Cyber

Results: 13321



#Item
191

SEMINAR Convergent Quantitative Cyber Risk Assessment to Optimize Mining Enterprise Reliability Presented by

Add to Reading List

Source URL: cosmo.mcgill.ca

Language: English - Date: 2018-06-01 15:50:31
    192

    Cyber-Terrorism and the Private Sector: Responses and Liabilities Moderator: Professor Karen J. Greenberg, Fordham Law School Panelists:

    Add to Reading List

    Source URL: www.ca2.uscourts.gov

    Language: English - Date: 2015-06-10 15:39:16
      193

      Internet Governance Forum Hyderabad, India Dimensions of Cyber-security and Cyber-crime 4 DecemberNote: The following is the output of the real-time captioning taken during Third Meeting of the IGF,

      Add to Reading List

      Source URL: www.ciberdelincuencia.org

      Language: English - Date: 2008-12-13 15:25:14
        194

        Research Publication NoTechnology, Terrorism, and the Fishbowl Effect: An Economic Analysis of Surveillance and Searches

        Add to Reading List

        Source URL: cyber.harvard.edu

        Language: English - Date: 2003-06-23 19:43:33
          195

          ● Controlling Internet Content: Implications for CyberCyber-Speech International Conference on Freedom of Expression in Cyberspace

          Add to Reading List

          Source URL: www.cyber-rights.org

          Language: English - Date: 2016-08-23 02:45:12
            196

            Master of Thesis Academic Year 2013 Improving transmission performance with one-sided datacenter TCP Midori Kato Graduate School of Media and Governance (Cyber Informatics)

            Add to Reading List

            Source URL: eggert.org

            Language: English - Date: 2014-02-10 03:31:56
              197

              Vision and Context • Modern technology platforms combine complex human decisions with rapid online computation and data processing. Online markets, crowdsourcing platforms Auctions Smart services in Cyber-Physical Syst

              Add to Reading List

              Source URL: www.eecs.mit.edu

              - Date: 2017-05-26 12:59:54
                198

                Survey of IPv6 Transition Technologies for Security Analysis Gábor LENCSE†,‡, and Youki KADOBAYASHI† †Laboratory for Cyber Resilience, Nara Institute of Science and TechnologyTakayama, Ikoma, Nara, 630-0

                Add to Reading List

                Source URL: www.hit.bme.hu

                Language: English - Date: 2017-07-18 08:01:06
                  199

                  Information-Acquisition-as-a-Service for Cyber-Physical Cloud Computing∗ Silviu S. Craciunas Andreas Haas Christoph M. Kirsch Hannes Payer ¨ Harald Rock Andreas Rottmann Ana Sokolova Rainer Trummer Department of Compu

                  Add to Reading List

                  Source URL: www.cs.uni-salzburg.at

                  Language: English - Date: 2018-07-24 07:01:05
                    200

                    ASSESSING SECURITY RISK FOR WIRELESS SENSOR NETWORKS UNDER CYBER ATTACK Brian Yarbrough Neal Wagner

                    Add to Reading List

                    Source URL: ccl.northwestern.edu

                    Language: English - Date: 2018-05-15 12:56:11
                      UPDATE