Login / Signup
Three Models to Measure Information Security Compliance.
Wasim A. Al-Hamdani
Published in:
Int. J. Inf. Secur. Priv. (2009)
Keyphrases
</>
information security
countermeasures
information systems
intrusion detection
network security
security issues
computer security
data protection
smart card
security level
probabilistic model
data security
security threats