//-->
Semantic mapping for access control model
Zhao, Yi, (2011)
Influence of awareness and training on cyber security
McCrohan, Kevin F., (2010)
Managing information access in data-rich enterprises with escalation and incentives
Zhao, Xia, (2010)
Architectural design for resilience
Liu, Dong, (2010)
Analytics-as-a-service framework for terms association mining in unstructured data
Lomotey, Richard K., (2014)
RSenter : terms mining tool from unstructured data sources
Lomotey, Richard K., (2013)