Search

Showing total 41 results

Search Constraints

Start Over You searched for: Topic international security Remove constraint Topic: international security Publisher ieee Remove constraint Publisher: ieee
41 results

Search Results

1. ACM CCS 2016 Interviews, Part 2.

2. Systematic Mapping Study of Security in Multi-Embedded-Agent Systems

3. Understanding the Strategic Implications of the Weaponization of Artificial Intelligence

4. The Rise of the Regionals: How Regional Organisations Contribute to International Cyber Stability Negotiations at the United Nations Level

5. Developing collaborative and cohesive cybersecurity legal principles

7. A multi-perspective methodology for evaluating the security maturity of data centers

8. Enforcement of global security policies in federated cloud networks with virtual network functions

9. Network and system management object modeling for smart grid infrastructure

10. Best practices against insider threats for all nations

11. The role of pulsed power in international security and counterterrorism

12. Weaponization of space-a structure for decision

13. An Ontology to Promote Interoperability between Cyber-physical Security Systems in Critical Infrastructures

14. Security Compliance in Agile Software Development: A Systematic Mapping Study

15. Application of genetic algorithm for optimization of NQR signal detection

16. Online Allocation of Cloud Resources Based on Security Satisfaction

17. International security competition and debates on state sovereignty in the cyberspace and suggest plausible means

18. Optimal Machine Learning Algorithms for Cyber Threat Detection

19. Software and Malware Capabilities: Opinions on (Inter)national Security

20. MTCS for Healthcare

21. Physical model for B92-QKD authentication based on analogy with optical chaotic systems

22. Cyberwar, Netwar, and the future of Cyberdefense

23. Threats to Peace: Threat Perception and the Persistence or Desistance of Violent Conflict

24. A view to SASEBO project

25. A NNEC-compliant approach for a Future Mission Network

26. Cloud calculus: Security verification in elastic cloud computing platform

27. The Geopolitical Web: Assessing societal risk in an uncertain world

28. Governance Life Cycle Framework for Managing Security in Public Cloud: From User Perspective

29. The MIT deliberatorium: Enabling large-scale deliberation about complex systemic problems

30. Research on the architecture of vulnerability discovery technology

31. Security Standards Perspective to Fortify Web Database Applications from Code Injection Attacks

32. Regulatory and transparency environments and security concerns: A study involving global financial services institutions

33. Design of Objects Sharing Mechanism with Security Domain in Java Smart Card

34. I-GEMS and Global Security

35. Formation flight: evaluation of autonomous configuration control algorithms

36. Evaluating the conformity of an access control architecture for Virtual Organizations with ISO/IEC 17799

37. NIS08-1: A Multi-level Security Based Autonomic Parameter Selection Approach for an Effective and Early Detection of Internet Worms

38. Innovative Security Assessment During the Facility Design Stage: Protecting People, Assets and the Marine Environment in the Gulf of Paria, Venezuela

39. The changing world, the changing nature of conflicts: a critical role for military radar

40. A space roadmap for the 21/sup st/ century aerospace force

41. An architecture for securing federated cloud networks with Service Function Chaining