Skip to main content

Search results for "security threat"

Filters: Computers and Information Technology Computers and Information Technology ×
Viewing 1 - 20 of 69 results by relevance
Proceedings

Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information  (2001)

Consensus Study Report

Bulk Collection of Signals Intelligence: Technical Options  (2015)

Consensus Study Report

Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance  (2024)

Consensus Study Report

Computers at Risk: Safe Computing in the Information Age  (1991)

Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Proceedings

Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop  (2010)

Proceedings

Authenticity, Integrity, and Security in a Digital World: Proceedings of a Workshop–in Brief  (2019)

Cryptography's Role in Securing the Information Society  (1996)

Privacy and Security in the 21st Century: Who Knows and Who Controls?: Proceedings of a Forum  (2019)

Proceedings

Recoverability as a First-Class Security Objective: Proceedings of a Workshop  (2018)

Proceedings

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop  (2017)

Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

Consensus Study Report

Critical Information Infrastructure Protection and the Law: An Overview of Key Issues  (2003)

Proceedings

The Gates Are Open: Control System Cyber-Physical Security for Facilities: Proceedings of a Federal Facilities Council Workshop—in Brief  (2021)

Consensus Study Report

Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers  (2001)

Consensus Study Report

A Review of the Next Generation Air Transportation System: Implications and Importance of System Architecture  (2015)

Consensus Study Report

Trust in Cyberspace  (1999)

Consensus Study Report

Software for Dependable Systems: Sufficient Evidence?  (2007)

Proceedings

Cryptographic Agility and Interoperability: Proceedings of a Workshop  (2017)