and Security Technologies

Results: 1110



#Item
341Hacking / Military technology / Cyberwarfare / Military science / War / Computer security / Intelligence Advanced Research Projects Activity / International Multilateral Partnership Against Cyber Threats / U.S. Department of Defense Strategy for Operating in Cyberspace / Security / Computer crimes / Electronic warfare

ADI TECHNOLOGIES Predicting Cyber Attacks through Interaction and Actor Behavior Modeling and Event Detection in Dark Web, Black Market and Underground Forums Battelle Cyber Innovations [removed]

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2015-03-09 11:19:44
342Alarms / Burglar alarm / Smoke detector / Motion detector / Wi-Fi / Safety / Security / Prevention

Press release Videofied made by RSI Video Technologies is proud to announce the launch of three new products: a new panel, the W panel and two cameras, the OMV an outdoor residential camera and the ISMV a streaming camer

Add to Reading List

Source URL: www.videofied.com

Language: English - Date: 2015-03-09 10:51:24
343Cloud computing / Body area network / Privacy / Wireless sensor network / Computing / Wireless networking / Ethics / Technology

International Journal of Distributed Sensor Networks Special Issue on Security and Privacy in Cloud-Assisted IoT Networks CALL FOR PAPERS With recent advancements in networking technologies, some new emerging sensing

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-12-25 04:40:02
344Aspect-oriented programming / Crime prevention / National security / Computer security / Aspect-oriented software development / Spring Framework / Information security / Vulnerability / InterTrust Technologies / Software development / Security / Computing

2nd issue of the INTER-TRUST Newsletter The INTER-TRUST mission is to answer to the needs of developers, integrators, operators and users and develop and interoperate systems in a secure trusted manner in today’s heter

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2014-04-01 03:12:26
345Infrastructure / Technology / Computer network security / Wireless networking / Wireless sensor network / SCADA / Critical infrastructure protection / Computer security / Embedded system / National security / Security / United States Department of Homeland Security

International Journal of Distributed Sensor Networks Special Issue on Critical Infrastructure Protection Technologies: Advances, Trends, and Open Issues CALL FOR PAPERS

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-11-19 04:13:37
346Battelle Memorial Institute / Electronic warfare / Hacking / Military technology / Military science / United States Cyber Command / Malware / Computer security / Threat / Computer network security / Cyberwarfare / Security

Battelle Cyber Innovations Research Areas Cyber Command and Control Technologies

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2015-03-09 11:19:44
347Alarm Call / Alarm devices / Elevator / Burglar alarm / Autodialer alarm / Safety / Security / Alarms

Innovative Technologies in Custom Electronic Design & Manufacturing General Description The VD-6300-MCS Freeze Alarm monitors temperature, power status, security or an external contact, and offers remote switch control

Add to Reading List

Source URL: www.protectedhome.com

Language: English - Date: 2009-01-19 14:25:10
348Education / Security / Employment / Human resource management / Recruitment / European Union / Information and communication technologies in education / Diploma in Digital Applications / Information security / Information technology / Communication / Technology

SINGLE RESOLUTION BOARD VACANCY NOTICE ICT SECURITY OFFICER (SRB/AD[removed]Type of contract Function group and grade

Add to Reading List

Source URL: srb.europa.eu

Language: English - Date: 2015-03-30 05:30:04
349Burglar alarm / Dialer / Telephone / Business telephone system / Answering machine / Auto dialer / Telephony / Security / Technology

Innovative Technologies in Custom Electronic Design & Manufacuturing General Description The VD-5100-SM Voice Dialer monitors an external dry contact such as a motion detector and power status. Upon an alarm condition,

Add to Reading List

Source URL: www.protectedhome.com

Language: English - Date: 2009-01-19 14:25:05
350Crime prevention / Surveillance / Privacy / French words and phrases / Sousveillance / Radio-frequency identification / Mass surveillance / Katherine Albrecht / Steve Mann / Security / National security / Technology

Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies M.G. Michael University of Wollongong, Australia

Add to Reading List

Source URL: wearables.blu.org

Language: English - Date: 2013-12-23 11:49:31
UPDATE