Search results
Jump to navigation
Jump to search
- |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...r security assessment, cyber risk management, cyber training technologies, cyber security data analytics514 bytes (63 words) - 13:20, 17 February 2021
- * - Simulated for Training and Education * - Simulation for Cybersecurity and Cyber-Physical Systems5 KB (640 words) - 14:02, 17 February 2021
- - Data and Metadata Communications Technologies ACSET Stream 2: Technology and Society: Technologies, Societies and Communities5 KB (702 words) - 13:16, 17 February 2021
- complex cyber systems for smart cities requires the use of state-of-the-art technologies and solutions in smart sensing/devices/materials, IoT, networking,4 KB (565 words) - 13:39, 17 February 2021
- * Industrial and Manufacturing System Technologies * Adoption, acceptance, and diffusion of emerging technologies9 KB (896 words) - 14:08, 17 February 2021
- ...onic devices in crimes that directly involve, or are facilitated by, these technologies. The aim of digital forensics is to produce outputs that can help investiga Cyber Terrorism3 KB (462 words) - 13:57, 17 February 2021
- ...ering discussion between researchers, developers, and users of translation technologies in government and industry. a showcase of current and future translation technologies and products;16 KB (2,207 words) - 12:19, 17 February 2021
- ...alysis; Personalized sentiment classification; Mobile devices and Internet technologies; Mobile IPv6 over Software Defined Network (SDN); Generative Mappings; Inte ...rning models; Prediction uncertainty (approximation learning, similarity); Training of models (hyperparameter optimization, regularization, optimizers); Active15 KB (1,921 words) - 14:13, 17 February 2021