The document was issued by industry or industrial organization.
file
Cybersecurity's human adversarial engagement is often lost in discussions of cybersecurity. We discuss how defenders' focus on technology unintentionally creates vulnerabilities which can be exploited by threat actors. In particular, we discuss how the convergence of cyber awareness training and defensive technologies is exploited by threat actors with devastating consequences.
news
Submitted by palensky on Thu, 11/23/2017 - 9:02am
Dear Colleagues,
It is my pleasure to invite you to the upcoming Workshop on Modeling and Simulation of Cyber-Physical Energy Systems!
http://www.palensky.org/mscpes/2018
After Berkeley, Berlin, Seattle, Vienna, and Pittsburgh, we are this time in beautiful Porto, Portugal, again co-located with the annual Cyber-Physical Systems Week.
Full paper submission deadline is 4th February 2018. Accepted and presented papers will be submitted to IEEE Xplore digital library.
file
George Washington called West Point, "the key to the continent." The reasoning that Washington employed in establishing the fortifications at West Point is instructive to modern cyber warriors.
news
Submitted by knamuduri on Tue, 01/24/2017 - 7:47am
Call for Student Posters on Unmanned Aircraft Systems (UAS) Communications and Networking Research
video
Submitted by privera on Tue, 09/06/2016 - 9:32pm
The Shimmix Security Enhanced System Incident Response.