S. Guru Prasada,*, M. K. Badrinarayanana, and V. Ceronmani Sharmilab
| 1. Chaffey, Wood.Business Information Management: Improving Performance Using Information Systems.Essex: Pearson Education Limited, 2005.
2. Olugbode, M., Richards, R. and Biss, T.The Role of Information Technology in Achieving the Organisation's Strategic Development Goals: A Case Study.
3. Yeganegi K., Arbabi Z., andHussein, A.I. The Role of Information Technology in National Security. In
4. Assefa T.Factors Influencing Information Security Compliance: An Institutional Perspective.
5. Kim, D. and Solomon, M.G.
6. Alotaibi, M., Furnell, S. and Clarke, N.Information Security Policies: A Review of Challenges and Influencing Factors. In
7. www.iso.org, accessed April 2022.
8. https://www.wsj.com/articles/travelex-currency-exchange-network-shut-down-by-virus-attack-11577995684, accessed April 2022.
9. https://www.csoonline.com/article/2365062/code-spaces-forced-to-close-its-doors-after-security-incident.html, accessed April 2022.
10. https://www.hipaajournal.com/wood-ranch-medical-announces-permanent-closure-due-to-ransomware-attack, accessed April 2022.
11. https://economictimes.indiatimes.com/industry/banking/ finance/banking/cosmos-banks-server-hacked-rs-94-crore -siphoned-off-in-2-days/articleshow/65399477.cms?from=mdr, accessed April 2022.
12. Siponen, M. and Willison, R.Information Security Management Standards: Problems and Solutions.
13. www.gartner.com, accessed April 2022.
14. https://appwiki.checkpoint.com/appwikisdb/public.htm, accessed April 2022.
15. https://www.fortiguard.com/encyclopedia/applications/, accessed April 2022.
16. https://applipedia.paloaltonetworks.com/, accessed April 2022.
17. www.radware.com, accessed April 2022.
18. www.imperva.com, accessed April 2022.
19. Mishra, S. and Chasalow, L.Information Security Effectiveness: A Research Framework.
|||Ran Zhang, Min Liu, Yifeng Yin, Qikun Zhang, and Zengyu Cai. Prediction Algorithm for Network Security Situation based on BP Neural Network Optimized by SA-SOA [J]. Int J Performability Eng, 2020, 16(8): 1171-1182.|
|||Jie Lin, Minghua Wei. Network Security Situation Prediction based on Combining 3D-CNNs and Bi-GRUs [J]. Int J Performability Eng, 2020, 16(12): 1875-1887.|
|||Banggui Liu and Qingsheng Zeng. Prediction Algorithm of Network Security Level with Time Parameters [J]. Int J Performability Eng, 2019, 15(12): 3332-3340.|
|||Ningbin Zhang. Defensive Strategy Selection based on Attack-Defense Game Model in Network Security [J]. Int J Performability Eng, 2018, 14(11): 2633-2642.|