Cyber

Results: 13321



#Item
301

Representative Selection with Structured Sparsity Hongxing Wang†,‡,§ , Yoshinobu Kawahara\,] , Chaoqun Weng§ , Junsong Yuan§ † Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of

Add to Reading List

Source URL: eeeweba.ntu.edu.sg

- Date: 2016-11-19 02:19:22
    302

    Data Privacy Rx May 26, 2015 Insuring Cyber Risk and Navigating through a Claim Elissa K. Doroff, Esq. Vice President, Underwriting and Product Manager

    Add to Reading List

    Source URL: www.frostbrowntodd.com

    - Date: 2015-06-02 16:56:46
      303

      25 DE ABRIL ZONA URBANA SÁBADO DE 20:30 A 00:30 H Centro Cívico Zona Sur LUDOJOVEN: JUEGOS DE MESA: DEPORTES Y CARRERAS CYBER ZONA DEPORTIVA: WII Y KINECT

      Add to Reading List

      Source URL: www.vallanoche.es

      - Date: 2015-02-26 11:44:58
        304

        Invariant Synthesis for Verification of Parameterized Cyber-Physical Systems with Applications to Aerospace Systems Taylor T. Johnson∗ University of Texas at Arlington, Arlington, TX 76010, USA

        Add to Reading List

        Source URL: www.taylortjohnson.com

        - Date: 2013-08-02 07:12:08
          305

          DAN WARD & ROBERT MORGUS Professor Cy Burr’s Graphic Guide to: INTERNATIONAL CYBER NORMS

          Add to Reading List

          Source URL: na-production.s3.amazonaws.com

          - Date: 2016-11-14 13:42:55
            306

            Cyber defence in the EU Preparing for cyber warfare? SUMMARY In recent years, cyber attacks on a serious scale have become a matter of concern to states, due to the threat they can pose to national security, but also a p

            Add to Reading List

            Source URL: www.europarl.europa.eu

            - Date: 2015-05-18 05:18:57
              307

              The Unmasking Option: A Thought Experiment James Grimmelmann Cyber Civil Rights Symposium University of Denver Sturm College of Law 20 November 2009

              Add to Reading List

              Source URL: james.grimmelmann.net

              - Date: 2014-12-30 08:35:37
                308

                FINALHLS.DOC – 10:19 AM COMMENTARIES THE LAW OF THE HORSE:

                Add to Reading List

                Source URL: cyber.harvard.edu

                - Date: 1999-12-03 13:28:42
                  309

                  Cyber Security Challenge UK pwc

                  Add to Reading List

                  Source URL: www.nicolascourtois.com

                  - Date: 2015-05-08 06:37:06
                    310

                    Secure Multiparty Computation for Cooperative Cyber Risk Assessment Kyle Hogan, Noah Luther, Nabil Schear, Emily Shen, David Stott, Sophia Yakoubov, Arkady Yerukhimovich MIT Lincoln Laboratory Emails: {kyle.hogan, noah.l

                    Add to Reading List

                    Source URL: cybersec-prod.s3.amazonaws.com

                    - Date: 2016-10-05 17:20:35
                      UPDATE