Search results
Create the page "Cyber security" on this wiki! See also the search results found.
Page title matches
- 26 bytes (2 words) - 11:46, 8 August 2017
- 23 bytes (2 words) - 11:54, 8 August 2017
Page text matches
- * Security issues of data management in wireless networks MEXT grant-in-aid for Priority area Research called Cyber5 KB (611 words) - 15:43, 16 September 2008
- ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are18 KB (2,408 words) - 02:37, 16 December 2008
- * Security, Privacy and Trust * WWW, Semantic Web and Cyber World34 KB (4,565 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust * WWW, Semantic Web and Cyber World8 KB (1,037 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust * WWW, Semantic Web and Cyber World9 KB (1,189 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust * WWW, Semantic Web and Cyber World26 KB (3,456 words) - 22:20, 10 January 2018
- IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009)3 KB (376 words) - 17:47, 14 October 2008
- .Cyber-Physical Systems .Network Protocol and Security3 KB (375 words) - 17:48, 14 October 2008
- ...structure and theory, as well as two additional areas of special emphasis: cyber-physical systems and embedded applications, benchmarks and tools. ...cations o real-time resource management and scheduling o embedded system security o programming languages and software engineering for real-time or8 KB (939 words) - 17:48, 14 October 2008
- - Building Smart Worlds in Real and Cyber Spaces - * Real/Cyber World Modeling and Semantics7 KB (942 words) - 20:05, 14 October 2008
- • Cyber Law • Ethical, Social, Privacy, Security and moral Issues in an e-societ5 KB (530 words) - 10:27, 24 June 2011
- - Data Security Issues - IS Security Issues6 KB (780 words) - 20:06, 14 October 2008
- * Cyber Crimes * Security Technologies2 KB (193 words) - 20:06, 14 October 2008
- | Title = IEEE Symposium on Computational Intelligence in Cyber Security585 bytes (66 words) - 23:03, 14 October 2008
- b. Security/accreditation c. Cyber Security16 KB (2,200 words) - 20:51, 18 February 2021
- Cyber Security3 KB (427 words) - 17:01, 29 May 2016
- | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability5 KB (673 words) - 23:19, 14 October 2008
- embedded and cyber physical systems design: o Language features to enhance reliability and security5 KB (673 words) - 23:30, 14 October 2008
- ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.5 KB (580 words) - 10:32, 12 May 2020
- * Formal methods for cyber-physical systems * Formal models and methods for security2 KB (291 words) - 11:09, 20 November 2020
- Cyber threats, emerging risks, systemic concerns, and emergency preparedness Trust, security, and privacy8 KB (1,075 words) - 23:52, 14 October 2008
- * Cyber-physical computing and networking * Security, trust, & privacy3 KB (380 words) - 19:34, 17 November 2008
- |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols13 KB (1,617 words) - 19:03, 24 November 2008
- - Safety & Security Assurance of Avionic & Medical Cyber-Physical Systems.1 KB (187 words) - 21:13, 12 July 2020
- large-scale application domains such as Healthcare, Cyber-Physical Systems, 3. RTSOAA for Cyber-Physical Systems7 KB (922 words) - 00:58, 9 January 2009
- |Title=Conference on Cyber Warfare |Field=Internet security2 KB (219 words) - 17:25, 14 January 2009
- ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Computer and Network Security Systems5 KB (526 words) - 01:02, 2 February 2009
- Trust, Privacy & Security in Digital Business (TrustBus'09) Security patterns have arrived to a stage where there are a significant6 KB (740 words) - 12:58, 18 January 2009
- | Title = The International Workshop on Cyber Physical and Social Computing ...cal, economic and social revolution have changed the world we are used to. Cyber-Physical Systems (CPS)3 KB (446 words) - 13:02, 18 January 2009
- o Cyber-terrorism and cyber-crime; ...nticipating and responding to attacks that cross international boundaries; cyber crime4 KB (557 words) - 16:33, 27 February 2009
- 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.7 KB (897 words) - 17:05, 27 February 2009
- * Cyber-physical computing/networking * Security, trust, & privacy4 KB (559 words) - 17:06, 27 February 2009
- Special theme: Cyber Engineering and Human Space Computing ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver7 KB (941 words) - 17:07, 27 February 2009
- spontaneously in cyber space and with the cyber physical world, create content in harmony with societal values and economic viability, with enhanced security,11 KB (1,440 words) - 17:08, 27 February 2009
- Information security IT and network security2 KB (258 words) - 11:33, 2 August 2009
- Web Security and Privacy Cyber threats4 KB (564 words) - 12:01, 6 November 2020
- RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure14 KB (1,651 words) - 15:56, 15 February 2017
- |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability6 KB (766 words) - 10:54, 26 April 2010
- - Internet security - Cyber law4 KB (507 words) - 22:37, 18 November 2009
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (429 words) - 08:55, 1 August 2019
- |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability9 KB (1,092 words) - 09:35, 1 August 2019
- |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy4 KB (490 words) - 14:42, 6 November 2020
- ...of research in networked embedded sensing systems. The currently emerging cyber-physical systems community emphasizes the integration of actuation and cont * Security and Privacy8 KB (1,066 words) - 19:39, 8 July 2010
- * Cyber-physical systems and Internet of Things (IoT) * Privacy, security, trust, and safety management3 KB (395 words) - 15:14, 24 September 2020
- - Internet security - Cyber law6 KB (732 words) - 05:52, 5 December 2010
- * Cyber-Physical & Cooperative Systems Cyber-Physical & Cooperative Systems12 KB (1,378 words) - 21:13, 28 November 2010
- ...cannot afford, as a country, to be left behind. It events such as a cyber security challenge bring otherwise hidden talents forward, then that's a good thing.326 bytes (55 words) - 01:08, 26 June 2012
- ...and practical implementation for low-power/energy, high dependability and security, etc.. The SAAES special session addresses these important and challenging ...elf-aware and Adaptive Operations for Energy Efficiency, Dependability and Security4 KB (598 words) - 18:55, 23 December 2010
- ...and practical implementation for low-power/energy, high dependability and security, etc.. The SAAES special session addresses these important and challenging ...elf-aware and Adaptive Operations for Energy Efficiency, Dependability and Security4 KB (593 words) - 17:49, 7 January 2011
- ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev3 KB (462 words) - 11:51, 22 March 2020