中国信息安全最新文献

筛选
英文 中文
Encouraging Equivocal Forensic Analysis Through the Use of Red Herrings 通过使用“红鲱鱼”鼓励模棱两可的法医分析
中国信息安全 Pub Date : 2020-08-16 DOI: 10.1007/978-3-030-59291-2_13
W. S. Leung
{"title":"Encouraging Equivocal Forensic Analysis Through the Use of Red Herrings","authors":"W. S. Leung","doi":"10.1007/978-3-030-59291-2_13","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_13","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"19 1","pages":"184 - 197"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75901640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing Competency Models for Cybersecurity Professionals for the Banking Sector 为银行业网络安全专业人员设计能力模型
中国信息安全 Pub Date : 2020-08-16 DOI: 10.1007/978-3-030-59291-2_6
A. Vybornov, N. Miloslavskaya, A. Tolstoy
{"title":"Designing Competency Models for Cybersecurity Professionals for the Banking Sector","authors":"A. Vybornov, N. Miloslavskaya, A. Tolstoy","doi":"10.1007/978-3-030-59291-2_6","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_6","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"8 1","pages":"81 - 95"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90210140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Institutional Risk Reduction Model for Teaching Cybersecurity 网络安全教学机构风险降低模型
中国信息安全 Pub Date : 2020-08-16 DOI: 10.1007/978-3-030-59291-2_2
Erik L. Moore, Daniel M. Likarish, Bobbie Bastian, Michael Brooks
{"title":"An Institutional Risk Reduction Model for Teaching Cybersecurity","authors":"Erik L. Moore, Daniel M. Likarish, Bobbie Bastian, Michael Brooks","doi":"10.1007/978-3-030-59291-2_2","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_2","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"71 1","pages":"18 - 31"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84135922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Education for the Multifaith Community of Cybersecurity 网络安全多信仰社区教育
中国信息安全 Pub Date : 2020-08-16 DOI: 10.1007/978-3-030-59291-2_3
S. Furnell, M. Bishop
{"title":"Education for the Multifaith Community of Cybersecurity","authors":"S. Furnell, M. Bishop","doi":"10.1007/978-3-030-59291-2_3","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_3","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"27 1","pages":"32 - 45"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87903935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Serious Game-Based Peer-Instruction Digital Forensics Workshop 一个严肃的基于游戏的同行指导数字取证研讨会
中国信息安全 Pub Date : 2020-08-16 DOI: 10.1007/978-3-030-59291-2_9
Ludwig Englbrecht, G. Pernul
{"title":"A Serious Game-Based Peer-Instruction Digital Forensics Workshop","authors":"Ludwig Englbrecht, G. Pernul","doi":"10.1007/978-3-030-59291-2_9","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_9","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"62 1","pages":"127 - 141"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74363832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat Poker: Gamification of Secure Agile 威胁扑克:安全敏捷的游戏化
中国信息安全 Pub Date : 2020-08-16 DOI: 10.1007/978-3-030-59291-2_10
A. Jøsang, V. Stray, Hanne Rygge
{"title":"Threat Poker: Gamification of Secure Agile","authors":"A. Jøsang, V. Stray, Hanne Rygge","doi":"10.1007/978-3-030-59291-2_10","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_10","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"11 1","pages":"142 - 155"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74293881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quality Criteria for Cyber Security MOOCs 网络安全mooc质量标准
中国信息安全 Pub Date : 2020-08-16 DOI: 10.1007/978-3-030-59291-2_4
S. Fischer-Hübner, Matthias Beckerle, Alberto Lluch-Lafuente, A. Ruiz-Martínez, Karo Saharinen, A. Gómez-Skarmeta, Pierantonia Sterlini
{"title":"Quality Criteria for Cyber Security MOOCs","authors":"S. Fischer-Hübner, Matthias Beckerle, Alberto Lluch-Lafuente, A. Ruiz-Martínez, Karo Saharinen, A. Gómez-Skarmeta, Pierantonia Sterlini","doi":"10.1007/978-3-030-59291-2_4","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_4","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"26 1","pages":"46 - 60"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72669075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring the Value of a Cyber Threat Intelligence Function in an Organization 探索组织中网络威胁情报功能的价值
中国信息安全 Pub Date : 2020-08-16 DOI: 10.1007/978-3-030-59291-2_7
Anzel Berndt, Jacques Ophoff
{"title":"Exploring the Value of a Cyber Threat Intelligence Function in an Organization","authors":"Anzel Berndt, Jacques Ophoff","doi":"10.1007/978-3-030-59291-2_7","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_7","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"237 1","pages":"96 - 109"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73960927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enlivening Port Scanning Exercises with Capture the Flag and Deduction 生动活泼的港口扫描练习,包括抓旗和推理
中国信息安全 Pub Date : 2020-08-16 DOI: 10.1007/978-3-030-59291-2_12
F. Blauw
{"title":"Enlivening Port Scanning Exercises with Capture the Flag and Deduction","authors":"F. Blauw","doi":"10.1007/978-3-030-59291-2_12","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_12","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"21 1","pages":"170 - 183"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74445034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning and Grading Cryptology via Automated Test Driven Software Development 通过自动化测试驱动软件开发学习和分级密码学
中国信息安全 Pub Date : 2020-08-16 DOI: 10.1007/978-3-030-59291-2_1
Konstantin Knorr
{"title":"Learning and Grading Cryptology via Automated Test Driven Software Development","authors":"Konstantin Knorr","doi":"10.1007/978-3-030-59291-2_1","DOIUrl":"https://doi.org/10.1007/978-3-030-59291-2_1","url":null,"abstract":"","PeriodicalId":60010,"journal":{"name":"中国信息安全","volume":"111 1","pages":"3 - 17"},"PeriodicalIF":0.0,"publicationDate":"2020-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77880686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信