Search results
Jump to navigation
Jump to search
- |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...r security assessment, cyber risk management, cyber training technologies, cyber security data analytics569 bytes (68 words) - 19:09, 1 April 2022
- * - Simulated for Training and Education * - Simulation for Cybersecurity and Cyber-Physical Systems5 KB (647 words) - 20:00, 1 April 2022
- - Data and Metadata Communications Technologies ACSET Stream 2: Technology and Society: Technologies, Societies and Communities5 KB (704 words) - 19:07, 1 April 2022
- complex cyber systems for smart cities requires the use of state-of-the-art technologies and solutions in smart sensing/devices/materials, IoT, networking,4 KB (570 words) - 19:31, 1 April 2022
- ...onic devices in crimes that directly involve, or are facilitated by, these technologies. The aim of digital forensics is to produce outputs that can help investiga Cyber Terrorism3 KB (466 words) - 19:55, 1 April 2022
- * Industrial and Manufacturing System Technologies * Adoption, acceptance, and diffusion of emerging technologies9 KB (903 words) - 20:01, 1 April 2022
- ...alysis; Personalized sentiment classification; Mobile devices and Internet technologies; Mobile IPv6 over Software Defined Network (SDN); Generative Mappings; Inte ...rning models; Prediction uncertainty (approximation learning, similarity); Training of models (hyperparameter optimization, regularization, optimizers); Active15 KB (1,925 words) - 20:08, 1 April 2022
- ...ering discussion between researchers, developers, and users of translation technologies in government and industry. a showcase of current and future translation technologies and products;16 KB (2,206 words) - 20:32, 1 April 2022