Cyber

Results: 13321



#Item
112018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds © NATO CCD COE Publications, Tallinn  Permission to make digital or hard copies of thi

2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds © NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of thi

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2018-06-20 05:20:16
122010 International Conference on Distributed Computing Systems  Optimizing the Spatio-Temporal Distribution of Cyber-Physical Systems for Environment Abstraction Linghe Kong, Dawei Jiang, Min-You Wu Shanghai Jiao Tong Un

2010 International Conference on Distributed Computing Systems Optimizing the Spatio-Temporal Distribution of Cyber-Physical Systems for Environment Abstraction Linghe Kong, Dawei Jiang, Min-You Wu Shanghai Jiao Tong Un

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2015-04-14 12:01:50
13VeriPhy: Verified Controller Executables from Verified Cyber-Physical System Models Brandon Bohrer Yong Kiam Tan

VeriPhy: Verified Controller Executables from Verified Cyber-Physical System Models Brandon Bohrer Yong Kiam Tan

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2018-05-02 15:22:10
14Advances and Challenges of Quantitative Verification and Synthesis for Cyber-Physical Systems Marta Kwiatkowska Department of Computer Science, University of Oxford, UK Abstract—We are witnessing a huge growth of cyber

Advances and Challenges of Quantitative Verification and Synthesis for Cyber-Physical Systems Marta Kwiatkowska Department of Computer Science, University of Oxford, UK Abstract—We are witnessing a huge growth of cyber

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2016-09-02 06:46:32
15Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 13:01:38
16Blind in the Panopticon The decreasing marginal utility of access to information as an aspect of cyber policy The uncertain price of information There is no clear way, in the present, of deciding what information will be

Blind in the Panopticon The decreasing marginal utility of access to information as an aspect of cyber policy The uncertain price of information There is no clear way, in the present, of deciding what information will be

Add to Reading List

Source URL: files.howtolivewiki.com

Language: English - Date: 2014-04-16 01:17:19
17Rise of the HaCRS:Augmenting Autonomous Cyber Reasoning Systems with Human Assistance

Rise of the HaCRS:Augmenting Autonomous Cyber Reasoning Systems with Human Assistance

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:59
18NATO Cooperative Cyber Defence Centre of Excellence (the Centre) is a NATO-accredited International Military Organisation dealing with education, consultation, lessons learned, research and development in the field of cy

NATO Cooperative Cyber Defence Centre of Excellence (the Centre) is a NATO-accredited International Military Organisation dealing with education, consultation, lessons learned, research and development in the field of cy

Add to Reading List

Source URL: www.ccdcoe.org

Language: English - Date: 2018-02-21 05:17:56
19JUNIOR SCHOLAR AWARD The 9th International Conference on Cyber Conflict, focusing on the theme Defending the Core, invites junior scholars to submit Master’s theses for the Junior Scholar Award. The purpose of this CyC

JUNIOR SCHOLAR AWARD The 9th International Conference on Cyber Conflict, focusing on the theme Defending the Core, invites junior scholars to submit Master’s theses for the Junior Scholar Award. The purpose of this CyC

Add to Reading List

Source URL: ccdcoe.org

Language: English - Date: 2016-12-14 08:22:09
20Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 15:46:40