Search results

Jump to: navigation, search

Page title matches

Page text matches

  • * Security issues of data management in wireless networks MEXT grant-in-aid for Priority area Research called Cyber
    5 KB (611 words) - 15:43, 16 September 2008
  • ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are
    18 KB (2,408 words) - 02:37, 16 December 2008
  • * Security, Privacy and Trust * WWW, Semantic Web and Cyber World
    34 KB (4,565 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust * WWW, Semantic Web and Cyber World
    8 KB (1,037 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust * WWW, Semantic Web and Cyber World
    9 KB (1,189 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust * WWW, Semantic Web and Cyber World
    26 KB (3,456 words) - 22:20, 10 January 2018
  • IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009)
    3 KB (376 words) - 17:47, 14 October 2008
  • .Cyber-Physical Systems .Network Protocol and Security
    3 KB (375 words) - 17:48, 14 October 2008
  • ...structure and theory, as well as two additional areas of special emphasis: cyber-physical systems and embedded applications, benchmarks and tools. ...cations o real-time resource management and scheduling o embedded system security o programming languages and software engineering for real-time or
    8 KB (939 words) - 17:48, 14 October 2008
  • - Building Smart Worlds in Real and Cyber Spaces - * Real/Cyber World Modeling and Semantics
    7 KB (942 words) - 20:05, 14 October 2008
  • Cyber Law • Ethical, Social, Privacy, Security and moral Issues in an e-societ
    5 KB (530 words) - 10:27, 24 June 2011
  • - Data Security Issues - IS Security Issues
    6 KB (780 words) - 20:06, 14 October 2008
  • * Cyber Crimes * Security Technologies
    2 KB (193 words) - 20:06, 14 October 2008
  • | Title = IEEE Symposium on Computational Intelligence in Cyber Security
    585 bytes (66 words) - 23:03, 14 October 2008
  • b. Security/accreditation c. Cyber Security
    16 KB (2,200 words) - 20:51, 18 February 2021
  • Cyber Security
    3 KB (427 words) - 17:01, 29 May 2016
  • | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability
    5 KB (673 words) - 23:19, 14 October 2008
  • embedded and cyber physical systems design: o Language features to enhance reliability and security
    5 KB (673 words) - 23:30, 14 October 2008
  • ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.
    5 KB (580 words) - 10:32, 12 May 2020
  • * Formal methods for cyber-physical systems * Formal models and methods for security
    2 KB (291 words) - 11:09, 20 November 2020
  • Cyber threats, emerging risks, systemic concerns, and emergency preparedness Trust, security, and privacy
    8 KB (1,075 words) - 23:52, 14 October 2008
  • * Cyber-physical computing and networking * Security, trust, & privacy
    3 KB (380 words) - 19:34, 17 November 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • - Safety & Security Assurance of Avionic & Medical Cyber-Physical Systems.
    1 KB (187 words) - 21:13, 12 July 2020
  • large-scale application domains such as Healthcare, Cyber-Physical Systems, 3. RTSOAA for Cyber-Physical Systems
    7 KB (922 words) - 00:58, 9 January 2009
  • |Title=Conference on Cyber Warfare |Field=Internet security
    2 KB (219 words) - 17:25, 14 January 2009
  • ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Computer and Network Security Systems
    5 KB (526 words) - 01:02, 2 February 2009
  • Trust, Privacy & Security in Digital Business (TrustBus'09) Security patterns have arrived to a stage where there are a significant
    6 KB (740 words) - 12:58, 18 January 2009
  • | Title = The International Workshop on Cyber Physical and Social Computing ...cal, economic and social revolution have changed the world we are used to. Cyber-Physical Systems (CPS)
    3 KB (446 words) - 13:02, 18 January 2009
  • o Cyber-terrorism and cyber-crime; ...nticipating and responding to attacks that cross international boundaries; cyber crime
    4 KB (557 words) - 16:33, 27 February 2009
  • 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.
    7 KB (897 words) - 17:05, 27 February 2009
  • * Cyber-physical computing/networking * Security, trust, & privacy
    4 KB (559 words) - 17:06, 27 February 2009
  • Special theme: Cyber Engineering and Human Space Computing ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver
    7 KB (941 words) - 17:07, 27 February 2009
  • spontaneously in cyber space and with the cyber physical world, create content in harmony with societal values and economic viability, with enhanced security,
    11 KB (1,440 words) - 17:08, 27 February 2009
  • Information security IT and network security
    2 KB (258 words) - 11:33, 2 August 2009
  • Web Security and Privacy Cyber threats
    4 KB (564 words) - 12:01, 6 November 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    14 KB (1,651 words) - 15:56, 15 February 2017
  • |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability
    6 KB (766 words) - 10:54, 26 April 2010
  • - Internet security - Cyber law
    4 KB (507 words) - 22:37, 18 November 2009
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • ...of research in networked embedded sensing systems. The currently emerging cyber-physical systems community emphasizes the integration of actuation and cont * Security and Privacy
    8 KB (1,066 words) - 19:39, 8 July 2010
  • * Cyber-physical systems and Internet of Things (IoT) * Privacy, security, trust, and safety management
    3 KB (395 words) - 15:14, 24 September 2020
  • - Internet security - Cyber law
    6 KB (732 words) - 05:52, 5 December 2010
  • * Cyber-Physical & Cooperative Systems Cyber-Physical & Cooperative Systems
    12 KB (1,378 words) - 21:13, 28 November 2010
  • ...cannot afford, as a country, to be left behind. It events such as a cyber security challenge bring otherwise hidden talents forward, then that's a good thing.
    326 bytes (55 words) - 01:08, 26 June 2012
  • ...and practical implementation for low-power/energy, high dependability and security, etc.. The SAAES special session addresses these important and challenging ...elf-aware and Adaptive Operations for Energy Efficiency, Dependability and Security
    4 KB (598 words) - 18:55, 23 December 2010
  • ...and practical implementation for low-power/energy, high dependability and security, etc.. The SAAES special session addresses these important and challenging ...elf-aware and Adaptive Operations for Energy Efficiency, Dependability and Security
    4 KB (593 words) - 17:49, 7 January 2011
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev
    3 KB (462 words) - 11:51, 22 March 2020

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)