Search results
Jump to navigation
Jump to search
- |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...r security assessment, cyber risk management, cyber training technologies, cyber security data analytics520 bytes (64 words) - 10:37, 8 March 2021
- * - Simulated for Training and Education * - Simulation for Cybersecurity and Cyber-Physical Systems5 KB (641 words) - 11:22, 8 March 2021
- - Data and Metadata Communications Technologies ACSET Stream 2: Technology and Society: Technologies, Societies and Communities5 KB (703 words) - 10:27, 8 March 2021
- complex cyber systems for smart cities requires the use of state-of-the-art technologies and solutions in smart sensing/devices/materials, IoT, networking,4 KB (566 words) - 10:58, 8 March 2021
- * Industrial and Manufacturing System Technologies * Adoption, acceptance, and diffusion of emerging technologies9 KB (897 words) - 10:48, 8 March 2021
- ...onic devices in crimes that directly involve, or are facilitated by, these technologies. The aim of digital forensics is to produce outputs that can help investiga Cyber Terrorism3 KB (463 words) - 11:27, 8 March 2021
- ...ering discussion between researchers, developers, and users of translation technologies in government and industry. a showcase of current and future translation technologies and products;16 KB (2,207 words) - 12:04, 28 January 2021
- ...alysis; Personalized sentiment classification; Mobile devices and Internet technologies; Mobile IPv6 over Software Defined Network (SDN); Generative Mappings; Inte ...rning models; Prediction uncertainty (approximation learning, similarity); Training of models (hyperparameter optimization, regularization, optimizers); Active15 KB (1,922 words) - 10:53, 8 March 2021