Search results
Create the page "Cyber security" on this wiki! See also the search results found.
- Cyber threats, emerging risks, systemic concerns, and emergency preparedness Trust, security, and privacy8 KB (1,075 words) - 23:52, 14 October 2008
- * Cyber-physical computing and networking * Security, trust, & privacy3 KB (380 words) - 19:34, 17 November 2008
- |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols13 KB (1,617 words) - 19:03, 24 November 2008
- - Safety & Security Assurance of Avionic & Medical Cyber-Physical Systems.1 KB (187 words) - 21:13, 12 July 2020
- large-scale application domains such as Healthcare, Cyber-Physical Systems, 3. RTSOAA for Cyber-Physical Systems7 KB (922 words) - 00:58, 9 January 2009
- |Title=Conference on Cyber Warfare |Field=Internet security2 KB (219 words) - 17:25, 14 January 2009
- ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Computer and Network Security Systems5 KB (526 words) - 01:02, 2 February 2009
- Trust, Privacy & Security in Digital Business (TrustBus'09) Security patterns have arrived to a stage where there are a significant6 KB (740 words) - 12:58, 18 January 2009
- | Title = The International Workshop on Cyber Physical and Social Computing ...cal, economic and social revolution have changed the world we are used to. Cyber-Physical Systems (CPS)3 KB (446 words) - 13:02, 18 January 2009
- o Cyber-terrorism and cyber-crime; ...nticipating and responding to attacks that cross international boundaries; cyber crime4 KB (557 words) - 16:33, 27 February 2009
- 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.7 KB (897 words) - 17:05, 27 February 2009
- * Cyber-physical computing/networking * Security, trust, & privacy4 KB (559 words) - 17:06, 27 February 2009
- Special theme: Cyber Engineering and Human Space Computing ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver7 KB (941 words) - 17:07, 27 February 2009
- spontaneously in cyber space and with the cyber physical world, create content in harmony with societal values and economic viability, with enhanced security,11 KB (1,440 words) - 17:08, 27 February 2009
- Information security IT and network security2 KB (258 words) - 11:33, 2 August 2009
- Web Security and Privacy Cyber threats4 KB (564 words) - 12:01, 6 November 2020
- RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure14 KB (1,651 words) - 15:56, 15 February 2017
- |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability6 KB (766 words) - 10:54, 26 April 2010
- - Internet security - Cyber law4 KB (507 words) - 22:37, 18 November 2009
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (429 words) - 08:55, 1 August 2019