Search results
Jump to navigation
Jump to search
- |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...r security assessment, cyber risk management, cyber training technologies, cyber security data analytics514 bytes (63 words) - 13:20, 17 February 2021
- |Title=3rd International Cyber Resilience Conference ...to explore the issues, problems and possible solutions to the APT posed by cyber attacks.2 KB (304 words) - 13:14, 17 February 2021
- Conflict and Collaboration in Compliance, Governance and Risk ...-presence raise issues of privacy, management, compliance, governance, and risk.4 KB (557 words) - 13:03, 17 February 2021
- ...urity management in real-time systems; Metrics and techniques for security risk assessment; Internet monitoring and response security service; Protecting e ...methodologies and ID Cards; Security on hardware and smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anon14 KB (1,651 words) - 13:39, 17 February 2021
- * Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical * Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems3 KB (353 words) - 14:05, 17 February 2021
- implementation, and operation of industrial cyber security technologies. Solutions for Automation of ICS Security Management5 KB (571 words) - 13:42, 17 February 2021
- * Risk assessment and risk management * Security investment and cyber insurance3 KB (407 words) - 14:05, 17 February 2021
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,031 words) - 22:42, 25 February 2021
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,031 words) - 02:18, 26 February 2021
- * Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical * Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems3 KB (423 words) - 14:05, 17 February 2021
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,088 words) - 14:05, 17 February 2021
- ...(electromagnetic waves, unsafe facilities, undocumented logistics, etc.); Cyber-security and public services risks (thefts, health, alarms, vehicular, surv ...and pseudo-anonymity; Mitigating threats; Privilege control and isolation; Cyber-attacks and human factors; IoT and big data security issues; Privacy and pr15 KB (1,886 words) - 14:09, 17 February 2021
- Special theme: Cyber Engineering and Human Space Computing ...sses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, convergence technologies, web services and7 KB (941 words) - 13:03, 17 February 2021
- 6. Cyber Security 1. Strategic and Change Management4 KB (507 words) - 13:42, 17 February 2021
- ...siness, e-Science, Green Computing, Secured Technologies, Intelligent Data Management ...h collaboration and awareness of current development in secure information management in the digital society. ''5 KB (595 words) - 13:14, 17 February 2021
- in security and cryptography technologies and management systems for preventing an integrated security management system that protects critical5 KB (611 words) - 13:41, 17 February 2021
- *Intelligent data management - Knowledge Management4 KB (507 words) - 13:08, 17 February 2021
- Knowledge, Data and Information Management Safety, Reliability, Resilience, Risk5 KB (640 words) - 14:13, 17 February 2021
- Cyber Terrorism Risk and Incident Management3 KB (462 words) - 13:57, 17 February 2021
- Cyber computing Decision making and risk management4 KB (401 words) - 14:07, 17 February 2021