http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
이 학술지의 논문 검색
A Comparative study of standards and practices related to information security management
Frangopoulos, E.D. ISSA 2004 p.1
Run-time Protocol-Conformance Verification in Firewalls
Ultes-Nitsche, U.; Yoo, I. ISSA 2004 p.3
Applying similarities between immune systems and mobile agent systems in Intrusion Detection
Zielinski, M. ISSA 2004 p.5
Are Current B2B Security Standards Antithetical to Global Interoperability?
Pather, M. ISSA 2004 p.7
A General Methodology for the Development Of An Effective Information Security Policy
Ramdeyal, A. ISSA 2004 p.9