Search results

Jump to navigation Jump to search
Results 1 – 8 of 8
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...r security assessment, cyber risk management, cyber training technologies, cyber security data analytics
    569 bytes (68 words) - 19:09, 1 April 2022
  • * - Simulated for Training and Education * - Simulation for Cybersecurity and Cyber-Physical Systems
    5 KB (647 words) - 20:00, 1 April 2022
  • - Data and Metadata Communications Technologies ACSET Stream 2: Technology and Society: Technologies, Societies and Communities
    5 KB (704 words) - 19:07, 1 April 2022
  • complex cyber systems for smart cities requires the use of state-of-the-art technologies and solutions in smart sensing/devices/materials, IoT, networking,
    4 KB (570 words) - 19:31, 1 April 2022
  • ...onic devices in crimes that directly involve, or are facilitated by, these technologies. The aim of digital forensics is to produce outputs that can help investiga Cyber Terrorism
    3 KB (466 words) - 19:55, 1 April 2022
  • * Industrial and Manufacturing System Technologies * Adoption, acceptance, and diffusion of emerging technologies
    9 KB (903 words) - 20:01, 1 April 2022
  • ...alysis; Personalized sentiment classification; Mobile devices and Internet technologies; Mobile IPv6 over Software Defined Network (SDN); Generative Mappings; Inte ...rning models; Prediction uncertainty (approximation learning, similarity); Training of models (hyperparameter optimization, regularization, optimizers); Active
    15 KB (1,925 words) - 20:08, 1 April 2022
  • ...ering discussion between researchers, developers, and users of translation technologies in government and industry. a showcase of current and future translation technologies and products;
    16 KB (2,206 words) - 20:32, 1 April 2022