dcypher.nl

U bent hier

NCSRA 2014 SBIR Cybercheck Ic3dmedia
NCSRA 2014 SBIR BYOS Intrinsic ID
NCSRA 2014 SBIR CVI Coblue cybersecurity
NCSRA 2014 SBIR Cybercheck Ic3dmedia
NCSRA 2014 SBIR Cyberscan DIGINT
NCSRA 2014 SBIR Mobiele app identiteit InnoValor
NCSRA 2014 SBIR VCS ZiuZ
Norforsk Summary NL project
PRICE: Using process tracing to improve household IoT users’ privacy decisions
PRICE: Using process tracing to improve household IoT users’ privacy decisions NL
PRICE: Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems
PRICE: Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems NL
PRICE: Faster and Stronger Onion Routing (FASOR)
PRICE: Faster and Stronger Onion Routing (FASOR) NL
PRICE: Bridging Transparency Requirements in Smartphone Ecosystems
PRICE: Bridging Transparency Requirements Smartphone Ecosystem NL
PRICE: Bridging The Gap Between Theory and Practice in Data Privacy
PRICE: Bridging The Gap Between Theory and Practice in Data Privacy NL
Chist-era 2015 User-Centric Security, Privacy and Trust in the Internet of Things (SPTIoT)
Chist-era 2015 User empowerment for Security and prIvacy in Internet of Things (USEIT)
Chist-era 2015 IDentification for the Internet Of Things (ID_IOT)
Chist-era 2015 SecUre aCCESSibility for the internet of things (SUCCESS)
Chist-era 2015 Emotion psychology meets cyber security in IoT smart homes (Cocoon)
NCSRA 2014 NWO-DHS Malware on smartphones collection analysis and defensive measures
NCSRA 2014 NWO-DHS IN-DEPTH DEFENSE OF SCADA AND INDUSTRIAL CONTROL SYSTEMS.pdf
NCSRA 2014 NWO Security Autonomous Response in programmable Networks
NCSRA 2014 NWO Secure Our Safety Building Cyber Security for Flood Management
NCSRA 2014 NWO Public-private actions against botnets establishing the legal boundaries
NCSRA 2014 NWO Patterns for Privacy.pdf
NCSRA 2014 NWO Own Your Own Identity
NCSRA 2014 NWO More secure SCADA networks through self-awarenes
NCSRA 2014 NWO Learning from Incidents
NCSRA 2014 NWO ESPRESSO
NCSRA 2014 NWO Distributed Denial of Service Defense protecting schools and other public organizations
NCSRA 2014 NWO Critical Infrastructure Protection through Cryptographic Incident Management
National Cyber Security Research Agenda II (NCSRA-II) 2013
NCSRA 2012 SBIR Thales CyberDEW
NCSRA 2012 SBIR Sightes Threat Battle
NCSRA 2012 SBIR SIG cyber security toeval of design
NCSRA 2012 SBIR Infosecure Alert project
NCSRA 2012 SBIR Compumatica SecureBringYourOwnDevice
NCSRA 2012 SBIR Coblue Cybersecurity Secure Information Grid
NCSRA 2012 SBIR BusinessForensics Realtime monitoring
NCSRA 2012 SBIR Atos Een extra zintuig
NCSRA 2012 NWO Visualization and deep protocol analysis to detect cyber espionage and targeted malware
NCSRA 2012 NWO The personal information security assistant
NCSRA 2012 NWO Reputation Metrics Design to Improve Intermediary Incentives for Security
NCSRA 2012 NWO Re-Cover The Power of Obfuscation
NCSRA 2012 NWO Profiling for Optical Fault Induction using Location-dependent leakage
NCSRA 2012 NWO Privacy Compliance and Enforcement.pdf

Pagina's