Skip to main content
Perhaps you meant disrupt technology?

Search results for "isru technology"

Filters: Cybersecurity 31 ×
Viewing 1 - 20 of 33 results by relevance
Consensus Study Report

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities  (2003)

Proceedings

Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop  (2010)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)

Consensus Study Report

Making the Nation Safer: The Role of Science and Technology in Countering Terrorism  (2002)

Consensus Study Report

Looking Ahead at the Cybersecurity Workforce at the Federal Aviation Administration  (2021)

Consensus Study Report

Securing the Vote: Protecting American Democracy  (2018)

Developing a Physical and Cyber Security Primer for Transportation Agencies  (2020)

Proceedings

Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop  (2019)

Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies  (2020)

Proceedings

Recoverability as a First-Class Security Objective: Proceedings of a Workshop  (2018)

Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

Consensus Study Report

Biometric Recognition: Challenges and Opportunities  (2010)

Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274  (2003)

Consensus Study Report

Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions  (2017)

Consensus Study Report

A 21st Century Cyber-Physical Systems Education  (2016)

Proceedings

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop  (2017)

Consensus Study Report

Critical Code: Software Producibility for Defense  (2010)

Protection of Transportation Infrastructure from Cyber Attacks: A Primer  (2016)

Protection of Transportation Infrastructure from Cyber Attacks: A Primer  (2016)