Cyber University

Results: 576



#Item
61Cryptography / Email authentication / Cryptographic software / Mass surveillance / Internet privacy / Crypto Wars / Email encryption / Encryption / End-to-end encryption / BitLocker / National Security Agency / Surveillance

Foreword Just over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from aca

Add to Reading List

Source URL: cyber.law.harvard.edu

Language: English - Date: 2016-01-31 21:23:48
62

The PEl Framework for Application-Centric Security Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security University of Texas at San Antonio

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2010-02-01 12:42:50
    63

    A Repertory of Cyber Analogies Robert Axelrod Ford School of Public Policy, University of Michigan Emily O. Goldman and John Arquilla, eds., Cyber Analogies (Monterey, CA: Dept. of Defense Information Opera

    Add to Reading List

    Source URL: www-personal.umich.edu

    Language: English - Date: 2014-01-29 08:15:10
      64

      Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security Professor of Computer Science, College of Sciences www.p

      Add to Reading List

      Source URL: profsandhu.com

      Language: English - Date: 2016-01-19 19:26:32
        65

        Recent Neuroscience and Cognitive Research Findings on Cyber Learning Richard E. Clark Rossier School of Education Center for Cognitive Technology University of Southern California

        Add to Reading List

        Source URL: www.cogtech.usc.edu

        Language: English - Date: 2010-11-04 08:47:29
          66

          Classical Random Graphs with Unbounded Expected Degrees are Locally Scale-Free Yilun Shang Institute for Cyber Security, University of Texas at San Antonio, San Antonio, Texas 78249, USA Reprint requests to Y. S.; E-mail

          Add to Reading List

          Source URL: www.znaturforsch.com

          Language: English - Date: 2012-02-24 12:44:50
            67

            Lessons and Challenges in Health Care and Cyber Physical Systems Dan Siewiorek! Carnegie Mellon University! !

            Add to Reading List

            Source URL: conf.laas.fr

            Language: English - Date: 2012-10-19 11:14:13
              68Computing / Internet / Cryptography / Cybercrime / Internet Standards / Internet protocols / Cyberwarfare / National security / Denial-of-service attack / Computer security / Border Gateway Protocol / DNS spoofing

              Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1 , Armin Sarabi1 , Jing Zhang1 , Parinaz Naghizadeh1 Manish Karir2 , Michael Bailey3 , Mingyan Liu1,2 1 EECS Department, University of Michiga

              Add to Reading List

              Source URL: mdbailey.ece.illinois.edu

              Language: English - Date: 2015-08-05 18:31:26
              69Audio codecs / Computer file formats / MPEG / Graphics file formats / Video compression / Lossless compression / Linear predictive coding / Pulse-code modulation / MPEG-4 Part 3 / Audio Lossless Coding / Golomb coding / H.264/MPEG-4 AVC

              A Design of Lossless Compression for High-Quality Audio Signals Takehiro Moriya *, Dai Tracy Yang ** and Tilman Liebchen *** * NTT Cyber Space Labs., Tokyo, Japan ** University of Southern California, L

              Add to Reading List

              Source URL: elvera.nue.tu-berlin.de

              Language: English - Date: 2006-01-20 06:50:05
              70

              GUJARAT FORENSIC SCIENCES UNIVERSITY INSTITUTE OF FORENSIC SCIENCE M.TECH. CYBER SECURITY AND INCIDENT RESPONSE (SEM - II) RESULTS OF THE EXAMINATION HELD IN MAYREVISED) REGISTRATION NO.

              Add to Reading List

              Source URL: www.gfsu.edu.in

                UPDATE