Skip to main content
Perhaps you meant susceptible sub populations?

Search results for "susceptible subpopulations"

Filters: Cybersecurity 31 ×
Viewing 1 - 20 of 22 results by relevance
Consensus Study Report

Making the Nation Safer: The Role of Science and Technology in Countering Terrorism  (2002)

Consensus Study Report

Asking the Right Questions About Electronic Voting  (2006)

Protection of Transportation Infrastructure from Cyber Attacks: A Primer  (2016)

Protection of Transportation Infrastructure from Cyber Attacks: A Primer  (2016)

Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274  (2003)

Consensus Study Report

Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions  (2017)

Proceedings

Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop  (2019)

Consensus Study Report

Who Goes There?: Authentication Through the Lens of Privacy  (2003)

Consensus Study Report

Software for Dependable Systems: Sufficient Evidence?  (2007)

Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Proceedings

Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop  (2010)

Consensus Study Report

Toward a Safer and More Secure Cyberspace  (2007)

Consensus Study Report

A 21st Century Cyber-Physical Systems Education  (2016)

Proceedings

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)

Consensus Study Report

Biometric Recognition: Challenges and Opportunities  (2010)

Consensus Study Report

Securing the Vote: Protecting American Democracy  (2018)

Guidebook on Best Practices for Airport Cybersecurity  (2015)

Consensus Study Report

Critical Code: Software Producibility for Defense  (2010)