and Security Technologies

Results: 1110



#Item
51Sustainable urban planning / Economics / Internet of Things / Energy / Emerging technologies / Electric power / Economic development / Public policy / Smart city / Smart meter / Smart Nation / Smart system

CREATe Working PaperDecemberPrivacy, Security and Data Protection in Smart Cities: a Critical EU Law Perspective Author

Add to Reading List

Source URL: zenodo.org

Language: English - Date: 2015-12-03 04:34:33
52United Nations / Pakistan military presence in other countries / Government of Pakistan / Emerging technologies / Avionics / Embedded systems / Robotics / Organization for Security and Co-operation in Europe / Unmanned aerial vehicle / Drone strikes in Pakistan / Peacekeeping / Unmanned combat aerial vehicle

CHAPTER 8: DRONES AND THE PROTECTION OF HUMAN RIGHTS KONSTANTIN KAKAES This chapter asks how drones are being used to protect people’s “life, liberty and security”—the first rights set

Add to Reading List

Source URL: drones.newamerica.org

Language: English - Date: 2016-07-05 15:22:49
53Cyberwarfare / Denial-of-service attacks / Internet Relay Chat / Computer network security / Security / Computing / Denial-of-service attack / DDoS mitigation / Computer security / Prolexic Technologies

DDoS Attack Mitigation Service Terms and Conditions The Sure DDoS Attack Mitigation Service provides the Customer with a solution to help protect the Customer site against Distributed Denial of Service (DDoS) attacks by

Add to Reading List

Source URL: web.sure.com

Language: English - Date: 2015-10-01 03:02:11
54Electric power / Energy / Emerging technologies / Smart grid / Physical universe / Distributed generation / Microgrid / Energy industry / Electrical grid / Smart grid in the United States / Smart grid policy in the United States

CEPSI 2016 Theme : "Energy Sustainability and Security : Choices and Challenges for Power Supply Industry" CATEGORIES A.

Add to Reading List

Source URL: www.cepsi2016bangkok.org

Language: English - Date: 2016-05-26 21:40:19
55Computing / Denial-of-service attacks / Cyberwarfare / Business / Internet Relay Chat / Technology / Denial-of-service attack / Content delivery network / Prolexic Technologies / Fortinet / Akamai Technologies / Sourcefire

Corero Network Security plc Results for the year ended 31 December 2013 Ashley Stephenson, CEO Andrew Miller, CFO and COO

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2014-07-15 12:06:30
56Algebra / Mathematics / Polynomials / Computer algebra / Abstract algebra / Irreducible polynomial / Polynomial / Finite fields / Polynomial decomposition / Finite field arithmetic

MINISTRY OF EDUCATION AND SCIENCE OF THE REPUBLIC OF KAZAKHSTAN COMMITTEE OF SCIENCE INSTITUTE OF INFORMATION AND COMPUTATIONAL TECHNOLOGIES Information Security Laboratory

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:36:00
57Computing / Network architecture / Internet / Cryptographic protocols / Secure communication / Transport Layer Security / Internet protocols / Internet Standards / HTTPS / Opportunistic TLS / Email client / Simple Mail Transfer Protocol

Proceedings on Privacy Enhancing Technologies 2016; ):1–18 Shuai Li* and Nicholas Hopper Mailet: Instant Social Networking under Censorship

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2016-06-28 22:06:37
58Computing / Business / Computer networking / Technology / OpenFlow / Network architecture / Emerging technologies / Ethernet / OpenDaylight Project / ONOS / Network function virtualization / Cisco Systems

Supercharging SDN Security Takayuki Sasaki (NEC) Topics ▌ Control-plane security l Isolation and recovery

Add to Reading List

Source URL: www.ch-open.ch

Language: English - Date: 2016-06-16 13:14:14
59Cryptography / Emerging technologies / Data security / Public key infrastructure / Public-key cryptography / Internet privacy / Communications protocol / Smart grid / Privacy / Key management / Data Encryption Standard

Fault-Tolerant Privacy-Preserving Statistics Marek Jawurek and Florian Kerschbaum SAP Research Karlsruhe, Germany {marek.jawurek|florian.kerschbaum}@sap.com

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2012-07-15 10:28:51
60Software / Security / Embedded system / Systems engineering / Computer security / Mathcad / Mentor Graphics / AEgis Technologies / Mercury Systems

Technology Service Corporation an employee-owned company Systems Development and Production Division, 310 Voyager Way, Huntsville, ALwww.tsc.com

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2016-08-01 09:15:52
UPDATE