Cyber

Results: 13321



#Item
341

Formal Specification and Analysis of Robust Adaptive Distributed Cyber-Physical Systems ? Carolyn Talcott1 , Vivek Nigam2 , Farhad Arbab3 , and Tobias Kapp“e4 1 SRI International, Menlo Park, CA 94025, USA

Add to Reading List

Source URL: nigam.info

- Date: 2016-05-07 12:12:43
    342

    Shortlist (Cyber Lions) Cat. No Entry No

    Add to Reading List

    Source URL: www-assets.lionsfestivals.com

    - Date: 2016-07-22 04:56:40
      343

      Cyber-Physical Specification Mismatch Identification with Dynamic Analysis Taylor T. Johnson Stanley Bak

      Add to Reading List

      Source URL: www.taylortjohnson.com

      - Date: 2015-02-24 23:44:32
        344

        Winners (Cyber Lions) Cat. No Entry No

        Add to Reading List

        Source URL: www-assets.lionsfestivals.com

        - Date: 2016-07-22 04:56:36
          345

          KASPERSKY LAB REPORT Financial cyber threats in 2013 April 2014 Kaspersky Lab Report: Financial cyber threats in 2013

          Add to Reading List

          Source URL: cdn.press.kaspersky.com

          - Date: 2015-10-30 16:24:20
            346

            The Realities of Cyber Parenting: What Pre-teens & Teens Are Up To Online

            Add to Reading List

            Source URL: www.mcafee.com

            - Date: 2016-08-30 16:59:13
              347

              UNCLASSIFIED//FOR OFFICIAL USE ONLY Cyber Incident Reporting A Unified Message for Reporting to the Federal Government Cyber incidents can have serious consequences. The theft of private, financial, or other sensitive d

              Add to Reading List

              Source URL: info.publicintelligence.net

              - Date: 2016-11-05 18:57:20
                348

                September 8, 2016 cyber cybercybercyber cybercybercyber cybercybercyber

                Add to Reading List

                Source URL: www.openpgp-conf.org

                - Date: 2016-09-12 03:58:41
                  349

                  UNCLASSIFIED//FOR OFFICIAL USE ONLY Security Tip (ST16-001) Securing Voter Registration Data Original release date: September 15, 2016 Voter Registration Databases (VRDBs) present a unique target for cyber threat actors

                  Add to Reading List

                  Source URL: info.publicintelligence.net

                  - Date: 2016-11-05 18:57:19
                    350

                    Microsoft Word - Final Paper_ Cyber Security for IoT and M2M_25th Feb 2015

                    Add to Reading List

                    Source URL: riverpublishers.com

                    - Date: 2015-06-01 17:07:43
                      UPDATE