The safe and secure use of nuclear and other radioactive material, along with the operation of nuclear facilities and management of associated facilities and activities, rely heavily on information ...
Forbes contributors publish independent expert analyses and insights. I write about contemporary cybersecurity and online privacy issues. Integrating computer vision technology is a big step forward ...
Abstract: In the face of security vulnerabilities in health and safety applications, governments and industry leaders have focused on security weaknesses in the design and protection of electronic ...
The MS and Certificate program are not currently admitting new students. The Computer Security and Privacy programs offer comprehensive knowledge in software security ...
The IAEA and the Korea Institute of Nuclear Nonproliferation and Control have jointly developed a cutting-edge training programme to raise awareness of cyber-attack threats and their potential impact ...
Hardware security protects user authentication and system integrity by working outside of the operating system, in ways that ...
As far back as the 1970s, three women began preparing the world for the havoc about to be unleashed by networked computing. From their humble origins in law enforcement and academia, their influence ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results