Search results

Jump to navigation Jump to search
Results 1 – 21 of 38
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...rity assessment, cyber risk management, cyber training technologies, cyber security data analytics
    569 bytes (68 words) - 19:09, 1 April 2022
  • |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability
    2 KB (308 words) - 19:06, 1 April 2022
  • |Title=Conference on Decision and Game Theory for Security * Game theory, control, and mechanism design for security and privacy
    2 KB (224 words) - 20:22, 1 April 2022
  • |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service
    5 KB (578 words) - 19:36, 1 April 2022
  • |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security
    4 KB (572 words) - 20:10, 1 April 2022
  • |Title=11th Conference on Decision and Game Theory for Security === 2020 Conference on Decision and Game Theory for Security ===
    3 KB (401 words) - 20:22, 1 April 2022
  • |Title=38th International Conference on Computer Safety, Reliability, and Security The 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP)
    3 KB (426 words) - 19:59, 1 April 2022
  • |Title=8th Conference on Decision and Game Theory for Security 2017 Conference on Decision and Game Theory for Security
    3 KB (414 words) - 20:01, 1 April 2022
  • |Title=9th Conference on Decision and Game Theory for Security 2018 Conference on Decision and Game Theory for Security
    3 KB (430 words) - 20:01, 1 April 2022
  • |Title=36th International Conference on Computer Safety, Reliability, and Security ...ustrial Computer Systems, Technical Committee 7 on Reliability, Safety and Security (EWICS TC7). Since then, it has contributed to the progress of the state-of
    4 KB (464 words) - 19:59, 1 April 2022
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    14 KB (1,655 words) - 19:31, 1 April 2022
  • |Title=37th International Conference on Computer Safety, Reliability, and Security The 37th International Conference on Computer Safety, Reliability and Security (SAFECOMP)
    4 KB (482 words) - 19:59, 1 April 2022
  • * Post-processing including quality assessment and validation * Security and intrusion detection
    2 KB (279 words) - 19:58, 1 April 2022
  • * Post-processing including quality assessment and validation * Security and intrusion detection
    2 KB (268 words) - 19:58, 1 April 2022
  • ● Post-processing including quality assessment and validation ● Security and intrusion detection
    2 KB (275 words) - 19:58, 1 April 2022
  • ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control
    17 KB (2,039 words) - 20:11, 1 April 2022
  • ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control
    17 KB (2,092 words) - 19:57, 1 April 2022
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security
    5 KB (617 words) - 19:33, 1 April 2022
  • |Title=39th International Conference on Computer Safety, Reliability and Security The 39th International Conference on Computer Safety, Reliability and Security ( SafeComp)
    5 KB (624 words) - 19:59, 1 April 2022
  • of man and machine in a cyber world : Smart response to challenges of smart Homeland Security
    3 KB (332 words) - 19:37, 1 April 2022

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)