[HTML][HTML] 安全标准约束下的信息安全部分外包研究——基于外部性不对称视角

刘艺浩, 吴勇 - Management Science and Engineering, 2023 - hanspub.org
… through professional and efficient information security management means. … considers
the asymmetric security externality between the firm and the MSSP and the mandatory security

检测僵尸用户提高微博数据的可靠度

吴贤, 范伟, 高晶, 冯子明, 俞勇 - 计算机科学技术学报, 2015 - jcst.ict.ac.cn
… users that access microblog for information sharing or social … Note that to simplify the
presentation, we consider the case … queries or conduct fake clicks to hack the log of search …

[图书][B] 信息安全专业英语选读

杨淑芳, 张俊 - 2017 - books.google.com
… a stir among hobbyists and hackers, and it wasn’t long … and give them special consideration
and focus when developing … also exist to facilitate threat information sharing between similar …

[图书][B] 国际警务

苏竞 - 2015 - books.google.com
It is obvious that a majority of social systems consider the so-called informal ( hidden)
economic activity, which is the bulk of organized transnational criminality, to be illegal and …