Search results

Jump to navigation Jump to search
  • |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...r security assessment, cyber risk management, cyber training technologies, cyber security data analytics
    520 bytes (64 words) - 10:37, 8 March 2021
  • * - Simulated for Training and Education * - Simulation for Cybersecurity and Cyber-Physical Systems
    5 KB (641 words) - 11:22, 8 March 2021
  • - Data and Metadata Communications Technologies ACSET Stream 2: Technology and Society: Technologies, Societies and Communities
    5 KB (703 words) - 10:27, 8 March 2021
  • complex cyber systems for smart cities requires the use of state-of-the-art technologies and solutions in smart sensing/devices/materials, IoT, networking,
    4 KB (566 words) - 10:58, 8 March 2021
  • * Industrial and Manufacturing System Technologies * Adoption, acceptance, and diffusion of emerging technologies
    9 KB (897 words) - 10:48, 8 March 2021
  • ...onic devices in crimes that directly involve, or are facilitated by, these technologies. The aim of digital forensics is to produce outputs that can help investiga Cyber Terrorism
    3 KB (463 words) - 11:27, 8 March 2021
  • ...ering discussion between researchers, developers, and users of translation technologies in government and industry. a showcase of current and future translation technologies and products;
    16 KB (2,207 words) - 12:04, 28 January 2021
  • ...alysis; Personalized sentiment classification; Mobile devices and Internet technologies; Mobile IPv6 over Software Defined Network (SDN); Generative Mappings; Inte ...rning models; Prediction uncertainty (approximation learning, similarity); Training of models (hyperparameter optimization, regularization, optimizers); Active
    15 KB (1,922 words) - 10:53, 8 March 2021