Search results
Create the page "Cyber security" on this wiki! See also the search results found.
- ...ated, multi-domain system modeling: architectural models, resource models, cyber-physical models, service models, etc. ...ional aspects (such as performance, quality of service, real-time aspects, security, etc.)5 KB (598 words) - 17:05, 24 February 2016
- - Internet security - Cyber law5 KB (595 words) - 05:03, 15 January 2012
- • SASO Principles in Cyber-Security • SASO Principles in Cyber-Physical Systems7 KB (969 words) - 04:02, 17 January 2012
- |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability2 KB (304 words) - 10:54, 5 March 2012
- |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security4 KB (581 words) - 18:48, 24 February 2020
- |Title=19th International Conference on Applied Cryptography and Network Security |Field=computer security870 bytes (109 words) - 19:16, 22 January 2021
- *Cyber Security and Privacy5 KB (663 words) - 11:49, 18 February 2020
- ...gineering || Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Cyber physical systems || Knowledge acquisition and management || Refactoring ||6 KB (738 words) - 11:21, 6 July 2020
- *Security and privacy, cryptographic protocols *Internet of things and cyber-physical systems2 KB (299 words) - 11:51, 8 April 2020
- |Field=terrorism, national security, crime, politics, law |Superevent=secau Security Congress4 KB (575 words) - 05:16, 28 June 2012
- |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability5 KB (575 words) - 10:16, 1 August 2019
- 3. International Journal of Cyber-Security and Digital Forensics (IJCSDF) http://sdiwc.net/security-journal/4 KB (491 words) - 22:39, 28 August 2012
- ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Cyber-physical systems3 KB (375 words) - 15:06, 24 September 2020
- * Information/Cyber Security * Information Security3 KB (408 words) - 11:39, 5 January 2013
- - Internet security - Cyber law4 KB (535 words) - 14:38, 17 January 2013
- - Cyber-identities and privacy ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust5 KB (702 words) - 10:02, 5 March 2013
- |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability2 KB (264 words) - 15:32, 7 January 2021
- *Cyber Security *Security & Cryptography3 KB (308 words) - 17:30, 26 May 2016
- *Information Security and Cryptography *Network and Cyber Security2 KB (227 words) - 11:30, 21 June 2016
- ...istributed platforms, middleware, embedded- and cyber-physical-systems and security infrastructures. *Quality Aspects: Functionality, interoperability, performance, conformance, security, reliability, robustness, etc.3 KB (405 words) - 10:56, 24 April 2016