لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
سند راهبردی امنیت فضای تبادل اطلاعات کشور (افتا)، دبیرخانه شورای ...
.- Dohertty Neil F., Fulford Heather, aligig the information security ...
!- Mellado Daniel, F erandez-M edina Eduardo, Piattini Mario, A ...
_ Eloff J.H.P., Eloff M.M., Information security architecture, Computer Fraud ...
l- DTI. Information security breaches survey, department of trade & ...
Computer Emergency Response Team (CERT) (2004), ،4CERT statistics*, available at: ...
_ Mitchell, Ruth C., Marcella, Rita, Baxter, Graeme, Corporate information ...
Parker, R, How to profit by safeguarding privacy, Journal of ...
_ Smith, Alan D. _ E-security issues and policy developmemt ...
Zuccato, Albin , Holistic security management framework applied i electronic ...
Damm, Daniela, Schidler, Martin, Security issues of a knowledge medium ...
Foster, I., Kesselman, C. , Tuecke, _ _ The anatomy ...
Foster, I., Kishimoto, H., Savva, A., Berry, D., Djaoui, A., ...
Gymmopoulos, Lazaros, Tsoumas, Vassilios, Soupionis, Ioauris, Gritzalis, Stefanos, A generic ...
Stephenson, Paul, Ensuring consistemt security imp lemeftation withi a distributed ...
Lam, James.. Enterprise Risk Managemeft: From Incetives to Controls. Hobokean: ...
Ward, peter, Smith, Clifton 1, The developmemt of access comtrol ...
Rasmusson, L., Jansson, S... Simulated social control for secure internet ...
Ahamed, Sheikh I., Zulkernine, Mohammad, Wolfe, Steve, A software-bas ed ...
Weise, J., Public Key Infrastructure Overview, Sun BluePrits, 2006, Online, ...
Gray, Elizabeth, Jensen, Christian, OComnell, Paul Weber, Stefan, Seigneur, Jean-Marc, ...
G. Helmer, J. Wong, V. Honavar, L. Miller, Lightweight, agents ...
D. Chapman, D. Zwicky, Building Internet Firewalls, OReilly, & Associates, ...
Venkates Waran, R., Virtual private networks, IEEE Potemtials, 20 (1), ...
McClure, S., Scambray, J., Kurtz, G., Hackig Expos ed, Network ...
Harris, S., Denying, Derial-of-S ervice, Information Security Magazine, September 2001. ...
Sterme, D., Djahandari, K., Balupari, R., Cholter, W., Babson, B., ...
Beom-Hwan Chang, Dong-Soo Kim, Hyun-Ku Kim, Jung-Chan Na, Tai-Myoung Chumg, ...
Rold, C.D. _ service Market: Techical Convergence, Gartner Inc., Stamford, ...
Kim Sangkyumm , Leemm, Choon Seog, Enterprise security arcitecture in ...
Anderson, Kent, Convergence: A holistic approach to risk management, Network ...
BS 7799. BS 7799: code of practice for information security ...
Posthumus, Shaun, von Solms, Rossouw, A framework for the govemance ...
Gerber M, _ Solms R., From risk analysis to security ...
Rana, Omer, Hilton, Jeremy, Securig the virtual organization - Part ...
Wang, H., Jha, S., Livmy, M. and McDaniel, P.D , ...
Jackson, K.R., Johston, W.E. and Talwar, _ , Overview of ...
Gymmopoulos, L., Dritsas, S., Gritzalis, _ and L ambrinoudakis _ ...
Furnell, Steven, Securig the home worker, Network Security, November, 2006 ...
Fumy, Walter, IT security s tandardization, Network Security, December 2004, ...
Hone, K., Eloff, J.H.P., Information security policy: what do international ...
Kokolakis, s.A. and Kioumtouzis, E.A., Achieving imterop erability i a ...
Bishop, M., Computer Security: Art and Science, Addis on-Wesley, New ...
McDaniel, P. and Prakash, A., Methods and limitations of security ...
Barman, S., Writing Information Security Policies, New Riders Publishing, Indianapolis, ...
Berti, J. , Rogers, M., Social engineering: the forgotten risk, ...
Mitnick, K.D. _ Simon, W.L. _ The art of deception ...
Thomson, Kerry-Lymn, von Solms, Rossouw Louw, Lymette, Cultivatig _ organizational ...
Whitman, M.E. & Mattord, H.J., Principles of Information Security, Kemnesaw ...
National Institute of Science and Technology Special Publication, Information techology ...
Henry, K., The human side of information security. Information security ...
Thomson, K. and von Solms, R., Information security obedience: A ...
Chen, Tsung-Yi, Chen, Yuh-Min, Chu, Hui-Chuan, Wang, Chin-Bin, Developmemt of ...
Varian H., System Reliability and free Ridding, Workshop on economics ...
Kunreuther H., Heal G., independent security, joual of risk and ...
Gal-or E., Ghose, A, The economic investingof sharig security information, ...
Kjaerland, Maria, A taxonomy and comparison of computer security incideats ...
Harris, Douglas, Khan, Latifur, Paul, Raymond, Thurais ingham, Bhavai, Stadards ...
Gordon, L. and M. Loeb, The Economics of Information Security ...
Yu Jinqiao, Reddy, Y.V. Ramana , Selliah, Semtil, Reddy, Sumitra, ...
Ksiezopolski, Bogdan, Kotulski, Zbigniew, Adaptable security mechaism for dyamic environments, ...
Bakry, Saad Haj, Developmemt of security policies for private networks, ...
Cheng, T.C. Edwin, Lam, David Y.C., Yeung, Andy C.L., Adoption ...
Rowlingson, R.R., Marrying privacy law to information security, Computer Fraud ...
Von Solm, Rossouw, Von Solms, S.H. (Basie), Information security govemance: ...
J. Haggerty, Dr. M. Taylor, Managig corporate computer foregsics, Computer ...
Pinder, Phil, Preparing Information Security for legal and regulatory compliace ...
Gil-Garcia, J. Ramon, Information techology policies and standards: A comparative ...
Von Solm, Rossouw, Von Solms, S.H. (Basie), Information Security Governance: ...
Knapp, Keneth J., Marshall, Thomas E., Rainer, R. Kelly, Ford, ...
Albrechtsen, Eirik, A qualitative study of users* view _ information ...
Stanton, Jeffrey M., Stam, Kathryn R., Mastrangelo, Paul, Jolton, Jeffrey, ...
Valentine, Andrew, Enhancing the employee security awareesS model, Computer Fraud ...
Kuo, M.H., An itelligent agemt-based collaborative information, security framework, Expert ...
Amini, Morteza, Jalili, Rasool, Shahriari, Hamid Reza, RT-UNNID: A practical ...
Youssef, Sherin M., AbdelRahman, Shaza B., A smart access comtrol ...
Wang, Da-Wei, Liau, Chun-Jung, Hsu, Tsan-sheg, An epistemic framework for ...
Abadi, Martin, Cortier, Veronique, Deiding knowledge in security protocols under ...
Lamberta, H. David, Leonhardt, Charles F., Federated authetication to support ...
Vroblefski, Mark, Chen, Andrew, Shao, Bemjamin, Swinarski, Matthew, Managig user ...
Calderon, T.G., Chandra, Akhilesh, Cheh, John J., Modeling an intelligeft ...
نمایش کامل مراجع