Networks 2006. 12th International Telecommunications Network Strategy and Planning Symposium 2006
DOI: 10.1109/netwks.2006.300383
|View full text |Cite
|
Sign up to set email alerts
|

Challenges of Securing an Enterprise and Meeting Regulatory Mandates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…Ghosh, mcgraw [6] characterized a processlogy to documentation on exam safety possessions about black and white box testing strategies need aid utilized to test and confirm the safety from software product. Liao et al [12] created a process on gather distinctive measurable majority of the data. They recommended fuzzy logic and more improved system to inspect PC wrongdoing done system and the process makes advanced proofs naturally.…”
Section: Literature Surveymentioning
confidence: 99%
“…Ghosh, mcgraw [6] characterized a processlogy to documentation on exam safety possessions about black and white box testing strategies need aid utilized to test and confirm the safety from software product. Liao et al [12] created a process on gather distinctive measurable majority of the data. They recommended fuzzy logic and more improved system to inspect PC wrongdoing done system and the process makes advanced proofs naturally.…”
Section: Literature Surveymentioning
confidence: 99%