Search results
Create the page "Cyber security assessment" on this wiki! See also the search results found.
- - Evaluation and Assessment - Data Security Issues6 KB (780 words) - 20:06, 14 October 2008
- ...ntify a business need and describe how MT meets those needs, with a candid assessment of its strengths and limitations for that particular usage. Submissions sho b. Security/accreditation16 KB (2,200 words) - 20:51, 18 February 2021
- RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure14 KB (1,651 words) - 15:56, 15 February 2017
- - Internet security - Cyber law4 KB (507 words) - 22:37, 18 November 2009
- - Internet security - Cyber law6 KB (732 words) - 05:52, 5 December 2010
- - Internet security - Cyber law5 KB (595 words) - 05:03, 15 January 2012
- |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability2 KB (304 words) - 10:54, 5 March 2012
- - Internet security - Cyber law4 KB (535 words) - 14:38, 17 January 2013
- - Cyber-identities and privacy - Innovative Assessment Collaboration and Problem Solving5 KB (702 words) - 10:02, 5 March 2013
- |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...rity assessment, cyber risk management, cyber training technologies, cyber security data analytics514 bytes (63 words) - 20:31, 1 June 2016
- - Internet security - Cyber law5 KB (641 words) - 22:32, 29 July 2016
- complex cyber systems for smart cities requires the use of state-of-the-art - City healthcare service monitoring assessment4 KB (565 words) - 09:46, 7 February 2017
- of man and machine in a cyber world : Smart response to challenges of smart Homeland Security3 KB (324 words) - 13:34, 5 December 2017
- |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security4 KB (565 words) - 17:27, 18 February 2021
- ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security5 KB (611 words) - 11:47, 8 August 2017
- |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service5 KB (571 words) - 10:51, 3 September 2017
- |Title=39th International Conference on Computer Safety, Reliability and Security The 39th International Conference on Computer Safety, Reliability and Security ( SafeComp)5 KB (617 words) - 11:54, 19 June 2020
- |Title=17th International Conference on Trust, Privacy and Security in Digital Business ...lack of trust in electronic procedures and the extent to which information security and user privacy can be ensured.5 KB (690 words) - 12:02, 26 March 2020
- ...rmation processing; Biometric analysis, forensic analysis watermarking and security; Processing signal, image and video collections; Implementation of signal, ...uality assessment; Visual aesthetic; Image quality assessment; Blind noise assessment; Perceptual evaluation; Automatic segmentation; Perceptual video compressio10 KB (1,215 words) - 14:46, 19 April 2020
- |Title=38th International Conference on Computer Safety, Reliability, and Security The 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP)3 KB (419 words) - 10:51, 19 June 2020
- |Title=37th International Conference on Computer Safety, Reliability, and Security The 37th International Conference on Computer Safety, Reliability and Security (SAFECOMP)4 KB (475 words) - 10:23, 19 June 2020
- * Post-processing including quality assessment and validation * Security and intrusion detection2 KB (261 words) - 20:06, 20 May 2020
- ● Post-processing including quality assessment and validation ● Security and intrusion detection2 KB (268 words) - 20:28, 20 May 2020
- * Post-processing including quality assessment and validation * Security and intrusion detection2 KB (272 words) - 21:17, 20 May 2020
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,088 words) - 12:49, 14 June 2020
- |Title=36th International Conference on Computer Safety, Reliability, and Security ...ustrial Computer Systems, Technical Committee 7 on Reliability, Safety and Security (EWICS TC7). Since then, it has contributed to the progress of the state-of4 KB (457 words) - 11:48, 17 June 2020
- |Title=11th Conference on Decision and Game Theory for Security 2020 Conference on Decision and Game Theory for Security3 KB (353 words) - 12:35, 23 June 2020
- |Title=9th Conference on Decision and Game Theory for Security 2018 Conference on Decision and Game Theory for Security3 KB (423 words) - 11:27, 23 June 2020
- |Title=8th Conference on Decision and Game Theory for Security 2017 Conference on Decision and Game Theory for Security3 KB (407 words) - 11:20, 23 June 2020
- ...; Methods and tools for system quality prediction; Reliability prediction; Security prediction; Risk prediction; Performance prediction; Uncertainty handling i ...simulation; Distributed disaster decision simulation; Simulation for rapid assessment of distributed impacts; Parallel and distributed simulation; Model-driven d12 KB (1,421 words) - 12:02, 10 July 2020
- |Title=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies15 KB (1,886 words) - 16:16, 25 August 2020
- * Information Quality Metrics and Assessment * Privacy, security, ethical, and social issues9 KB (896 words) - 16:31, 6 August 2020
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,035 words) - 14:45, 18 February 2021
- ...rmation processing; Biometric analysis, forensic analysis watermarking and security; Processing signal, image and video collections; Implementation of signal, ...uality assessment; Visual aesthetic; Image quality assessment; Blind noise assessment; Perceptual evaluation; Automatic segmentation; Perceptual video compressio9 KB (1,125 words) - 10:54, 8 December 2020
- Computer generated images; Image security, scrambling, and regions of printing systems; Image quality assessment; Image search and sorting,19 KB (2,346 words) - 10:51, 9 December 2020
- |Title=1st Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of T The 1st Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of T6 KB (804 words) - 11:42, 28 January 2021
- ...representation and rendering, display and printing systems; Image quality assessment; Image search and sorting, video indexing and editing; Integration of image ...anagement of QoS in SIP and H-xxx environments; Basic SIP building blocks; Security and firewalls with SIP and H-xxx series; Service creation and telephony ser19 KB (2,317 words) - 02:40, 26 November 2021