Conference on Security

Results: 2278



#Item
31International Atomic Energy Agency / Nuclear proliferation / International Nuclear Information System / Fax / Email / Technology / International relations / Nuclear energy / Nuclear program of Iran / Member states of the International Atomic Energy Agency

Form A CN-244 International Atomic Energy Agency Participation Form International Conference on Nuclear Security: Commitments and Actions

Add to Reading List

Source URL: www-pub.iaea.org

Language: English - Date: 2016-03-04 03:37:47
32Security / Technology / Information Innovation Office / Computer security / Artificial intelligence

The AAAI-16 Workshop on Artificial Intelligence for Cyber Security (AICS) February 12 or 13, 2016 Phoenix, Arizona, USA Part of the Association for the Advancement of Artificial Intelligence 2016 Conference

Add to Reading List

Source URL: www-bcf.usc.edu

Language: English - Date: 2015-09-12 20:36:52
33Computing / Evaluation / Relational database management systems / Dependability / Quality / Safety / Security / Database / Association for Computing Machinery / Computer science

Second Workshop on Dependable Distributed Data Management affiliated with EuroSys 2008 Conference March 31, 2008, Glasgow, Scotland http://gorda.di.uminho.pt/wdddm08/ Program Chairs

Add to Reading List

Source URL: gorda.di.uminho.pt

Language: English - Date: 2013-01-28 10:06:19
34Economy / Finance / Money / Pensions / Personal finance / Retirement plans in the United States / Defined contribution plan / 401 / Defined benefit pension plan / Employee Retirement Income Security Act

UNITED STATES SENATE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS EXAMINING CONFERENCE AND TRAVEL SPENDING ACROSS THE FEDERAL GOVERNMENT STATEMENT OF THE NATIONAL ASSOCIATION OF GOVERNMENT DEFINED CONTRIBUTION

Add to Reading List

Source URL: www.nagdca.org

Language: English - Date: 2014-05-20 15:03:24
35Emergency management / Disaster preparedness / Humanitarian aid / Safety / Prevention / Risk / Actuarial science / Security / World Conference on Disaster Risk Reduction / Disaster risk reduction / Social vulnerability / John Dramani Mahama

Microsoft Word - veepspeech.sendai.doc

Add to Reading List

Source URL: www.preventionweb.net

Language: English - Date: 2015-03-17 03:19:47
36Security / Prevention / Identity management / Law / Privacy / Milind Tambe / Internet privacy / Computer security / Mathematical optimization / Resilient control systems

7th Conference on Decision and Game Theory for Security – GameSec 2016 New York, NY, USA Recent advances in information and communication technologies pose significant security challenges that impact all aspects of mod

Add to Reading List

Source URL: www.gamesec-conf.org

Language: English - Date: 2016-08-07 16:15:36
37Natural environment / Academia / Ethics / Environmental protection / Ecocide / Environmentalism / Environmental justice / Earth Law Center / Human rights / Environmental law / Public international law / Human security

“RIGHTS FOR THE EARTH” TOWARDS NEW INTERNATIONAL STANDARDS From November 30th to December 11th, during the COP21 (UN Convention on Climate Change Conference of Parties ofin Paris, the world’s nations will r

Add to Reading List

Source URL: www.endecocide.org

Language: English - Date: 2015-10-12 05:09:42
38Food and drink / Agronomy / Agriculture / Academia / Nexus / Sustainability / Water resource management / Food security / Agricultural engineering / Water /  energy and food security nexus / German Advisory Council on Global Change

POSITION PAPER – Extended Summary Bridging the Water and Food Gap: The Role of the Water-Energy-Food Nexus Rabi H. Mohtar, Amjad T. Assi and Bassel T. Daher Day 3 | Population Growth

Add to Reading List

Source URL: www.dresden-nexus-conference.org

Language: English - Date: 2016-03-14 09:35:10
39Ransomware / Malware / Cyberwarfare / Computer security / Cybercrime / Blackmail / Trojan horses / Computer virus / Antivirus software / PGPCoder / TeslaCrypt / CryptoLocker

2016 IEEE 36th International Conference on Distributed Computing Systems CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

Add to Reading List

Source URL: www.cise.ufl.edu

Language: English
40Economy / Money / Finance / Precious metals / Gold / Investment / Security / Gold as an investment / Bank / Inflation / The Gold (Control) Act / Gold standard

IIGC conference opening address Opening remarks • It gives me immense pleasure to be able to share a common platform with the dignitaries on the dais, friends and colleagues from the bullion industry and other particip

Add to Reading List

Source URL: www.goldconvention.in

Language: English - Date: 2015-08-28 08:16:07
UPDATE