2014
DOI: 10.1007/978-3-319-11460-6_24
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Assessing the Impact of Security Attacks on Enterprise Information Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…This algorithm is based on the encryption of sensitive information file and cache switching sensitive information, and designed a sensitive information gap to coordinate CCDC in order to read the contradiction between sensitive information and sensitive information security storage. This algorithm can avoid the current sensitive information security hidden danger but faces the security hidden danger in virtual management [13][14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…This algorithm is based on the encryption of sensitive information file and cache switching sensitive information, and designed a sensitive information gap to coordinate CCDC in order to read the contradiction between sensitive information and sensitive information security storage. This algorithm can avoid the current sensitive information security hidden danger but faces the security hidden danger in virtual management [13][14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%