Skip to main content

Search results for "limited health"

Filters: Cybersecurity 31 ×
Viewing 1 - 20 of 32 results by relevance
Proceedings

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Consensus Study Report

Making the Nation Safer: The Role of Science and Technology in Countering Terrorism  (2002)

Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

Consensus Study Report

Additional Observations on Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions: An Annex: Unclassified Abbreviated Version of a Classified Report  (2017)

Consensus Study Report

A 21st Century Cyber-Physical Systems Education  (2016)

Consensus Study Report

Software for Dependable Systems: Sufficient Evidence?  (2007)

Consensus Study Report

Who Goes There?: Authentication Through the Lens of Privacy  (2003)

Proceedings

Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop  (2016)

Proceedings

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop  (2017)

Consensus Study Report

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities  (2003)

Consensus Study Report

Biometric Recognition: Challenges and Opportunities  (2010)

Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Proceedings

Recoverability as a First-Class Security Objective: Proceedings of a Workshop  (2018)

Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies  (2020)

Consensus Study Report

Toward a Safer and More Secure Cyberspace  (2007)

Consensus Study Report

Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions  (2017)

Consensus Study Report

Securing the Vote: Protecting American Democracy  (2018)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)

Proceedings

Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop  (2010)