个
[1] Theodore Tryfonas,et al. Standardising business application security assessments with pattern-driven audit automations , 2008, Comput. Stand. Interfaces.
[2] Eijiroh Ohki,et al. Information security governance framework , 2009, WISG '09.
[3] Mark S. Nixon,et al. Feature extraction & image processing for computer vision , 2012 .
[4] Anil K. Jain,et al. Text information extraction in images and video: a survey , 2004, Pattern Recognit..
[5] David C. Yen,et al. Building the evaluation model of the IT general control for CPAs under enterprise risk management , 2011, Decis. Support Syst..
[6] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[7] Edward Humphreys,et al. Implementing the ISO/IEC 27001 Information Security Management System Standard , 2007 .