IOC

Results: 2147



#Item
961Director of National Intelligence / Computer security / Government / Engineering / Intelligence Advanced Research Projects Activity / Security / Disruptive Technology Office / Institute of Electrical and Electronics Engineers

NICIAR: Pursuing Disruptive Technologies for Information Assurance Carl E. Landwehr, Ph.D. Chief of the Cyber Access and Protection Division of the Disruptive Technology Office under the Director of National Intelligence

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-09 12:51:08
962Systems biology / Reactome / Statistical inference / Bioengineering / Psychometrics / Bioinformatics / Scientific method / Theory / Statistical hypothesis testing / Science / Biological databases / Knowledge

Robustness and Adaptation in "Information Ecosystems" Stephen Racunas Christopher Griffin “Cross-Disciplinary Cross-Pollination”

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-11 16:28:12
963Embedded system / Physical Unclonable Function / Trusted Computing / Key generation / Cyberwarfare / Computer security / Electronic engineering / SiliconBlue Technologies / Secure cryptoprocessor / Cryptography / Key management / Field-programmable gate array

1 Hardware/Software Security Support R. R. Brooks, Associate Professor S. T. Sander, Assistant professor Holcombe Department of Electrical and Computer Engineering

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-09 15:36:30
964Field-programmable gate array / Advanced Encryption Standard / Parallel computing / Research / Battelle Memorial Institute / Manhattan Project / Oak Ridge National Laboratory

Integrated Hardware/Software Security Support R. R. Brooks Sam T. Sander Associate Professor Assistant Professor

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-20 13:18:12
965Computer forensics / Mobile device forensics / Proactivity / Forensic science / Law enforcement / Knowledge / Department of Defense Cyber Crime Center / Digital forensics / Information technology audit / Computer security

Microsoft PowerPoint - Bradford.ppt

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-12 21:43:36
966Measurement / Industrial automation / SCADA / Remote Terminal Unit / Critical infrastructure protection / Power line communication / Electric power system / Open Systems International / Power system automation / Telemetry / Technology / Electric power

Louis Wilder Los Alamos National Laboratory CODE --a Tool to Solve Unobservable Elements of Electric Power and SCADA Networks This presentation describes a major Los

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-03-29 10:40:08
967Software development / Systems science / Design for X / Materials science / Reliability engineering / Mean time between failures / Specification / Requirement / Failure / Survival analysis / Systems engineering

Measuring Dependability as a Mean Failure Cost Ali Mili, College of Computing Science, New Jersey Institute of Technology, Newark NJ[removed]removed] April 2, 2007

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-02 07:26:10
968Failure / Materials science / Reliability engineering / Survival analysis / Systems science / Requirement / Kenmore Air Harbor / R1 / Systems engineering / Software development / Design for X

Measuring Dependability as Mean Failure Cost Ali Mili, NJIT Frederick Sheldon, ORNL CSIIRW, May 2007

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2009-01-21 12:11:03
969Information Risk Management / Risk management / Department of Defense Information Technology Security Certification and Accreditation Process / Risk / Information assurance / Parameter / Rader / Vulnerability / Grace Communion International / Computer security / Management / Ethics

The Rader Network Joint Institute for Computational Sciences

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-22 09:55:12
970Computer network security / Virtualization / Operating system / Hypervisor / Computer security / Server / Distributed computing / Multilevel security / Active Directory / System software / Computing / Security

Trusted Passages: Managing Distributed Trust Needs of Emerging Applications Mustaque Ahamad, Martim Carbone, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne, Karsten Schwan and Ramesh Viswanath School of Computer S

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-23 15:32:15
UPDATE