Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • |Title=CyberSec 2017 : The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic |Field=security, cyber security, cyber welfare, digital forensic
    517 bytes (49 words) - 19:16, 1 April 2022
  • ...cannot afford, as a country, to be left behind. It events such as a cyber security challenge bring otherwise hidden talents forward, then that's a good thing.
    326 bytes (55 words) - 01:08, 26 June 2012
  • |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...rity assessment, cyber risk management, cyber training technologies, cyber security data analytics
    569 bytes (68 words) - 19:09, 1 April 2022
  • |Title=MLSCPS 2016 : 2016 IEEE Workshop on Machine Learning in Security of Cyber-Physical Systems (MLSCPS) |Field=machine learning, cyber security, cyber-physical system, IEEE
    524 bytes (64 words) - 19:14, 1 April 2022
  • ...IEICE Transactions Special Section on Information and Communication System Security (August 2017) |Field=security, informatioin security, network security, cyber security
    481 bytes (56 words) - 19:31, 1 April 2022
  • |Acronym=JIP SI: Computer Security Technologies 2017 ..., Special issue of “Computer Security Technologies against Sophisticated Cyber Attacks”
    513 bytes (62 words) - 14:44, 6 November 2020
  • |Title=CCOE - CFP 2016 : Cyber Center of Excellence (CCOE) Call For Research Papers |Field=cyber security, computer science, electronic warfare, quantum computing
    538 bytes (68 words) - 20:10, 1 April 2022
  • |Title=Conference on the Decision and Game Theory for Security ...eneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-re
    516 bytes (62 words) - 22:38, 7 April 2022
  • |Title=PiSecon 2017 : 3rd Pirate Security Conference |Field=security, cyber, GOVERNANCE, defense
    422 bytes (49 words) - 19:14, 1 April 2022
  • |Title=Conference on Cyber Warfare |Field=Internet security
    2 KB (221 words) - 19:01, 1 April 2022
  • |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability
    2 KB (308 words) - 19:06, 1 April 2022
  • |Title=Conference on Decision and Game Theory for Security * Game theory, control, and mechanism design for security and privacy
    2 KB (224 words) - 20:22, 1 April 2022
  • |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions
    2 KB (202 words) - 19:54, 1 April 2022
  • | Title = The International Workshop on Cyber Physical and Social Computing ...cal, economic and social revolution have changed the world we are used to. Cyber-Physical Systems (CPS)
    3 KB (449 words) - 20:36, 1 April 2022
  • |Field=computer security |Title =19th International Conference on Applied Cryptography and Network Security
    997 bytes (124 words) - 20:30, 1 April 2022
  • |Title=14th International Conference on Provable and Practical Security ...s are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:
    2 KB (215 words) - 19:54, 1 April 2022
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (436 words) - 19:41, 1 April 2022
  • | Title = IEEE Symposium on Computational Intelligence in Cyber Security
    644 bytes (69 words) - 20:35, 1 April 2022
  • |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service
    5 KB (578 words) - 19:36, 1 April 2022
  • |Field=Computer security and reliability |Title=32nd Annual Computer Security Applications Conference
    2 KB (280 words) - 20:31, 1 April 2022

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)