|Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics
...r security assessment, cyber risk management, cyber training technologies, cyber security data analytics
...
514 bytes (63 words) - 18:31, 1 June 2016
|Title=3rd International Cyber Resilience Conference
...to explore the issues, problems and possible solutions to the APT posed by cyber attacks.
...
2 KB (304 words) - 08:54, 5 March 2012
Conflict and Collaboration in Compliance, Governance and Risk
...-presence raise issues of privacy, management, compliance, governance, and risk.
...
4 KB (557 words) - 14:33, 27 February 2009
implementation, and operation of industrial cyber security technologies.
Solutions for Automation of ICS Security Management
...
5 KB (571 words) - 08:51, 3 September 2017
...urity management in real-time systems; Metrics and techniques for security risk assessment; Internet monitoring and response security service; Protecting e
...methodologies and ID Cards; Security on hardware and smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anon
...
14 KB (1,651 words) - 13:56, 15 February 2017
* Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical
* Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems
...
3 KB (353 words) - 10:35, 23 June 2020
* Risk assessment and risk management
* Security investment and cyber insurance
...
3 KB (407 words) - 09:20, 23 June 2020
...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces;
...-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control
...
17 KB (2,035 words) - 12:45, 18 February 2021
* Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical
* Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems
...
3 KB (423 words) - 09:27, 23 June 2020
Special theme: Cyber Engineering and Human Space Computing
...sses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, convergence technologies, web services and
...
7 KB (941 words) - 15:07, 27 February 2009
...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces;
...-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control
...
17 KB (2,088 words) - 10:49, 14 June 2020
|Title=2026 8th International Conference on Management Science and Industrial Engineering (MSIE 2026)
2026 8th International Conference on Management Science and Industrial Engineering (MSIE 2026) will be held in Krabi, Thail
...
5 KB (659 words) - 12:07, 7 August 2025
...(electromagnetic waves, unsafe facilities, undocumented logistics, etc.); Cyber-security and public services risks (thefts, health, alarms, vehicular, surv
...and pseudo-anonymity; Mitigating threats; Privilege control and isolation; Cyber-attacks and human factors; IoT and big data security issues; Privacy and pr
...
15 KB (1,886 words) - 14:16, 25 August 2020
...siness, e-Science, Green Computing, Secured Technologies, Intelligent Data Management
...h collaboration and awareness of current development in secure information management in the digital society. ''
...
5 KB (595 words) - 03:03, 15 January 2012
*Intelligent data management
- Knowledge Management
...
4 KB (507 words) - 20:37, 18 November 2009
6. Cyber Security
1. Strategic and Change Management
...
4 KB (507 words) - 07:52, 3 September 2017
*Intelligent data management
- Knowledge Management
...
4 KB (535 words) - 12:38, 17 January 2013
in security and cryptography technologies and management systems for preventing
an integrated security management system that protects critical
...
5 KB (611 words) - 09:47, 8 August 2017
Knowledge, Data and Information Management
Safety, Reliability, Resilience, Risk
...
5 KB (640 words) - 19:39, 17 December 2020
...h collaboration and awareness of current development in secure information management in the digital society.
*Intelligent data management
...
6 KB (732 words) - 03:52, 5 December 2010