Search results

Jump to: navigation, search
  • ...ated, multi-domain system modeling: architectural models, resource models, cyber-physical models, service models, etc. ...ional aspects (such as performance, quality of service, real-time aspects, security, etc.)
    5 KB (598 words) - 17:05, 24 February 2016
  • - Internet security - Cyber law
    5 KB (595 words) - 05:03, 15 January 2012
  • • SASO Principles in Cyber-Security • SASO Principles in Cyber-Physical Systems
    7 KB (969 words) - 04:02, 17 January 2012
  • |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability
    2 KB (304 words) - 10:54, 5 March 2012
  • |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security
    4 KB (581 words) - 18:48, 24 February 2020
  • |Title=19th International Conference on Applied Cryptography and Network Security |Field=computer security
    870 bytes (109 words) - 19:16, 22 January 2021
  • *Cyber Security and Privacy
    5 KB (663 words) - 11:49, 18 February 2020
  • ...gineering || Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Cyber physical systems || Knowledge acquisition and management || Refactoring ||
    6 KB (738 words) - 11:21, 6 July 2020
  • *Security and privacy, cryptographic protocols *Internet of things and cyber-physical systems
    2 KB (299 words) - 11:51, 8 April 2020
  • |Field=terrorism, national security, crime, politics, law |Superevent=secau Security Congress
    4 KB (575 words) - 05:16, 28 June 2012
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • 3. International Journal of Cyber-Security and Digital Forensics (IJCSDF) http://sdiwc.net/security-journal/
    4 KB (491 words) - 22:39, 28 August 2012
  • ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Cyber-physical systems
    3 KB (375 words) - 15:06, 24 September 2020
  • * Information/Cyber Security * Information Security
    3 KB (408 words) - 11:39, 5 January 2013
  • - Internet security - Cyber law
    4 KB (535 words) - 14:38, 17 January 2013
  • - Cyber-identities and privacy ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust
    5 KB (702 words) - 10:02, 5 March 2013
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • *Cyber Security *Security & Cryptography
    3 KB (308 words) - 17:30, 26 May 2016
  • *Information Security and Cryptography *Network and Cyber Security
    2 KB (227 words) - 11:30, 21 June 2016
  • ...istributed platforms, middleware, embedded- and cyber-physical-systems and security infrastructures. *Quality Aspects: Functionality, interoperability, performance, conformance, security, reliability, robustness, etc.
    3 KB (405 words) - 10:56, 24 April 2016

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)