Cyber University

Results: 576



#Item
41

University of Birmingham Computer Science MSc in Cyber Security Semester One

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2015-10-06 10:34:23
    42Cyberwarfare / E-commerce / Cybercrime / National security / Information Security Group / Royal Holloway /  University of London / Cyber security standards / Computer security

    Microsoft Word - Cyber Security - Agenda V36.doc

    Add to Reading List

    Source URL: www.westminsterforumprojects.co.uk

    Language: English - Date: 2014-10-21 11:57:10
    43Internet privacy / Statistical theory / Cryptographic software / Degree of anonymity / Crypto-anarchism / Crowds / Anonymity / Philosophy of thermal and statistical physics / Mix network / Entropy / Information theory / Traffic analysis

    Measuring Relationship Anonymity in Mix Networks Vitaly Shmatikov and Ming-Hsiu Wang The University of Texas at Austin ABSTRACT Many applications of mix networks such as anonymous Web browsing require relationship anonym

    Add to Reading List

    Source URL: www.cyber-ta.org

    Language: English - Date: 2007-02-22 22:56:09
    44Cyberwarfare / Computer security / Cybercrime / National security / E-commerce / Stuxnet / Cyber-attack / Electronic chart display and information system / Cyber-Insurance

    Maritime Cyber Security for Navigation and Control Systems Ileana Driva MSc Cyber Security, University of Southampton 20 Duke Street, Southampton, UK SO14 3ET

    Add to Reading List

    Source URL: womencourage.acm.org

    Language: English - Date: 2016-08-09 09:13:39
    45Legal aspects of computing / Internet privacy / University of Geneva

    • Privacy Cyber-Law www.internetlaw-geneva.ch Fundamental Rights

    Add to Reading List

    Source URL: genevasummerschools.ch

    Language: English - Date: 2016-03-02 04:01:08
    46

    Project Outcomes CREST-Cyber-ShARE Center of Excellence-Phase I A Center for Sharing Resources through Cyberinfrastructures to Advance Science and Education The Cyber-ShARE Center of Excellence at the University of Texas

    Add to Reading List

    Source URL: cybershare.utep.edu

    Language: English - Date: 2015-02-24 09:03:33
      47

      Demo : Applications of the CPAL Language to Model, Simulate and Program Cyber-Physical Systems Loïc FEJOZ, Real-time-at-Work Nicolas NAVET, Sakthivel M. SUNDHARAM and Sebastian ALTMEYER, University of Luxembourg

      Add to Reading List

      Source URL: 2016.rtas.org

      Language: English - Date: 2016-04-20 10:44:35
        48Software / System software / Linux Foundation / University of Cambridge Computer Laboratory / Xen / Hypervisor / Scheduling / Hyper-V / VMware ESXi / Temporal isolation among virtual machines

        RT-­‐Xen:  Real-­‐Time  Virtualiza2on   from  embedded  to  cloud  compu2ng   Chenyang  Lu   Cyber-­‐Physical  Systems  Laboratory   Department  of  Computer  Scie

        Add to Reading List

        Source URL: www.cse.wustl.edu

        Language: English - Date: 2014-06-05 15:13:20
        49

        Fidelity-Aware Utilization Control for Cyber-Physical Surveillance Systems Jinzhu Chen1 ; Rui Tan1 ; Guoliang Xing1 ; Xiaorui Wang2 ; Xing Fu2 1 Michigan State University, USA; 2 University of Tennessee, USA Abstract Rec

        Add to Reading List

        Source URL: www.cse.msu.edu

        Language: English - Date: 2010-09-18 00:57:14
          50Robert Doisneau / Harvard College / The Kiss / Harvard University / Copyright law of the United States / Standardized tests

          Microsoft Word - Fisher_Copyright_2015_Final.docx

          Add to Reading List

          Source URL: cyber.law.harvard.edu

          Language: English - Date: 2015-12-14 10:19:47
          UPDATE