Cyber University

Results: 576



#Item
91

Interational Computer Science Institute & University of California, Berkeley Modeling Cyber-Insurance Towards a Unifying Framework ?

Add to Reading List

Source URL: weis2010.econinfosec.org

Language: English
    92

    The PEl Framework for Application-Centric Security Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security University of Texas at San Antonio

    Add to Reading List

    Source URL: www.profsandhu.com

    Language: English - Date: 2010-02-01 12:42:50
      93

      38th E-Seminar of the EASA Media Anthropology Network http://www.media-anthropology.net Working Paper “From Cyber to Digital Anthropology to an Anthropology of the Contemporary?” by Philipp Budka (University of Vienn

      Add to Reading List

      Source URL: www.media-anthropology.net

      Language: English - Date: 2011-12-12 05:45:14
        94

        Gossiping Components for Cyber-Physical Systems Tomas Bures1,2, Ilias Gerostathopoulos1, Petr Hnetynka1, Jaroslav Keznikl1,2, Michal Kit1, and Frantisek Plasil1 1Faculty of Mathematics and Physics, Charles University in

        Add to Reading List

        Source URL: d3s.mff.cuni.cz

        Language: English - Date: 2014-06-13 06:25:03
          95Technological change / Communication / Information technology / Ethology / Business / Theory of planned behavior / Technology acceptance model / Adoption / Diffusion of innovations / Marketing / Product management / Technology

          Technology Adoption and Use Theory Review for Studying Scientists’ Continued Use of Cyber-infrastructure Youngseek Kim School of Information Studies Syracuse University 221 Hinds Hall

          Add to Reading List

          Source URL: www.asis.org

          Language: English - Date: 2014-07-19 18:54:34
          96Component-based software engineering / Object-oriented programming / Cyber-physical system / System / Software architecture / Design / Software development process / Software engineering / Science / Structure

          DEECo: An Ecosystem for Cyber-Physical Systems Rima Al Ali, Tomas Bures, Ilias Gerostathopoulos, Petr Hnetynka, Jaroslav Keznikl, Michal Kit, Frantisek Plasil Charles University in Prague, Faculty of Mathematics and Phys

          Add to Reading List

          Source URL: d3s.mff.cuni.cz

          Language: English - Date: 2014-03-04 07:27:30
          97

          Timing analysis in low-latency mix networks: attacks and defenses ⋆ Vitaly Shmatikov and Ming-Hsiu Wang The University of Texas at Austin Abstract. Mix networks are a popular mechanism for anonymous Internet communica

          Add to Reading List

          Source URL: www.cyber-ta.org

          - Date: 2006-07-31 13:42:23
            98

            Knowledge discovery, Visual Analytics and Innovation in Social Computing workshop by Tallinn University of Technology Based on Master’s Programme in Software Engineering and Cyber Security Estonia is well known for its

            Add to Reading List

            Source URL: ttu.ee

            - Date: 2012-07-09 10:18:10
              99

              Ciphertext-Policy Attribute-Based Encryption John Bethencourt Carnegie Mellon University Amit Sahai

              Add to Reading List

              Source URL: www.cyber-ta.org

              Language: English - Date: 2007-03-24 01:06:06
                100

                Workshop on Cyber Security by Tallinn University of Technology Background: Cyber security is an area of growing strategic importance worldwide. Governments everywhere, but not only them, are trying to build up their resp

                Add to Reading List

                Source URL: ttu.ee

                Language: English - Date: 2012-07-09 10:18:13
                  UPDATE