Search results
Jump to navigation
Jump to search
- |Title=CyberSec 2017 : The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic |Field=security, cyber security, cyber welfare, digital forensic462 bytes (44 words) - 13:27, 17 February 2021
- |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...rity assessment, cyber risk management, cyber training technologies, cyber security data analytics514 bytes (63 words) - 13:20, 17 February 2021
- |Title=MLSCPS 2016 : 2016 IEEE Workshop on Machine Learning in Security of Cyber-Physical Systems (MLSCPS) |Field=machine learning, cyber security, cyber-physical system, IEEE469 bytes (59 words) - 13:24, 17 February 2021
- ...cannot afford, as a country, to be left behind. It events such as a cyber security challenge bring otherwise hidden talents forward, then that's a good thing.326 bytes (55 words) - 13:15, 17 February 2021
- ...IEICE Transactions Special Section on Information and Communication System Security (August 2017) |Field=security, informatioin security, network security, cyber security421 bytes (51 words) - 13:39, 17 February 2021
- |Acronym=JIP SI: Computer Security Technologies 2017 ..., Special issue of âComputer Security Technologies against Sophisticated Cyber Attacksâ513 bytes (62 words) - 14:11, 17 February 2021
- |Title=Conference on the Decision and Game Theory for Security ...eneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-re401 bytes (52 words) - 11:16, 17 February 2021
- |Title=CCOE - CFP 2016 : Cyber Center of Excellence (CCOE) Call For Research Papers |Field=cyber security, computer science, electronic warfare, quantum computing506 bytes (73 words) - 13:22, 17 February 2021
- |Title=PiSecon 2017 : 3rd Pirate Security Conference |Field=security, cyber, GOVERNANCE, defense367 bytes (44 words) - 13:24, 17 February 2021
- |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions2 KB (195 words) - 13:59, 17 February 2021
- |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability2 KB (304 words) - 13:14, 17 February 2021
- |Title=19th International Conference on Applied Cryptography and Network Security |Field=computer security870 bytes (109 words) - 14:15, 17 February 2021
- |Title=Conference on Cyber Warfare |Field=Internet security2 KB (219 words) - 12:55, 17 February 2021
- |Title=14th International Conference on Provable and Practical Security ...s are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:2 KB (208 words) - 13:59, 17 February 2021
- | Title = The International Workshop on Cyber Physical and Social Computing ...cal, economic and social revolution have changed the world we are used to. Cyber-Physical Systems (CPS)3 KB (446 words) - 12:57, 17 February 2021
- |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability2 KB (248 words) - 23:42, 30 March 2021
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (429 words) - 13:49, 17 February 2021
- | Title = IEEE Symposium on Computational Intelligence in Cyber Security585 bytes (66 words) - 12:20, 17 February 2021
- |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service5 KB (571 words) - 13:42, 17 February 2021
- * Algorithms for information security and privacy * Distributed human-cyber-physical applications4 KB (436 words) - 14:09, 17 February 2021