Social engineering attack modeling with the use of Bayesian networks
暂无分享,去创建一个
[1] Antonio Puliafito,et al. Information dependability in distributed systems: The dependable distributed storage system , 2014, Integr. Comput. Aided Eng..
[2] Dan Jong Kim,et al. A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate , 2014, IEEE Transactions on Professional Communication.
[3] Jurij F. Tasic,et al. Information systems security and human behaviour , 2007, Behav. Inf. Technol..
[4] James Cox,et al. Information systems user security: A structured model of the knowing-doing gap , 2012, Comput. Hum. Behav..