Search results

Jump to: navigation, search
  • - Evaluation and Assessment - Data Security Issues
    6 KB (780 words) - 19:06, 14 October 2008
  • ...ntify a business need and describe how MT meets those needs, with a candid assessment of its strengths and limitations for that particular usage. Submissions sho b. Security/accreditation
    16 KB (2,200 words) - 19:51, 18 February 2021
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    14 KB (1,651 words) - 14:56, 15 February 2017
  • - Internet security - Cyber law
    4 KB (507 words) - 21:37, 18 November 2009
  • - Internet security - Cyber law
    6 KB (732 words) - 04:52, 5 December 2010
  • - Internet security - Cyber law
    5 KB (595 words) - 04:03, 15 January 2012
  • |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability
    2 KB (304 words) - 09:54, 5 March 2012
  • - Internet security - Cyber law
    4 KB (535 words) - 13:38, 17 January 2013
  • - Cyber-identities and privacy - Innovative Assessment Collaboration and Problem Solving
    5 KB (702 words) - 09:02, 5 March 2013
  • |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...rity assessment, cyber risk management, cyber training technologies, cyber security data analytics
    514 bytes (63 words) - 19:31, 1 June 2016
  • - Internet security - Cyber law
    5 KB (641 words) - 21:32, 29 July 2016
  • complex cyber systems for smart cities requires the use of state-of-the-art - City healthcare service monitoring assessment
    4 KB (565 words) - 08:46, 7 February 2017
  • of man and machine in a cyber world : Smart response to challenges of smart Homeland Security
    3 KB (324 words) - 12:34, 5 December 2017
  • |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security
    4 KB (565 words) - 16:27, 18 February 2021
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security
    5 KB (611 words) - 10:47, 8 August 2017
  • |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service
    5 KB (571 words) - 09:51, 3 September 2017
  • |Title=39th International Conference on Computer Safety, Reliability and Security The 39th International Conference on Computer Safety, Reliability and Security ( SafeComp)
    5 KB (617 words) - 10:54, 19 June 2020
  • |Title=17th International Conference on Trust, Privacy and Security in Digital Business ...lack of trust in electronic procedures and the extent to which information security and user privacy can be ensured.
    5 KB (690 words) - 11:02, 26 March 2020
  • ...rmation processing; Biometric analysis, forensic analysis watermarking and security; Processing signal, image and video collections; Implementation of signal, ...uality assessment; Visual aesthetic; Image quality assessment; Blind noise assessment; Perceptual evaluation; Automatic segmentation; Perceptual video compressio
    10 KB (1,215 words) - 13:46, 19 April 2020
  • |Title=38th International Conference on Computer Safety, Reliability, and Security The 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP)
    3 KB (419 words) - 09:51, 19 June 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)