ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Construction Strategy of Enterprise Security Management Blockchain based on Capsule Network and Situation Awareness1
Mapping Intimacies
◽
10.1109/icce-tw52618.2021.9603157
◽
2021
◽
Author(s):
Li Boheng
Keyword(s):
Security Management
◽
Construction Strategy
◽
Enterprise Security
Download Full-text
Related Documents
Cited By
References
Enterprise Security Management Program
Information Security Management Handbook, Volume 3
◽
10.1201/9781420003406-22
◽
2006
◽
pp. 247-256
Keyword(s):
Security Management
◽
Management Program
◽
Enterprise Security
Download Full-text
Design of Port Enterprise Security Management Information System Based on Mobile Platform
3rd International Conference on Electromechanical Control Technology and Transportation
◽
10.5220/0006966401360140
◽
2018
◽
Author(s):
Mingqi Zhang
Keyword(s):
Information System
◽
Management Information System
◽
Security Management
◽
Mobile Platform
◽
Management Information
◽
Enterprise Security
Download Full-text
An Enterprise Security Management System as an ASP Solution
2006 International Conference on Hybrid Information Technology
◽
10.1109/ichit.2006.253660
◽
2006
◽
Cited By ~ 2
Author(s):
Yoonsun Lim
◽
Myung Kim
◽
Anmo Jeong
Keyword(s):
Management System
◽
Security Management
◽
Enterprise Security
Download Full-text
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Information Security and Cryptology - Lecture Notes in Computer Science
◽
10.1007/11937807_22
◽
2006
◽
pp. 279-288
Author(s):
Yoonsun Lim
◽
Myung Kim
◽
Kwang Hee Seo
◽
Ho Kun Moon
◽
Jin Gi Choe
◽
...
Keyword(s):
Management System
◽
Security Management
◽
Web Based
◽
Application Service
◽
Medium Businesses
◽
Enterprise Security
Download Full-text
Cyber security components for pervasive Enterprise Security Management and the virtualization aspects
2010 IEEE International Systems Conference
◽
10.1109/systems.2010.5482328
◽
2010
◽
Cited By ~ 5
Author(s):
Bassam S Farroha
◽
Deborah L Farroha
Keyword(s):
Cyber Security
◽
Security Management
◽
Enterprise Security
◽
Security Components
Download Full-text
E‐enterprise security management life cycle
Information Management & Computer Security
◽
10.1108/09685220510589307
◽
2005
◽
Vol 13
(2)
◽
pp. 121-134
◽
Cited By ~ 7
Author(s):
Stephen C. Shih
◽
H. Joseph Wen
Keyword(s):
Life Cycle
◽
Security Management
◽
Enterprise Security
Download Full-text
Application Analysis of Electronic Information Technology in Enterprise Security Management
10.47939/et.v2i11.150
◽
2021
◽
Keyword(s):
Information Technology
◽
Security Management
◽
Electronic Information
◽
Application Analysis
◽
Enterprise Security
Download Full-text
How Economy and Society affect Enterprise Security Management
ISSE 2008 Securing Electronic Business Processes
◽
10.1007/978-3-8348-9283-6_7
◽
2009
◽
pp. 77-83
Author(s):
Eberhard von Faber
Keyword(s):
Security Management
◽
Enterprise Security
Download Full-text
Investigating Insider Threat Using Enterprise Security Management
Cyber Crime Investigations
◽
10.1016/b978-159749133-4/50013-9
◽
2007
◽
pp. 351-398
Keyword(s):
Security Management
◽
Insider Threat
◽
Enterprise Security
Download Full-text
Enterprise security management in the transportation projects
Journal of Transportation Security
◽
10.1007/s12198-014-0153-3
◽
2014
◽
Vol 8
(1-2)
◽
pp. 33-36
Author(s):
Seyyed Hossein Alavi
Keyword(s):
Security Management
◽
Transportation Projects
◽
Enterprise Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close