Search results
Jump to navigation
Jump to search
- |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...r security assessment, cyber risk management, cyber training technologies, cyber security data analytics569 bytes (68 words) - 19:09, 1 April 2022
- |Title=3rd International Cyber Resilience Conference ...to explore the issues, problems and possible solutions to the APT posed by cyber attacks.2 KB (308 words) - 19:06, 1 April 2022
- * Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical * Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems2 KB (224 words) - 20:22, 1 April 2022
- Conflict and Collaboration in Compliance, Governance and Risk ...-presence raise issues of privacy, management, compliance, governance, and risk.4 KB (560 words) - 20:50, 1 April 2022
- implementation, and operation of industrial cyber security technologies. Solutions for Automation of ICS Security Management5 KB (578 words) - 19:36, 1 April 2022
- ...urity management in real-time systems; Metrics and techniques for security risk assessment; Internet monitoring and response security service; Protecting e ...methodologies and ID Cards; Security on hardware and smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anon14 KB (1,655 words) - 19:31, 1 April 2022
- * Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical * Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems3 KB (401 words) - 20:22, 1 April 2022
- * Risk assessment and risk management * Security investment and cyber insurance3 KB (414 words) - 20:01, 1 April 2022
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,039 words) - 20:11, 1 April 2022
- * Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical * Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems3 KB (430 words) - 20:01, 1 April 2022
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,092 words) - 19:57, 1 April 2022
- ...(electromagnetic waves, unsafe facilities, undocumented logistics, etc.); Cyber-security and public services risks (thefts, health, alarms, vehicular, surv ...and pseudo-anonymity; Mitigating threats; Privilege control and isolation; Cyber-attacks and human factors; IoT and big data security issues; Privacy and pr15 KB (1,890 words) - 20:05, 1 April 2022
- Special theme: Cyber Engineering and Human Space Computing ...sses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, convergence technologies, web services and7 KB (944 words) - 20:47, 1 April 2022
- 6. Cyber Security 1. Strategic and Change Management4 KB (514 words) - 19:34, 1 April 2022
- ...siness, e-Science, Green Computing, Secured Technologies, Intelligent Data Management ...h collaboration and awareness of current development in secure information management in the digital society. ''5 KB (600 words) - 19:05, 1 April 2022
- in security and cryptography technologies and management systems for preventing an integrated security management system that protects critical5 KB (617 words) - 19:33, 1 April 2022
- Knowledge, Data and Information Management Safety, Reliability, Resilience, Risk5 KB (647 words) - 20:07, 1 April 2022
- *Intelligent data management - Knowledge Management4 KB (512 words) - 19:03, 1 April 2022
- Cyber computing Decision making and risk management4 KB (407 words) - 20:01, 1 April 2022
- Cyber Terrorism Risk and Incident Management3 KB (466 words) - 19:55, 1 April 2022