Notice of Violation of IEEE Publication Principles: Which models should be applied to measure computer security and information assurance? | IEEE Conference Publication | IEEE Xplore