Cyber

Results: 13321



#Item
991DATASHEET  SQRRL ENTERPRISE USE CASE: USER AND ENTITY BEHAVIOR ANALYTICS (UEBA) Find Deeper Meaning by Cutting Through the Noise

DATASHEET SQRRL ENTERPRISE USE CASE: USER AND ENTITY BEHAVIOR ANALYTICS (UEBA) Find Deeper Meaning by Cutting Through the Noise

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2016-04-01 17:08:54
992Gebruik van beveiligingsadviezen van het Nationaal Cyber Security Centrum Thematisch inspectieonderzoek Gebruik van beveiligingsadviezen van het Nationaal Cyber Security Centrum

Gebruik van beveiligingsadviezen van het Nationaal Cyber Security Centrum Thematisch inspectieonderzoek Gebruik van beveiligingsadviezen van het Nationaal Cyber Security Centrum

Add to Reading List

Source URL: www.ncsc.nl

Language: Dutch - Date: 2015-10-13 09:07:39
    993SUPERSTORM SANDY: IMPLICATIONS FOR DESIGNING A POST‑CYBER ATTACK POWER RESTORATION SYSTEM Paul Stockton  Copyright © 2016 The Johns Hopkins University Applied Physics Laboratory LLC. All Rights Reserved.

    SUPERSTORM SANDY: IMPLICATIONS FOR DESIGNING A POST‑CYBER ATTACK POWER RESTORATION SYSTEM Paul Stockton Copyright © 2016 The Johns Hopkins University Applied Physics Laboratory LLC. All Rights Reserved.

    Add to Reading List

    Source URL: www.jhuapl.edu

    Language: English - Date: 2016-03-29 09:30:55
    994Secure Information Sharing for Cyber Response Teams  Cyber Incident Response Models and Platforms for Information and Resource Sharing UTSA Team Ram Krishnan, Assistant Professor (ECE)

    Secure Information Sharing for Cyber Response Teams Cyber Incident Response Models and Platforms for Information and Resource Sharing UTSA Team Ram Krishnan, Assistant Professor (ECE)

    Add to Reading List

    Source URL: profsandhu.com

    Language: English - Date: 2014-10-08 23:39:20
      9952015 CYBER SECURITY SURVEY: MAJOR AUSTRALIAN BUSINESSES 2015 PROTECTING OUR NATIONAL INTERESTS ONLINE

      2015 CYBER SECURITY SURVEY: MAJOR AUSTRALIAN BUSINESSES 2015 PROTECTING OUR NATIONAL INTERESTS ONLINE

      Add to Reading List

      Source URL: www.acsc.gov.au

      Language: English - Date: 2015-12-13 17:33:06
        996CYBER-­‐ShARE	
    Center	
  of	
  Excellence	
   Sharing	
  Resources	
  to	
  Advance	
  Research	
  and	
  Educa)on	
  through	
  Cyber-­‐infrastructure	
  

        CYBER-­‐ShARE   Center  of  Excellence   Sharing  Resources  to  Advance  Research  and  Educa)on  through  Cyber-­‐infrastructure  

        Add to Reading List

        Source URL: cahsi.cs.utep.edu

        Language: English - Date: 2015-09-16 12:16:51
          997Institute for Cyber Security  Authorization and Trust in the Cloud Prof. Ravi Sandhu Executive Director and Endowed Chair USECSW

          Institute for Cyber Security Authorization and Trust in the Cloud Prof. Ravi Sandhu Executive Director and Endowed Chair USECSW

          Add to Reading List

          Source URL: profsandhu.com

          Language: English - Date: 2013-05-28 03:58:54
            998Social Media & Cyber-Racism Monash, IEEE Computer Society & IEEE Society on Social Implications of Technology present: Date: 25 February 2014 Time:

            Social Media & Cyber-Racism Monash, IEEE Computer Society & IEEE Society on Social Implications of Technology present: Date: 25 February 2014 Time:

            Add to Reading List

            Source URL: sites.ieee.org

            Language: English - Date: 2015-02-05 04:52:41
              999Cyber Value at Risk in the Netherlands 10 billion value lost through cyber risk in The Netherlands

              Cyber Value at Risk in the Netherlands 10 billion value lost through cyber risk in The Netherlands

              Add to Reading List

              Source URL: www.thehaguesecuritydelta.com

              Language: English - Date: 2016-04-07 04:23:58
                1000Institute for Cyber Security  Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security

                Institute for Cyber Security Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security

                Add to Reading List

                Source URL: profsandhu.com

                Language: English - Date: 2015-04-15 02:00:23