Search results

Jump to: navigation, search
  • Cyber threats, emerging risks, systemic concerns, and emergency preparedness Trust, security, and privacy
    8 KB (1,075 words) - 23:52, 14 October 2008
  • * Cyber-physical computing and networking * Security, trust, & privacy
    3 KB (380 words) - 19:34, 17 November 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • - Safety & Security Assurance of Avionic & Medical Cyber-Physical Systems.
    1 KB (187 words) - 21:13, 12 July 2020
  • large-scale application domains such as Healthcare, Cyber-Physical Systems, 3. RTSOAA for Cyber-Physical Systems
    7 KB (922 words) - 00:58, 9 January 2009
  • |Title=Conference on Cyber Warfare |Field=Internet security
    2 KB (219 words) - 17:25, 14 January 2009
  • ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Computer and Network Security Systems
    5 KB (526 words) - 01:02, 2 February 2009
  • Trust, Privacy & Security in Digital Business (TrustBus'09) Security patterns have arrived to a stage where there are a significant
    6 KB (740 words) - 12:58, 18 January 2009
  • | Title = The International Workshop on Cyber Physical and Social Computing ...cal, economic and social revolution have changed the world we are used to. Cyber-Physical Systems (CPS)
    3 KB (446 words) - 13:02, 18 January 2009
  • o Cyber-terrorism and cyber-crime; ...nticipating and responding to attacks that cross international boundaries; cyber crime
    4 KB (557 words) - 16:33, 27 February 2009
  • 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.
    7 KB (897 words) - 17:05, 27 February 2009
  • * Cyber-physical computing/networking * Security, trust, & privacy
    4 KB (559 words) - 17:06, 27 February 2009
  • Special theme: Cyber Engineering and Human Space Computing ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver
    7 KB (941 words) - 17:07, 27 February 2009
  • spontaneously in cyber space and with the cyber physical world, create content in harmony with societal values and economic viability, with enhanced security,
    11 KB (1,440 words) - 17:08, 27 February 2009
  • Information security IT and network security
    2 KB (258 words) - 11:33, 2 August 2009
  • Web Security and Privacy Cyber threats
    4 KB (564 words) - 12:01, 6 November 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    14 KB (1,651 words) - 15:56, 15 February 2017
  • |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability
    6 KB (766 words) - 10:54, 26 April 2010
  • - Internet security - Cyber law
    4 KB (507 words) - 22:37, 18 November 2009
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)