Skip to main content

Search results for "johns river"

Filters: Cybersecurity 31 ×
Viewing 1 - 20 of 20 results by relevance
Consensus Study Report

Critical Code: Software Producibility for Defense  (2010)

Consensus Study Report

Making the Nation Safer: The Role of Science and Technology in Countering Terrorism  (2002)

Consensus Study Report

Software for Dependable Systems: Sufficient Evidence?  (2007)

Proceedings

Recoverability as a First-Class Security Objective: Proceedings of a Workshop  (2018)

Consensus Study Report

Additional Observations on Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions: An Annex: Unclassified Abbreviated Version of a Classified Report  (2017)

Proceedings

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Proceedings

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop  (2017)

Guidebook on Best Practices for Airport Cybersecurity  (2015)

Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274  (2003)

Consensus Study Report

Professionalizing the Nation's Cybersecurity Workforce?: Criteria for Decision-Making  (2013)

Consensus Study Report

Biometric Recognition: Challenges and Opportunities  (2010)

Proceedings

Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop  (2019)

Consensus Study Report

Securing the Vote: Protecting American Democracy  (2018)

Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Proceedings

Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop  (2019)

Consensus Study Report

Asking the Right Questions About Electronic Voting  (2006)

Consensus Study Report

Looking Ahead at the Cybersecurity Workforce at the Federal Aviation Administration  (2021)

Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies  (2020)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)

Proceedings

Cryptographic Agility and Interoperability: Proceedings of a Workshop  (2017)