Search results
Jump to navigation
Jump to search
Page title matches
- 26 bytes (2 words) - 11:46, 8 August 2017
- 23 bytes (2 words) - 11:54, 8 August 2017
Page text matches
- |Title=CyberSec 2017 : The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic |Field=security, cyber security, cyber welfare, digital forensic517 bytes (49 words) - 19:16, 1 April 2022
- ...cannot afford, as a country, to be left behind. It events such as a cyber security challenge bring otherwise hidden talents forward, then that's a good thing.326 bytes (55 words) - 01:08, 26 June 2012
- |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...rity assessment, cyber risk management, cyber training technologies, cyber security data analytics569 bytes (68 words) - 19:09, 1 April 2022
- |Title=MLSCPS 2016 : 2016 IEEE Workshop on Machine Learning in Security of Cyber-Physical Systems (MLSCPS) |Field=machine learning, cyber security, cyber-physical system, IEEE524 bytes (64 words) - 19:14, 1 April 2022
- ...IEICE Transactions Special Section on Information and Communication System Security (August 2017) |Field=security, informatioin security, network security, cyber security481 bytes (56 words) - 19:31, 1 April 2022
- |Acronym=JIP SI: Computer Security Technologies 2017 ..., Special issue of âComputer Security Technologies against Sophisticated Cyber Attacksâ513 bytes (62 words) - 14:44, 6 November 2020
- |Title=CCOE - CFP 2016 : Cyber Center of Excellence (CCOE) Call For Research Papers |Field=cyber security, computer science, electronic warfare, quantum computing538 bytes (68 words) - 20:10, 1 April 2022
- |Title=Conference on the Decision and Game Theory for Security ...eneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-re516 bytes (62 words) - 22:38, 7 April 2022
- |Title=PiSecon 2017 : 3rd Pirate Security Conference |Field=security, cyber, GOVERNANCE, defense422 bytes (49 words) - 19:14, 1 April 2022
- |Title=Conference on Cyber Warfare |Field=Internet security2 KB (221 words) - 19:01, 1 April 2022
- |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability2 KB (308 words) - 19:06, 1 April 2022
- |Title=Conference on Decision and Game Theory for Security * Game theory, control, and mechanism design for security and privacy2 KB (224 words) - 20:22, 1 April 2022
- |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions2 KB (202 words) - 19:54, 1 April 2022
- | Title = The International Workshop on Cyber Physical and Social Computing ...cal, economic and social revolution have changed the world we are used to. Cyber-Physical Systems (CPS)3 KB (449 words) - 20:36, 1 April 2022
- |Field=computer security |Title =19th International Conference on Applied Cryptography and Network Security997 bytes (124 words) - 20:30, 1 April 2022
- |Title=14th International Conference on Provable and Practical Security ...s are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:2 KB (215 words) - 19:54, 1 April 2022
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (436 words) - 19:41, 1 April 2022
- | Title = IEEE Symposium on Computational Intelligence in Cyber Security644 bytes (69 words) - 20:35, 1 April 2022
- |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service5 KB (578 words) - 19:36, 1 April 2022
- |Field=Computer security and reliability |Title=32nd Annual Computer Security Applications Conference2 KB (280 words) - 20:31, 1 April 2022