Skip to main content

Search results for "read lengths"

Filters: Cybersecurity 31 ×
Viewing 1 - 20 of 29 results by relevance

Developing a Physical and Cyber Security Primer for Transportation Agencies  (2020)

Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies  (2020)

Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Protection of Transportation Infrastructure from Cyber Attacks: A Primer  (2016)

Protection of Transportation Infrastructure from Cyber Attacks: A Primer  (2016)

Guidebook on Best Practices for Airport Cybersecurity  (2015)

Consensus Study Report

Making the Nation Safer: The Role of Science and Technology in Countering Terrorism  (2002)

Consensus Study Report

Who Goes There?: Authentication Through the Lens of Privacy  (2003)

Consensus Study Report

Securing the Vote: Protecting American Democracy  (2018)

Consensus Study Report

Biometric Recognition: Challenges and Opportunities  (2010)

Consensus Study Report

Additional Observations on Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions: An Annex: Unclassified Abbreviated Version of a Classified Report  (2017)

Proceedings

Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop  (2019)

Consensus Study Report

Asking the Right Questions About Electronic Voting  (2006)

Proceedings

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop  (2017)

Proceedings

Recoverability as a First-Class Security Objective: Proceedings of a Workshop  (2018)

Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)

Consensus Study Report

Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions  (2017)

Proceedings

Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop  (2010)