[1] |
DHINGRA M . Legal issues in secure implementation of bring your own device (BYOD)[J]. Procedia Computer Science, 2016,78:179-184.
|
[2] |
Intel Security. Report of threat prediction in 2016 from McAfee labs[R/OL]. , 2016-06-10.
|
[3] |
Symantec. Internet security threat report[R/OL]. , 2016-0 7-13.
|
[4] |
Wikipedia. Hillary clinton email controversy[R/OL]. , 2016-0 7-17.
|
[5] |
SARI P K , TRIANASARI N . Information security awareness meas-urement with confirmatory factor analysis[C]// International Sympo-sium on Technology Management and Emerging Technologies,2014. ISTMET 2014.IEEE, 2014:218-223.
|
[6] |
NGOQO B , FLOWERDAY S V . Information security behaviour profiling framework (ISBPF) for student mobile phone users[J]. Computers & Security, 2015,3: 132-142.
|
[2] |
陈波, 朱汉, 刘亚尚 . 个人信息安全素养评测手机软件开发[J]. 信息安全与技术, 2014,5(10):50-55. CHEN B , ZHU H , LIU Y S . Mobile software development for evalua-tion of personal information security literacy[J]. Information Security and Technology, 2014,5(10):50-55.
|
[8] |
Naval Postgraduate School. The center for information systems secu-rity studies and research,CyberCIEGE scenario development tool user's guide[R/OL]. . 2010-0 04-17.
|
[9] |
WARD R , BEYER B . Beyondcorp:a new approach to enterprise security[J]. The Magazine of USENIX & SAGE, 2014,39(6):6-11.
|
[10] |
DONNER M . Toward a security ontology[J], IEEE Security and Pri-vacy, 2003,1(3):6-7.
|
[11] |
RAZZAQ A , ANWAR Z , AHMAD H F , et al. Ontology for attack detection:an intelligent approach to Web application security[J]. Computers & Security, 2014,45:124-146.
|
[12] |
EKELHART A , KIESLING E , GRILL B , et al. Integrating attacker behavior in IT security analysis:a discrete-event simulation ap-proach[J]. Information Technology and Management, 2015,16(3):221-233.
|
[13] |
BRAHMI I , BRAHMI H , YAHIA S B . A multi-agents intrusion de-tection system using ontology and clustering techniques[M]// Com-puter Science and Its Applications. Springer International Publishing, 2015:381-393.
|
[14] |
MUNDIE D , MCINTIRE D M . An ontology for malware analysis[C]//International Conference on Availability,Reliability and Security,IEEE, 2013:556-558.
|
[15] |
SOLIC K , OCEVCIC H , GOLUB M . The information systems' secu-rity level assessment model based on an ontology and evidential rea-soning approach[J]. Computers & Security, 2015,55:100-112.
|
[16] |
MOULISWARAN S C , KUNMARC A , CHANDRASEKAR C . In-ter-domain role based access control using ontology[C]// International Conference on Advances in Computing,Communications and Infor-matics,2015, 2015:2027-2032.
|
[17] |
CHUN S A , GELLER J . Developing a pedagogical cybersecurity ontology[M]//Data Management Technologies and Applications. Springer International Publishing, 2014:117-135.
|
[18] |
MCCLELLAND C D . Testing for competence rather than for intelli-gence[J]. American Psychologist, 1973,28(1):1-24.
|
[19] |
PRAHALAD C K , HAMEL G . The core competence of the corpora-tion[J]. Harvard Business Review, 1990,68(3):79-91.
|