Search results
Create the page "Cyber security" on this wiki! See also the search results found.
Page title matches
- 26 bytes (2 words) - 10:46, 8 August 2017
- 23 bytes (2 words) - 10:54, 8 August 2017
Page text matches
- * Security issues of data management in wireless networks MEXT grant-in-aid for Priority area Research called Cyber5 KB (611 words) - 14:43, 16 September 2008
- ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are18 KB (2,408 words) - 01:37, 16 December 2008
- * Security, Privacy and Trust * WWW, Semantic Web and Cyber World34 KB (4,565 words) - 21:20, 10 January 2018
- * Security, Privacy and Trust * WWW, Semantic Web and Cyber World8 KB (1,037 words) - 21:20, 10 January 2018
- * Security, Privacy and Trust * WWW, Semantic Web and Cyber World9 KB (1,189 words) - 21:20, 10 January 2018
- * Security, Privacy and Trust * WWW, Semantic Web and Cyber World26 KB (3,456 words) - 21:20, 10 January 2018
- IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009)3 KB (376 words) - 16:47, 14 October 2008
- .Cyber-Physical Systems .Network Protocol and Security3 KB (375 words) - 16:48, 14 October 2008
- ...structure and theory, as well as two additional areas of special emphasis: cyber-physical systems and embedded applications, benchmarks and tools. ...cations o real-time resource management and scheduling o embedded system security o programming languages and software engineering for real-time or8 KB (939 words) - 16:48, 14 October 2008
- - Building Smart Worlds in Real and Cyber Spaces - * Real/Cyber World Modeling and Semantics7 KB (942 words) - 19:05, 14 October 2008
- • Cyber Law • Ethical, Social, Privacy, Security and moral Issues in an e-societ5 KB (530 words) - 09:27, 24 June 2011
- - Data Security Issues - IS Security Issues6 KB (780 words) - 19:06, 14 October 2008
- * Cyber Crimes * Security Technologies2 KB (193 words) - 19:06, 14 October 2008
- | Title = IEEE Symposium on Computational Intelligence in Cyber Security585 bytes (66 words) - 22:03, 14 October 2008
- b. Security/accreditation c. Cyber Security16 KB (2,200 words) - 19:51, 18 February 2021
- Cyber Security3 KB (427 words) - 16:01, 29 May 2016
- | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability5 KB (673 words) - 22:19, 14 October 2008
- embedded and cyber physical systems design: o Language features to enhance reliability and security5 KB (673 words) - 22:30, 14 October 2008
- ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.5 KB (580 words) - 09:32, 12 May 2020
- * Formal methods for cyber-physical systems * Formal models and methods for security2 KB (291 words) - 10:09, 20 November 2020