A Model of Control Selection in Information Security Management System
Vol. 35, No. 8, pp. 195-204, Aug. 2010
PDF Full-Text
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
H. I. Jang, H. H. Han, N. Y. Lee, C. H. Cho, "A Model of Control Selection in Information Security Management System," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 8, pp. 195-204, 2010. DOI: .
[ACM Style]
Ho Ik Jang, Ho Hyeorn Han, Nam Yong Lee, and Chang Hee Cho. 2010. A Model of Control Selection in Information Security Management System. The Journal of Korean Institute of Communications and Information Sciences, 35, 8, (2010), 195-204. DOI: .
[KICS Style]
Ho Ik Jang, Ho Hyeorn Han, Nam Yong Lee, Chang Hee Cho, "A Model of Control Selection in Information Security Management System," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 8, pp. 195-204, 8. 2010.