Search results

Jump to navigation Jump to search
Results 1 – 21 of 37
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...rity assessment, cyber risk management, cyber training technologies, cyber security data analytics ...
    514 bytes (63 words) - 18:31, 1 June 2016
  • |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability ...
    2 KB (304 words) - 08:54, 5 March 2012
  • |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service ...
    5 KB (571 words) - 08:51, 3 September 2017
  • |Title=11th Conference on Decision and Game Theory for Security 2020 Conference on Decision and Game Theory for Security ...
    3 KB (353 words) - 10:35, 23 June 2020
  • |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security ...
    4 KB (565 words) - 15:27, 18 February 2021
  • |Title=38th International Conference on Computer Safety, Reliability, and Security The 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP) ...
    3 KB (419 words) - 08:51, 19 June 2020
  • |Title=8th Conference on Decision and Game Theory for Security 2017 Conference on Decision and Game Theory for Security ...
    3 KB (407 words) - 09:20, 23 June 2020
  • |Title=9th Conference on Decision and Game Theory for Security 2018 Conference on Decision and Game Theory for Security ...
    3 KB (423 words) - 09:27, 23 June 2020
  • |Title=36th International Conference on Computer Safety, Reliability, and Security ...ustrial Computer Systems, Technical Committee 7 on Reliability, Safety and Security (EWICS TC7). Since then, it has contributed to the progress of the state-of ...
    4 KB (457 words) - 09:48, 17 June 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure ...
    14 KB (1,651 words) - 13:56, 15 February 2017
  • |Title=37th International Conference on Computer Safety, Reliability, and Security The 37th International Conference on Computer Safety, Reliability and Security (SAFECOMP) ...
    4 KB (475 words) - 08:23, 19 June 2020
  • * Post-processing including quality assessment and validation * Security and intrusion detection ...
    2 KB (272 words) - 19:17, 20 May 2020
  • * Post-processing including quality assessment and validation * Security and intrusion detection ...
    2 KB (261 words) - 18:06, 20 May 2020
  • ● Post-processing including quality assessment and validation ● Security and intrusion detection ...
    2 KB (268 words) - 18:28, 20 May 2020
  • ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control ...
    17 KB (2,035 words) - 12:45, 18 February 2021
  • ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control ...
    17 KB (2,088 words) - 10:49, 14 June 2020
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security ...
    5 KB (611 words) - 09:47, 8 August 2017
  • |Title=39th International Conference on Computer Safety, Reliability and Security The 39th International Conference on Computer Safety, Reliability and Security ( SafeComp) ...
    5 KB (617 words) - 09:54, 19 June 2020
  • of man and machine in a cyber world : Smart response to challenges of smart Homeland Security ...
    3 KB (324 words) - 11:34, 5 December 2017
  • |Title=17th International Conference on Trust, Privacy and Security in Digital Business ...lack of trust in electronic procedures and the extent to which information security and user privacy can be ensured. ...
    5 KB (690 words) - 10:02, 26 March 2020
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)