-
The color approach of the level of cyber security risk presentation
An attempt to localize ISO Guide 73:2009 "Risk Management - Vocabulary"
Conceptual architecture description model of information security management system
First steps of information forces volunteers
Геометричний підхід до оцінювання імовірності прийнятних ризиків безпеки інформації
ПРОБИТ-АНАЛИЗ РИСКОВ БЕЗОПАСНОСТИ ИНФОРМАЦИИ
Использование RSA алгоритма для обеспечения задач криптографической защиты информации в...
Descriptive analysis of analogies between information security management and queuing...
General solving linear Diophantine equations based on a modular transformation for risk...
Функціональне моделювання системи керування ризиком безпеки інформації
Сведение задачи факторизации к решению системы нелинейных уравнений в алгебре Жегалкина
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only entries containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"