Cyber

Results: 13321



#Item
631Security / Business / Economy / Cyberwarfare / Cybercrime / Computer network security / Computer security / Cryptography / National security / Certified Information Systems Security Professional / Arms industry / Cyber-security regulation

MarchJob Market Intelligence: Report on the Growth of Cybersecurity Jobs Matching People

Add to Reading List

Source URL: burning-glass.com

Language: English - Date: 2015-06-22 20:11:05
632Security / Computing / Prevention / Computer network security / Crime prevention / Cryptography / Information governance / National security / Capture the flag / Information security / Vulnerability / Computer security

Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise ∗ Joseph Werther, Michael Zhivich, Tim Leek MIT Lincoln Laboratory POC:

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:25
633Security / Education / Education policy / Science education / Cybercrime / National security / Science and technology / Science /  technology /  engineering /  and mathematics / Computer security / Draft:Nancy Conrad

For immediate Release Wednesday, March 26 U.S. News STEM Solutions National Leadership Conference partners with LifeJourney to bring Cyber Security to America’s Schools Technology enables students to test drive their f

Add to Reading List

Source URL: usnewsstemsolutions.com

Language: English - Date: 2014-03-26 12:05:41
634

„Hacker“ als Berufsbild Das Projekt „Cyber Security Challenge Germany“ Prof. Dr. (TU NN) Norbert Pohlmann

Add to Reading List

Source URL: norbert-pohlmann.com

Language: German - Date: 2016-03-18 09:54:52
    635Game theory / Search game / Hide-and-seek / Extensive-form game / Strategy / Random walk / Mathematics / Mathematical analysis

    Playing Hide-and-Seek: An Abstract Game for Cyber Security Martin Chapman Gareth Tyson

    Add to Reading List

    Source URL: www.eecs.qmul.ac.uk

    Language: English - Date: 2015-04-27 11:46:30
    636Security / Logic / Non-classical logic / Philosophical logic / Planar graphs / Platonic solids / W5 / Cyber-physical system / Computer security / Modal logic / Symbol / Regular icosahedron

    A Multiple Security Domain Model of a Drive-by-Wire System

    Add to Reading List

    Source URL: cs.mst.edu

    Language: English - Date: 2015-04-03 16:07:48
    637

    U svijetu cyber incidenti sve veća prijetnja kompanijama, u Hrvatskoj krađa i korupcija Potencijalni rizici s kojima se suočavaju kompanije na globalnoj razini uvelike se mijenjaju ugodini. Dok su kompanije man

    Add to Reading List

    Source URL: www.sigurnostnainternetu.hr

    Language: Croatian - Date: 2016-01-14 21:36:43
      638Computing / Software / Application software / Scientific method / Salvatore J. Stolfo / User / Milgram experiment / Statistics / ROOT / Internet privacy / Data analysis / Windows Vista

      On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University

      Add to Reading List

      Source URL: static.usenix.org

      Language: English - Date: 2011-07-08 13:42:25
      639Security / Prevention / Safety / Cyberwarfare / Cybercrime / National security / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computer security / Risk management / Phil Agcaoili / Phil Reitinger

      UNIVERSITY OF CALIFORNIA, ACADEMIC SENATE BERKELEY • DAVIS • IRVINE • LOS ANGELES • MERCED • RIVERSIDE • SAN DIEGO • SAN FRANCISCO J. Daniel Hare Telephone: (

      Add to Reading List

      Source URL: senate.universityofcalifornia.edu

      Language: English - Date: 2016-06-02 11:04:16
      640Security / Cyberwarfare / Computer security / Cybercrime / Hacking / National security / Cooperative Cyber Defence Centre of Excellence / Cyber-attack / Stuxnet / Jason Healey / Mandiant / Jeffrey Carr

      Software Manufacturer Liability JEFFREY CARR RESPONSIBLE ATTRIBUTION: A PREREQUISITE FOR ACCOUNTABILITY

      Add to Reading List

      Source URL: ccdcoe.org

      Language: English - Date: 2016-08-12 06:44:11
      UPDATE