Search results

Jump to navigation Jump to search
Results 1 – 21 of 181
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • |Title=CyberSec 2017 : The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic |Field=security, cyber security, cyber welfare, digital forensic
    462 bytes (44 words) - 13:27, 17 February 2021
  • |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...rity assessment, cyber risk management, cyber training technologies, cyber security data analytics
    514 bytes (63 words) - 13:20, 17 February 2021
  • |Title=MLSCPS 2016 : 2016 IEEE Workshop on Machine Learning in Security of Cyber-Physical Systems (MLSCPS) |Field=machine learning, cyber security, cyber-physical system, IEEE
    469 bytes (59 words) - 13:24, 17 February 2021
  • ...cannot afford, as a country, to be left behind. It events such as a cyber security challenge bring otherwise hidden talents forward, then that's a good thing.
    326 bytes (55 words) - 13:15, 17 February 2021
  • ...IEICE Transactions Special Section on Information and Communication System Security (August 2017) |Field=security, informatioin security, network security, cyber security
    421 bytes (51 words) - 13:39, 17 February 2021
  • |Acronym=JIP SI: Computer Security Technologies 2017 ..., Special issue of “Computer Security Technologies against Sophisticated Cyber Attacks”
    513 bytes (62 words) - 14:11, 17 February 2021
  • |Title=Conference on the Decision and Game Theory for Security ...eneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-re
    401 bytes (52 words) - 11:16, 17 February 2021
  • |Title=CCOE - CFP 2016 : Cyber Center of Excellence (CCOE) Call For Research Papers |Field=cyber security, computer science, electronic warfare, quantum computing
    506 bytes (73 words) - 13:22, 17 February 2021
  • |Title=PiSecon 2017 : 3rd Pirate Security Conference |Field=security, cyber, GOVERNANCE, defense
    367 bytes (44 words) - 13:24, 17 February 2021
  • |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions
    2 KB (195 words) - 13:59, 17 February 2021
  • |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability
    2 KB (304 words) - 13:14, 17 February 2021
  • |Title=19th International Conference on Applied Cryptography and Network Security |Field=computer security
    870 bytes (109 words) - 14:15, 17 February 2021
  • |Title=Conference on Cyber Warfare |Field=Internet security
    2 KB (219 words) - 12:55, 17 February 2021
  • |Title=14th International Conference on Provable and Practical Security ...s are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:
    2 KB (208 words) - 13:59, 17 February 2021
  • | Title = The International Workshop on Cyber Physical and Social Computing ...cal, economic and social revolution have changed the world we are used to. Cyber-Physical Systems (CPS)
    3 KB (446 words) - 12:57, 17 February 2021
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (248 words) - 23:42, 30 March 2021
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 13:49, 17 February 2021
  • | Title = IEEE Symposium on Computational Intelligence in Cyber Security
    585 bytes (66 words) - 12:20, 17 February 2021
  • |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service
    5 KB (571 words) - 13:42, 17 February 2021
  • * Algorithms for information security and privacy * Distributed human-cyber-physical applications
    4 KB (436 words) - 14:09, 17 February 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)