Security analysis

Results: 6956



#Item
131Transport / Geography of Michigan / Michigan / Lake Superior Circle Tour / Lake Huron Circle Tour / NEXUS / United States Department of Homeland Security / Sault Ste. Marie International Bridge / Sault Ste. Marie /  Ontario / Sault Ste. Marie /  Michigan / Sault / Right- and left-hand traffic

2015 Origin and Destination Study International Bridge Prepared by: Statewide and Urban Travel Analysis Section Michigan Department of Transportation

Add to Reading List

Source URL: www.saultbridge.com

Language: English - Date: 2015-06-23 19:20:33
132Economy / Risk / Probability / Actuarial science / Single Audit / Public finance / Project management / Security / Risk management / Risk assessment / Self-assessment

Denali Commission Recipient Self Assessment Risk Analysis Recipient: _____________________________________________________________________ Project: _______________________________________________________________________

Add to Reading List

Source URL: www.denali.gov

Language: English - Date: 2015-12-22 13:20:00
133Computer security / Government / Security / Cyberwarfare / United States Department of Homeland Security / National security / Cybercrime / NH-ISAC / Cyber-security regulation / United States Computer Emergency Readiness Team / National Cybersecurity Center of Excellence / Food and Drug Administration

FDA CENTER FOR DEVICES & RADIOLOGICAL HEALTH (CDRH), NATIONAL HEALTH INFORMATION SHARING ANALYSIS CENTER (NH-ISAC), THE DEPARTMENT OF HEALTH AND HUMAN SERVICES (HHS), AND

Add to Reading List

Source URL: www.fda.gov

Language: English
134New York City Police Department / Law enforcement / Security / Computing / Real Time Crime Center / Raymond Kelly / CompStat / Closed-circuit television / Data center / 1 Police Plaza / Area Police/Private Security Liaison / Data warehouse

Developing the NYPD’s Information Technology “The democratization of data has become the central theme of the NYPD’s technology planning and future: the concept of placing information, real-time analysis, and intel

Add to Reading List

Source URL: www.nyc.gov

Language: English - Date: 2015-06-25 12:31:37
135Computing / Data mining / Anomaly detection / Data security / Data / Cloud computing / NetCDF / Anomaly / Data analysis

Improving Oceanographic Anomaly Detection Using High Performance Computing Thomas Huang, Ed Armstrong, George Chang, Toshio Chin, Brian Wilson, Tong (Tony) Lee, Victor Zlotnicki. Jorge Vazquez and Michelle Gierach Jet Pr

Add to Reading List

Source URL: sccoos.org

Language: English - Date: 2015-05-13 15:32:26
136Software / Computing / System software / Debugging / System Management Mode / Rootkit / Debugger / In-circuit emulation / Hypervisor / Malware analysis / Breakpoint / QEMU

2015 IEEE Symposium on Security and Privacy Using Hardware Features for Increased Debugging Transparency Fengwei Zhang1 , Kevin Leach2 , Angelos Stavrou1 , Haining Wang3 , and Kun Sun1 1

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:00
137Identity management / Law / Privacy / Internet privacy / Pi / Analysis

BetterTimes Privacy-assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields Per Hallgren 1 Martín Ochoa 2,3

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
138Food and drink / Natural environment / Biology / Systems thinking / Futurology / Risk / Scenario analysis / Food security / Intergovernmental Panel on Climate Change / Agriculture / Sustainability

AGRIMONDE TERRA COUVsans irat

Add to Reading List

Source URL: www.cirad.fr

Language: English - Date: 2016-06-27 12:12:01
139Nuclear technology / Manhattan Project / Nuclear weapons / Nuclear physics / Science and technology in the United States / Lawrence Livermore National Laboratory / Plutonium / Nuclear materials / Chemistry and Metallurgy Research Replacement Facility / Pit / National Nuclear Security Administration / Stockpile stewardship

GAO, DOE Project Management: NNSA Needs to Clarify Requirements for Its Plutonium Analysis Project at Los Alamos

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2016-08-15 18:09:05
140Security / Espionage / Prevention / National security / Intelligence analysis / Military intelligence / Crime prevention / Cryptography / Counterintelligence / Computer security / International Traffic in Arms Regulations / Central Intelligence Agency

DOC Document

Add to Reading List

Source URL: www.wrc.noaa.gov

Language: English - Date: 2006-12-26 13:04:28
UPDATE