Search results
Create the page "Cyber security assessment" on this wiki! See also the search results found.
- |Title=37th International Conference on Computer Safety, Reliability, and Security The 37th International Conference on Computer Safety, Reliability and Security (SAFECOMP)4 KB (475 words) - 10:23, 19 June 2020
- * Post-processing including quality assessment and validation * Security and intrusion detection2 KB (261 words) - 20:06, 20 May 2020
- ● Post-processing including quality assessment and validation ● Security and intrusion detection2 KB (268 words) - 20:28, 20 May 2020
- * Post-processing including quality assessment and validation * Security and intrusion detection2 KB (272 words) - 21:17, 20 May 2020
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,088 words) - 12:49, 14 June 2020
- |Title=36th International Conference on Computer Safety, Reliability, and Security ...ustrial Computer Systems, Technical Committee 7 on Reliability, Safety and Security (EWICS TC7). Since then, it has contributed to the progress of the state-of4 KB (457 words) - 11:48, 17 June 2020
- |Title=11th Conference on Decision and Game Theory for Security 2020 Conference on Decision and Game Theory for Security3 KB (353 words) - 12:35, 23 June 2020
- |Title=9th Conference on Decision and Game Theory for Security 2018 Conference on Decision and Game Theory for Security3 KB (423 words) - 11:27, 23 June 2020
- |Title=8th Conference on Decision and Game Theory for Security 2017 Conference on Decision and Game Theory for Security3 KB (407 words) - 11:20, 23 June 2020
- ...; Methods and tools for system quality prediction; Reliability prediction; Security prediction; Risk prediction; Performance prediction; Uncertainty handling i ...simulation; Distributed disaster decision simulation; Simulation for rapid assessment of distributed impacts; Parallel and distributed simulation; Model-driven d12 KB (1,421 words) - 12:02, 10 July 2020
- |Title=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies15 KB (1,886 words) - 16:16, 25 August 2020
- * Information Quality Metrics and Assessment * Privacy, security, ethical, and social issues9 KB (896 words) - 16:31, 6 August 2020
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,035 words) - 14:45, 18 February 2021
- ...rmation processing; Biometric analysis, forensic analysis watermarking and security; Processing signal, image and video collections; Implementation of signal, ...uality assessment; Visual aesthetic; Image quality assessment; Blind noise assessment; Perceptual evaluation; Automatic segmentation; Perceptual video compressio9 KB (1,125 words) - 10:54, 8 December 2020
- Computer generated images; Image security, scrambling, and regions of printing systems; Image quality assessment; Image search and sorting,19 KB (2,346 words) - 10:51, 9 December 2020
- |Title=1st Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of T The 1st Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of T6 KB (804 words) - 11:42, 28 January 2021
- ...representation and rendering, display and printing systems; Image quality assessment; Image search and sorting, video indexing and editing; Integration of image ...anagement of QoS in SIP and H-xxx environments; Basic SIP building blocks; Security and firewalls with SIP and H-xxx series; Service creation and telephony ser19 KB (2,317 words) - 02:40, 26 November 2021