Search results
Jump to navigation
Jump to search
- |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...rity assessment, cyber risk management, cyber training technologies, cyber security data analytics569 bytes (68 words) - 19:09, 1 April 2022
- |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability2 KB (308 words) - 19:06, 1 April 2022
- |Title=Conference on Decision and Game Theory for Security * Game theory, control, and mechanism design for security and privacy2 KB (224 words) - 20:22, 1 April 2022
- |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service5 KB (578 words) - 19:36, 1 April 2022
- |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security4 KB (572 words) - 20:10, 1 April 2022
- |Title=11th Conference on Decision and Game Theory for Security === 2020 Conference on Decision and Game Theory for Security ===3 KB (401 words) - 20:22, 1 April 2022
- |Title=38th International Conference on Computer Safety, Reliability, and Security The 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP)3 KB (426 words) - 19:59, 1 April 2022
- |Title=8th Conference on Decision and Game Theory for Security 2017 Conference on Decision and Game Theory for Security3 KB (414 words) - 20:01, 1 April 2022
- |Title=9th Conference on Decision and Game Theory for Security 2018 Conference on Decision and Game Theory for Security3 KB (430 words) - 20:01, 1 April 2022
- |Title=36th International Conference on Computer Safety, Reliability, and Security ...ustrial Computer Systems, Technical Committee 7 on Reliability, Safety and Security (EWICS TC7). Since then, it has contributed to the progress of the state-of4 KB (464 words) - 19:59, 1 April 2022
- RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure14 KB (1,655 words) - 19:31, 1 April 2022
- |Title=37th International Conference on Computer Safety, Reliability, and Security The 37th International Conference on Computer Safety, Reliability and Security (SAFECOMP)4 KB (482 words) - 19:59, 1 April 2022
- * Post-processing including quality assessment and validation * Security and intrusion detection2 KB (279 words) - 19:58, 1 April 2022
- * Post-processing including quality assessment and validation * Security and intrusion detection2 KB (268 words) - 19:58, 1 April 2022
- ● Post-processing including quality assessment and validation ● Security and intrusion detection2 KB (275 words) - 19:58, 1 April 2022
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,039 words) - 20:11, 1 April 2022
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,092 words) - 19:57, 1 April 2022
- ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security5 KB (617 words) - 19:33, 1 April 2022
- |Title=39th International Conference on Computer Safety, Reliability and Security The 39th International Conference on Computer Safety, Reliability and Security ( SafeComp)5 KB (624 words) - 19:59, 1 April 2022
- of man and machine in a cyber world : Smart response to challenges of smart Homeland Security3 KB (332 words) - 19:37, 1 April 2022