Security analysis

Results: 6956



#Item
561Systems engineering / Safety / Costs / Cost–benefit analysis / ALARP / Risk analysis / Reliability engineering / Derailment / Science / Risk / Rail transport / Security

Theme [SSTDevelopment of the Future Rail System to Reduce the Occurrences and Impact of Derailment Development of the Future Rail Freight System to Reduce the Occurrences and Impact of Derailment

Add to Reading List

Source URL: www.d-rail-project.eu

Language: English - Date: 2015-03-23 10:52:36
562Security / National security / Computer security / Industrial automation / SCADA / Security engineering / Remote Terminal Unit / Critical infrastructure protection / Industrial control system / Telemetry / Technology / Computer network security

FP7-SECProjectCyber-security on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures D4.2 - Automatic Reaction Strategies and RTU

Add to Reading List

Source URL: www.cockpitci.eu

Language: English - Date: 2015-04-04 09:28:29
563Politics of Iran / Iran and weapons of mass destruction / Government / Sanctions against Iran / Barack Obama / Institute for Science and International Security / Two-state solution / Nuclear program of Iran / Benjamin Netanyahu / Iran / Iran–United States relations / Politics

The US and Us: The Mitvim-DC Monthly Volume 3, Issue 6, June 2015 The US and Us: The Mitvim-DC Monthly is a monthly report on US-Middle East issues. Each report includes an analysis, a roundup of commentaries, and a prof

Add to Reading List

Source URL: www.mitvim.org.il

Language: English - Date: 2015-06-03 23:02:37
564

The Science of Security Provable Security in the Real World Provable security plays an important role in the design and analysis of systems using cryptography. However,

Add to Reading List

Source URL: www.ibiblio.org

Language: English - Date: 2011-11-15 16:55:16
    565Public-key cryptography / Categorical data / Electronic commerce / Logistic regression / XTR / Linear regression / RSA / Paillier cryptosystem / Mental poker / Statistics / Regression analysis / Econometrics

    2015 IEEE CS Security and Privacy Workshops Privacy-Preserving Statistical Analysis by Exact Logistic Regression David A. duVerle∗† , Shohei Kawasaki‡ , Yoshiji Yamada§ , Jun Sakuma‡¶ and Koji Tsuda∗

    Add to Reading List

    Source URL: www.genopri.org

    Language: English - Date: 2015-05-21 15:25:23
    566Energy economics / Renewable electricity / Climate change policy / Carbon finance / Renewable portfolio standard / Low-carbon fuel standard / American Clean Energy and Security Act / Carbon offset / Sustainable energy / Environment / Energy / Low-carbon economy

    Highlights of recent US climate policy analysis at Brookhaven National Lab: Thomas Alfstad ETSAP workshop

    Add to Reading List

    Source URL: iea-etsap.org

    Language: English - Date: 2010-11-10 01:41:29
    567Passport / European Union / Identity document / Biometric passport / Canadian passport / Security / Government / Identification

    Statewatch Analysis The Legality of the Regulation on EU Citizens’ Passports [Updated 26 NovemberIntroduction The following analysis is updated from a spring 2004 analysis of the legality of the

    Add to Reading List

    Source URL: www.identificatieplicht.nl

    Language: English - Date: 2005-10-20 10:41:38
    568Crime prevention / Surveillance / Law enforcement / Closed-circuit television / Multiple-camera setup / Affective computing / Security / National security / Public safety

    CALL FOR PAPERS IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY Special Issue on Group and Crowd Behavior Analysis for Intelligent Multi-camera Video Surveillance Despite significant progress in human beha

    Add to Reading List

    Source URL: tcsvt.polito.it

    Language: English - Date: 2015-05-25 15:22:11
    569Data security / Symantec / Nortel / Information security / ActivIdentity / Verisign / Electronic business / Anakam / Two-factor authentication / Computing / Security / Business

    eSecure Systems, LLC Data as of    Business Analysis

    Add to Reading List

    Source URL: www.equitynet.com

    Language: English - Date: 2015-06-24 18:29:03
    570

    Inference and Analysis of Formal Models of Botnet Command and Control Protocols Chia Yuan Cho Domagoj Babi´c

    Add to Reading List

    Source URL: security.cs.berkeley.edu

    Language: English - Date: 2010-08-06 19:08:26
      UPDATE