Search results
Jump to navigation
Jump to search
- |Title=CyberSec 2017 : The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic |Field=security, cyber security, cyber welfare, digital forensic468 bytes (45 words) - 10:37, 8 March 2021
- |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...rity assessment, cyber risk management, cyber training technologies, cyber security data analytics520 bytes (64 words) - 10:37, 8 March 2021
- |Title=MLSCPS 2016 : 2016 IEEE Workshop on Machine Learning in Security of Cyber-Physical Systems (MLSCPS) |Field=machine learning, cyber security, cyber-physical system, IEEE475 bytes (60 words) - 11:09, 8 March 2021
- ...IEICE Transactions Special Section on Information and Communication System Security (August 2017) |Field=security, informatioin security, network security, cyber security427 bytes (52 words) - 11:00, 8 March 2021
- |Title=Conference on the Decision and Game Theory for Security ...eneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-re401 bytes (52 words) - 12:29, 28 January 2021
- |Title=CCOE - CFP 2016 : Cyber Center of Excellence (CCOE) Call For Research Papers |Field=cyber security, computer science, electronic warfare, quantum computing512 bytes (74 words) - 10:33, 8 March 2021
- |Title=PiSecon 2017 : 3rd Pirate Security Conference |Field=security, cyber, GOVERNANCE, defense373 bytes (45 words) - 11:16, 8 March 2021
- |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions2 KB (196 words) - 11:16, 8 March 2021
- |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability2 KB (305 words) - 10:55, 8 March 2021
- |Title=Conference on Cyber Warfare |Field=Internet security2 KB (220 words) - 10:37, 8 March 2021
- |Title=14th International Conference on Provable and Practical Security ...s are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:2 KB (209 words) - 11:16, 8 March 2021
- | Title = The International Workshop on Cyber Physical and Social Computing ...cal, economic and social revolution have changed the world we are used to. Cyber-Physical Systems (CPS)3 KB (446 words) - 12:14, 28 January 2021
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (430 words) - 11:03, 8 March 2021
- | Title = IEEE Symposium on Computational Intelligence in Cyber Security585 bytes (66 words) - 12:11, 28 January 2021
- |Field=Computer security and reliability |Title =32nd Annual Computer Security Applications Conference2 KB (283 words) - 10:18, 11 March 2022
- |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service5 KB (572 words) - 11:25, 8 March 2021
- * Algorithms for information security and privacy * Distributed human-cyber-physical applications4 KB (437 words) - 10:55, 8 March 2021
- |Title=11th Conference on Decision and Game Theory for Security 2020 Conference on Decision and Game Theory for Security3 KB (354 words) - 10:46, 8 March 2021
- |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security4 KB (564 words) - 10:36, 8 March 2021
- '''2. Security, Privacy, and Trust''' Physical layer security1 KB (165 words) - 11:05, 8 March 2021