Search results
Create the page "Cyber risk management" on this wiki! See also the search results found.
- * Brain data collection, pre-processing, management, and analysis methodologies; * Cyber-individuals and individual differences;6 KB (692 words) - 22:59, 30 May 2016
- Conflict and Collaboration in Compliance, Governance and Risk ...-presence raise issues of privacy, management, compliance, governance, and risk.4 KB (557 words) - 15:33, 27 February 2009
- Special theme: Cyber Engineering and Human Space Computing ...sses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, convergence technologies, web services and7 KB (941 words) - 16:07, 27 February 2009
- ...urity management in real-time systems; Metrics and techniques for security risk assessment; Internet monitoring and response security service; Protecting e ...methodologies and ID Cards; Security on hardware and smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anon14 KB (1,651 words) - 14:56, 15 February 2017
- *Intelligent data management - Knowledge Management4 KB (507 words) - 21:37, 18 November 2009
- ...h collaboration and awareness of current development in secure information management in the digital society. *Intelligent data management6 KB (732 words) - 04:52, 5 December 2010
- Cyber Terrorism Risk and Incident Management3 KB (462 words) - 10:51, 22 March 2020
- ...siness, e-Science, Green Computing, Secured Technologies, Intelligent Data Management ...h collaboration and awareness of current development in secure information management in the digital society. ''5 KB (595 words) - 04:03, 15 January 2012
- |Title=3rd International Cyber Resilience Conference ...to explore the issues, problems and possible solutions to the APT posed by cyber attacks.2 KB (304 words) - 09:54, 5 March 2012
- *Intelligent data management - Knowledge Management4 KB (535 words) - 13:38, 17 January 2013
- |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...r security assessment, cyber risk management, cyber training technologies, cyber security data analytics514 bytes (63 words) - 19:31, 1 June 2016
- ...ch collaboration and awareness of current evelopment in secure information management in the digital society. *Intelligent data management5 KB (641 words) - 21:32, 29 July 2016
- *change management *governance, risk, and compliance modelling10 KB (1,309 words) - 09:29, 5 June 2019
- 6. Cyber Security 1. Strategic and Change Management4 KB (507 words) - 08:52, 3 September 2017
- in security and cryptography technologies and management systems for preventing an integrated security management system that protects critical5 KB (611 words) - 10:47, 8 August 2017
- implementation, and operation of industrial cyber security technologies. Solutions for Automation of ICS Security Management5 KB (571 words) - 09:51, 3 September 2017
- *An Inventory-based Mobile Application for Warehouse Management to Digitize Very Small Enterprises *Enhancing Supply Chain Risk Management by Applying Machine Learning to Identify Risks7 KB (917 words) - 17:07, 17 March 2020
- Cyber computing Decision making and risk management4 KB (401 words) - 06:52, 29 July 2020
- * Cyber-physical system security * Key management11 KB (1,549 words) - 10:34, 17 April 2020
- ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control17 KB (2,088 words) - 11:49, 14 June 2020