您当前的位置:
首页 >
文章列表页 >
Study of flow-based business security risk assessment methods
更新时间:2026-04-20
    • Study of flow-based business security risk assessment methods

    • Vol. 26, Issue 12, Pages: 15-18(2013)
    • DOI:10.13992/j.cnki.tetas.2013.12.018    

      CLC: TP309
    • Published:2013

    移动端阅览

  • 徐引进, 张彤, 陈文佳. Study of flow-based business security risk assessment methods[J]. 2013, 26(12): 15-18. DOI: 10.13992/j.cnki.tetas.2013.12.018.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

67

下载量

1

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Research on business security evaluation technology

Related Author

冀文

Related Institution

中国移动通信有限公司研究院
0