Skip to main content

Search results for "transit availability"

Filters: Cybersecurity 31 ×
Viewing 1 - 20 of 29 results by relevance

Protection of Transportation Infrastructure from Cyber Attacks: A Primer  (2016)

Protection of Transportation Infrastructure from Cyber Attacks: A Primer  (2016)

Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies  (2020)

Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274  (2003)

Consensus Study Report

Making the Nation Safer: The Role of Science and Technology in Countering Terrorism  (2002)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)

Guidebook on Best Practices for Airport Cybersecurity  (2015)

Consensus Study Report

Toward a Safer and More Secure Cyberspace  (2007)

Consensus Study Report

Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions  (2017)

Consensus Study Report

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities  (2003)

Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Consensus Study Report

Who Goes There?: Authentication Through the Lens of Privacy  (2003)

Consensus Study Report

Improving State Voter Registration Databases: Final Report  (2010)

Proceedings

Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop  (2019)

Proceedings

Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop  (2019)

Consensus Study Report

Securing the Vote: Protecting American Democracy  (2018)

Consensus Study Report

Looking Ahead at the Cybersecurity Workforce at the Federal Aviation Administration  (2021)

Consensus Study Report

Critical Code: Software Producibility for Defense  (2010)

Proceedings

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)