Skip to main content

Search results for "security challenge"

Filters: Computers and Information Technology Computers and Information Technology ×
Viewing 1 - 20 of 33 results by relevance
Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Proceedings

The Gates Are Open: Control System Cyber-Physical Security for Facilities: Proceedings of a Federal Facilities Council Workshop—in Brief  (2021)

Privacy and Security in the 21st Century: Who Knows and Who Controls?: Proceedings of a Forum  (2019)

Proceedings

Summary of a Workshop on Software-Intensive Systems and Uncertainty at Scale  (2007)

Proceedings

Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop  (2010)

Proceedings

Recoverability as a First-Class Security Objective: Proceedings of a Workshop  (2018)

Consensus Study Report

Critical Information Infrastructure Protection and the Law: An Overview of Key Issues  (2003)

Consensus Study Report

IDs -- Not That Easy: Questions About Nationwide Identity Systems  (2002)

Proceedings

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop  (2017)

Consensus Study Report

Computing Research for Sustainability  (2012)

Proceedings

Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop  (2019)

Consensus Study Report

Making IT Better: Expanding Information Technology Research to Meet Society's Needs  (2000)

The National Challenge in Computer Science and Technology  (1988)

Consensus Study Report

Computers at Risk: Safe Computing in the Information Age  (1991)

Consensus Study Report

Information Technology Research, Innovation, and E-Government  (2002)

Consensus Study Report

More Than Screen Deep: Toward Every-Citizen Interfaces to the Nation's Information Infrastructure  (1997)

Consensus Study Report

Health Data in the Information Age: Use, Disclosure, and Privacy  (1994)

Consensus Study Report

Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions  (2017)

Proceedings

Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop  (2019)