Search results

Jump to: navigation, search

Page title matches

Page text matches

  • * Security issues of data management in wireless networks MEXT grant-in-aid for Priority area Research called Cyber
    5 KB (611 words) - 14:43, 16 September 2008
  • ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are
    18 KB (2,408 words) - 01:37, 16 December 2008
  • * Security, Privacy and Trust * WWW, Semantic Web and Cyber World
    34 KB (4,565 words) - 21:20, 10 January 2018
  • * Security, Privacy and Trust * WWW, Semantic Web and Cyber World
    8 KB (1,037 words) - 21:20, 10 January 2018
  • * Security, Privacy and Trust * WWW, Semantic Web and Cyber World
    9 KB (1,189 words) - 21:20, 10 January 2018
  • * Security, Privacy and Trust * WWW, Semantic Web and Cyber World
    26 KB (3,456 words) - 21:20, 10 January 2018
  • IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009)
    3 KB (376 words) - 16:47, 14 October 2008
  • .Cyber-Physical Systems .Network Protocol and Security
    3 KB (375 words) - 16:48, 14 October 2008
  • ...structure and theory, as well as two additional areas of special emphasis: cyber-physical systems and embedded applications, benchmarks and tools. ...cations o real-time resource management and scheduling o embedded system security o programming languages and software engineering for real-time or
    8 KB (939 words) - 16:48, 14 October 2008
  • - Building Smart Worlds in Real and Cyber Spaces - * Real/Cyber World Modeling and Semantics
    7 KB (942 words) - 19:05, 14 October 2008
  • Cyber Law • Ethical, Social, Privacy, Security and moral Issues in an e-societ
    5 KB (530 words) - 09:27, 24 June 2011
  • - Data Security Issues - IS Security Issues
    6 KB (780 words) - 19:06, 14 October 2008
  • * Cyber Crimes * Security Technologies
    2 KB (193 words) - 19:06, 14 October 2008
  • | Title = IEEE Symposium on Computational Intelligence in Cyber Security
    585 bytes (66 words) - 22:03, 14 October 2008
  • b. Security/accreditation c. Cyber Security
    16 KB (2,200 words) - 19:51, 18 February 2021
  • Cyber Security
    3 KB (427 words) - 16:01, 29 May 2016
  • | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability
    5 KB (673 words) - 22:19, 14 October 2008
  • embedded and cyber physical systems design: o Language features to enhance reliability and security
    5 KB (673 words) - 22:30, 14 October 2008
  • ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.
    5 KB (580 words) - 09:32, 12 May 2020
  • * Formal methods for cyber-physical systems * Formal models and methods for security
    2 KB (291 words) - 10:09, 20 November 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)