enormous 发表于 2025-3-27 00:09:07
http://reply.papertrans.cn/43/4290/428967/428967_31.pngFlavouring 发表于 2025-3-27 01:44:58
http://reply.papertrans.cn/43/4290/428967/428967_32.png整顿 发表于 2025-3-27 08:10:55
“Check, Check, Check, We Got Those” – Catalogue Use in Information Security Risk Managementay of addressing this is to enable knowledge reuse in the shape of catalogues. Catalogues in the ISRM domain can contain lists of, e.g. assets, threats and security controls. In this paper, we focus on three aspects of catalogue use. Why we need catalogues, how catalogue granularity is perceived, anreception 发表于 2025-3-27 12:05:10
http://reply.papertrans.cn/43/4290/428967/428967_34.pngNEG 发表于 2025-3-27 13:48:05
http://reply.papertrans.cn/43/4290/428967/428967_35.pngCabinet 发表于 2025-3-27 19:59:33
http://reply.papertrans.cn/43/4290/428967/428967_36.pngexpdient 发表于 2025-3-28 02:00:15
Human Aspects of Information Security and Assurance978-3-031-38530-8Series ISSN 1868-4238 Series E-ISSN 1868-422X思想灵活 发表于 2025-3-28 03:23:07
IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/h/image/428967.jpg细节 发表于 2025-3-28 09:00:43
http://reply.papertrans.cn/43/4290/428967/428967_39.pngexclamation 发表于 2025-3-28 14:15:00
http://reply.papertrans.cn/43/4290/428967/428967_40.png