Search results

Jump to: navigation, search
  • * Brain data collection, pre-processing, management, and analysis methodologies; * Cyber-individuals and individual differences;
    6 KB (692 words) - 23:59, 30 May 2016
  • Conflict and Collaboration in Compliance, Governance and Risk ...-presence raise issues of privacy, management, compliance, governance, and risk.
    4 KB (557 words) - 16:33, 27 February 2009
  • Special theme: Cyber Engineering and Human Space Computing ...sses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, convergence technologies, web services and
    7 KB (941 words) - 17:07, 27 February 2009
  • ...urity management in real-time systems; Metrics and techniques for security risk assessment; Internet monitoring and response security service; Protecting e ...methodologies and ID Cards; Security on hardware and smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anon
    14 KB (1,651 words) - 15:56, 15 February 2017
  • *Intelligent data management - Knowledge Management
    4 KB (507 words) - 22:37, 18 November 2009
  • ...h collaboration and awareness of current development in secure information management in the digital society. *Intelligent data management
    6 KB (732 words) - 05:52, 5 December 2010
  • Cyber Terrorism Risk and Incident Management
    3 KB (462 words) - 11:51, 22 March 2020
  • ...siness, e-Science, Green Computing, Secured Technologies, Intelligent Data Management ...h collaboration and awareness of current development in secure information management in the digital society. ''
    5 KB (595 words) - 05:03, 15 January 2012
  • |Title=3rd International Cyber Resilience Conference ...to explore the issues, problems and possible solutions to the APT posed by cyber attacks.
    2 KB (304 words) - 10:54, 5 March 2012
  • *Intelligent data management - Knowledge Management
    4 KB (535 words) - 14:38, 17 January 2013
  • |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...r security assessment, cyber risk management, cyber training technologies, cyber security data analytics
    514 bytes (63 words) - 20:31, 1 June 2016
  • ...ch collaboration and awareness of current evelopment in secure information management in the digital society. *Intelligent data management
    5 KB (641 words) - 22:32, 29 July 2016
  • *change management *governance, risk, and compliance modelling
    10 KB (1,309 words) - 10:29, 5 June 2019
  • 6. Cyber Security 1. Strategic and Change Management
    4 KB (507 words) - 09:52, 3 September 2017
  • in security and cryptography technologies and management systems for preventing an integrated security management system that protects critical
    5 KB (611 words) - 11:47, 8 August 2017
  • implementation, and operation of industrial cyber security technologies. Solutions for Automation of ICS Security Management
    5 KB (571 words) - 10:51, 3 September 2017
  • *An Inventory-based Mobile Application for Warehouse Management to Digitize Very Small Enterprises *Enhancing Supply Chain Risk Management by Applying Machine Learning to Identify Risks
    7 KB (917 words) - 18:07, 17 March 2020
  • Cyber computing Decision making and risk management
    4 KB (401 words) - 07:52, 29 July 2020
  • * Cyber-physical system security * Key management
    11 KB (1,549 words) - 11:34, 17 April 2020
  • ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control
    17 KB (2,088 words) - 12:49, 14 June 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)