2011 5th International Conference on Application of Information and Communication Technologies (AICT) 2011
DOI: 10.1109/icaict.2011.6110898
|View full text |Cite
|
Sign up to set email alerts
|

Development of intelligent systems for information security auditing and management: Review and assumptions analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…This security mechanism will provide organizational guidelines, standards and component analysis that leads to issuance of the recommendations. Consequently, the supposed metamode of the security standard recommendations could be created (Atymtayeva et al, 2012;Kozhakhmet et al, 2012;Atymtayeva et al, 2011).…”
Section: Security Mechanism Implementationmentioning
confidence: 99%
“…This security mechanism will provide organizational guidelines, standards and component analysis that leads to issuance of the recommendations. Consequently, the supposed metamode of the security standard recommendations could be created (Atymtayeva et al, 2012;Kozhakhmet et al, 2012;Atymtayeva et al, 2011).…”
Section: Security Mechanism Implementationmentioning
confidence: 99%