Search results
Jump to navigation
Jump to search
- |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...rity assessment, cyber risk management, cyber training technologies, cyber security data analytics520 bytes (64 words) - 10:37, 8 March 2021
- |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability2 KB (305 words) - 10:55, 8 March 2021
- |Title=11th Conference on Decision and Game Theory for Security 2020 Conference on Decision and Game Theory for Security3 KB (354 words) - 10:46, 8 March 2021
- |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service5 KB (572 words) - 11:25, 8 March 2021
- |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security4 KB (564 words) - 10:36, 8 March 2021
- |Title=38th International Conference on Computer Safety, Reliability, and Security The 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP)3 KB (420 words) - 11:22, 8 March 2021
- |Title=8th Conference on Decision and Game Theory for Security 2017 Conference on Decision and Game Theory for Security3 KB (408 words) - 10:46, 8 March 2021
- |Title=9th Conference on Decision and Game Theory for Security 2018 Conference on Decision and Game Theory for Security3 KB (424 words) - 10:46, 8 March 2021
- |Title=36th International Conference on Computer Safety, Reliability, and Security ...ustrial Computer Systems, Technical Committee 7 on Reliability, Safety and Security (EWICS TC7). Since then, it has contributed to the progress of the state-of4 KB (458 words) - 11:18, 8 March 2021
- |Title=37th International Conference on Computer Safety, Reliability, and Security The 37th International Conference on Computer Safety, Reliability and Security (SAFECOMP)4 KB (476 words) - 11:22, 8 March 2021
- RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure14 KB (1,652 words) - 10:52, 8 March 2021
- * Post-processing including quality assessment and validation * Security and intrusion detection2 KB (273 words) - 11:13, 8 March 2021
- * Post-processing including quality assessment and validation * Security and intrusion detection2 KB (262 words) - 11:13, 8 March 2021
- ● Post-processing including quality assessment and validation ● Security and intrusion detection2 KB (269 words) - 11:13, 8 March 2021
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,032 words) - 11:53, 8 March 2021
- ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security5 KB (612 words) - 11:09, 8 March 2021
- |Title=39th International Conference on Computer Safety, Reliability and Security The 39th International Conference on Computer Safety, Reliability and Security ( SafeComp)5 KB (618 words) - 11:22, 8 March 2021
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,089 words) - 10:52, 8 March 2021
- |Title=17th International Conference on Trust, Privacy and Security in Digital Business ...lack of trust in electronic procedures and the extent to which information security and user privacy can be ensured.5 KB (691 words) - 11:24, 8 March 2021
- of man and machine in a cyber world : Smart response to challenges of smart Homeland Security3 KB (325 words) - 11:09, 8 March 2021