Search results

Jump to: navigation, search
  • - Evaluation and Assessment - Data Security Issues
    6 KB (780 words) - 20:06, 14 October 2008
  • ...ntify a business need and describe how MT meets those needs, with a candid assessment of its strengths and limitations for that particular usage. Submissions sho b. Security/accreditation
    16 KB (2,200 words) - 20:51, 18 February 2021
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    14 KB (1,651 words) - 15:56, 15 February 2017
  • - Internet security - Cyber law
    4 KB (507 words) - 22:37, 18 November 2009
  • - Internet security - Cyber law
    6 KB (732 words) - 05:52, 5 December 2010
  • - Internet security - Cyber law
    5 KB (595 words) - 05:03, 15 January 2012
  • |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability
    2 KB (304 words) - 10:54, 5 March 2012
  • - Internet security - Cyber law
    4 KB (535 words) - 14:38, 17 January 2013
  • - Cyber-identities and privacy - Innovative Assessment Collaboration and Problem Solving
    5 KB (702 words) - 10:02, 5 March 2013
  • |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...rity assessment, cyber risk management, cyber training technologies, cyber security data analytics
    514 bytes (63 words) - 20:31, 1 June 2016
  • - Internet security - Cyber law
    5 KB (641 words) - 22:32, 29 July 2016
  • complex cyber systems for smart cities requires the use of state-of-the-art - City healthcare service monitoring assessment
    4 KB (565 words) - 09:46, 7 February 2017
  • of man and machine in a cyber world : Smart response to challenges of smart Homeland Security
    3 KB (324 words) - 13:34, 5 December 2017
  • |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security
    4 KB (565 words) - 17:27, 18 February 2021
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security
    5 KB (611 words) - 11:47, 8 August 2017
  • |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service
    5 KB (571 words) - 10:51, 3 September 2017
  • |Title=39th International Conference on Computer Safety, Reliability and Security The 39th International Conference on Computer Safety, Reliability and Security ( SafeComp)
    5 KB (617 words) - 11:54, 19 June 2020
  • |Title=17th International Conference on Trust, Privacy and Security in Digital Business ...lack of trust in electronic procedures and the extent to which information security and user privacy can be ensured.
    5 KB (690 words) - 12:02, 26 March 2020
  • ...rmation processing; Biometric analysis, forensic analysis watermarking and security; Processing signal, image and video collections; Implementation of signal, ...uality assessment; Visual aesthetic; Image quality assessment; Blind noise assessment; Perceptual evaluation; Automatic segmentation; Perceptual video compressio
    10 KB (1,215 words) - 14:46, 19 April 2020
  • |Title=38th International Conference on Computer Safety, Reliability, and Security The 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP)
    3 KB (419 words) - 10:51, 19 June 2020
  • |Title=37th International Conference on Computer Safety, Reliability, and Security The 37th International Conference on Computer Safety, Reliability and Security (SAFECOMP)
    4 KB (475 words) - 10:23, 19 June 2020
  • * Post-processing including quality assessment and validation * Security and intrusion detection
    2 KB (261 words) - 20:06, 20 May 2020
  • ● Post-processing including quality assessment and validation ● Security and intrusion detection
    2 KB (268 words) - 20:28, 20 May 2020
  • * Post-processing including quality assessment and validation * Security and intrusion detection
    2 KB (272 words) - 21:17, 20 May 2020
  • ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control
    17 KB (2,088 words) - 12:49, 14 June 2020
  • |Title=36th International Conference on Computer Safety, Reliability, and Security ...ustrial Computer Systems, Technical Committee 7 on Reliability, Safety and Security (EWICS TC7). Since then, it has contributed to the progress of the state-of
    4 KB (457 words) - 11:48, 17 June 2020
  • |Title=11th Conference on Decision and Game Theory for Security 2020 Conference on Decision and Game Theory for Security
    3 KB (353 words) - 12:35, 23 June 2020
  • |Title=9th Conference on Decision and Game Theory for Security 2018 Conference on Decision and Game Theory for Security
    3 KB (423 words) - 11:27, 23 June 2020
  • |Title=8th Conference on Decision and Game Theory for Security 2017 Conference on Decision and Game Theory for Security
    3 KB (407 words) - 11:20, 23 June 2020
  • ...; Methods and tools for system quality prediction; Reliability prediction; Security prediction; Risk prediction; Performance prediction; Uncertainty handling i ...simulation; Distributed disaster decision simulation; Simulation for rapid assessment of distributed impacts; Parallel and distributed simulation; Model-driven d
    12 KB (1,421 words) - 12:02, 10 July 2020
  • |Title=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies
    15 KB (1,886 words) - 16:16, 25 August 2020
  • * Information Quality Metrics and Assessment * Privacy, security, ethical, and social issues
    9 KB (896 words) - 16:31, 6 August 2020
  • ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control
    17 KB (2,035 words) - 14:45, 18 February 2021
  • ...rmation processing; Biometric analysis, forensic analysis watermarking and security; Processing signal, image and video collections; Implementation of signal, ...uality assessment; Visual aesthetic; Image quality assessment; Blind noise assessment; Perceptual evaluation; Automatic segmentation; Perceptual video compressio
    9 KB (1,125 words) - 10:54, 8 December 2020
  • Computer generated images; Image security, scrambling, and regions of printing systems; Image quality assessment; Image search and sorting,
    19 KB (2,346 words) - 10:51, 9 December 2020
  • |Title=1st Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of T The 1st Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of T
    6 KB (804 words) - 11:42, 28 January 2021
  • ...representation and rendering, display and printing systems; Image quality assessment; Image search and sorting, video indexing and editing; Integration of image ...anagement of QoS in SIP and H-xxx environments; Basic SIP building blocks; Security and firewalls with SIP and H-xxx series; Service creation and telephony ser
    19 KB (2,317 words) - 02:40, 26 November 2021