2017
DOI: 10.1166/asl.2017.7349
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) Model Comparison

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…If a neighbor node message is not received within a certain period of time, it is considered that the node has moved out of its communication range, it is deleted from the neighbor table, and the corresponding record is deleted in the pheromone table. The task of the path search phase is to find the best path between the source node and the destination node, and the task of the data packet forwarding phase is to send the data packet to the destination node according to the best path (Al-Shawabkeh et al, 2017). The survival time of the entire mobile specific network is an important indicator for judging the performance of the network.…”
Section: Self-organized Network Management Schemementioning
confidence: 99%
“…If a neighbor node message is not received within a certain period of time, it is considered that the node has moved out of its communication range, it is deleted from the neighbor table, and the corresponding record is deleted in the pheromone table. The task of the path search phase is to find the best path between the source node and the destination node, and the task of the data packet forwarding phase is to send the data packet to the destination node according to the best path (Al-Shawabkeh et al, 2017). The survival time of the entire mobile specific network is an important indicator for judging the performance of the network.…”
Section: Self-organized Network Management Schemementioning
confidence: 99%