Search: security - Matches: 51
|Slovenian ICT and Security companies|
|MIT World Series: The Technology and Policy Program - Homeland Security Technology and Policy Seminar|
The Technology and Policy Program (TPP) educates men and women for leadership on the important technological issues confronting society. Our program prepares our graduates to excel in their technical fields, and to develop and implement effective strategies for dealing with ...
|NATO Advanced Study Institute on Mining Massive Data Sets for Security|
This Workshop brings together scientists and engineers interested in recent developments in exploiting Massive Data Sets. Emphasis is placed on available techniques and their application to security-critical applications. Today our world is awash in data and we live in an ...
|Security and Technology @ Carnegie Council|
As technology develops at an unprecedented speed, it has the potential to effect our security in many ways. From questions of Internet privacy to the development of weapons for use in outer space, these technological changes present unique challenges--and opportunities--in ...
|The Academic Council on the United Nations System 23rd Annual Meeting|
Citizens, governments and international organizations are confronted with an array of security challenges, including new forms of terrorism and international criminal activity; security implications of environmental degradation; instability in the financial system; militarization of space; unregulated flows of small arms; ...
|Transnational ICT and Security Technology Opportunities, Ljubljana 2007|
Bob "Brutus" Charette, Jr., Philip H. Cullom, Peter A. DeLuca, Jonathan Powers:
Leading by Example|
: "Leading By Example" will explore how the U.S. military is on the forefront of efforts to develop and implement renewable and clean energy sources both to power our forces and to combat climate change. Our speakers each are leaders ...
Mike Honda, Barney Frank, Merrie Najimy, Margie Yamamoto, Kenneth Oye:
National Security and Civil Liberties|
Merrie Najimy’s father told her that “making the right decision isn’t always popular but making the popular decision isn’t always right.” Each of the speakers on this panel has taken an unpopular stand following September 11th. Najimy believes that the ...
David Cleevely, Tim Kindberg, Derek McAuley, Rachel Jones:
Security and Privacy: Is It only a Matter of Time before a Massive Loss of Personal Data or Identity theft Happens on a Smart Mobile Platform?|
We have a growing number of smart platforms that are becoming established, each with its own market place for applications (Blackberry RIM, Nokia Ovi, Apple iPhone, Google g2, Vodafone 360) but we don’t have a security architecture that actually makes ...
|Wolfgang Busch, Christopher Regenhardt, Frank Arendt: Security and Visibility Discussion|
|Frank Arendt: Introduction to Security & Visibility|
|Margaret Anstee: What Price Security?|
New Security Challenges|
English: In a special address titled "New Security Challenges", the President responded to the invitation of the Academic Council to talk about the global security situation, the main challenges and certain institutional solutions influencing further development of the United Nations. ...
Achieving U.S. Energy Security Through Energy Diversity|
“We’ve been spoiled as a nation,” says Bob Malone. For decades, energy was inexpensive and abundant, and most Americans took it for granted. Recently “we’ve seen the world change around us.” Successive presidential administrations have failed to free the nation ...
Arnold I. Barnett:
Airline Security: Where are We?|
The events of 9/11 unleashed a flood of security measures across all dimensions of daily life, many of them aimed at averting repeat attacks on aircraft. So you might imagine that the risks of flying have been much reduced. You’d ...
|Giorgio Giacinto: Analysis of Patterns for Computer Security|
Behind the Headlines: Pakistan|
With its mix of militants, nuclear weapons, and chronic domestic unrest, Pakistan's problems have implications for the entire world. Prize-winning author and journalist Ahmed Rashid gives a chilling account of the situation in his homeland.
Jere Van Dyk:
Captive: My Time as a Prisoner of the Taliban|
Journalist Jere Van Dyk tells of his decades-long involvement with Afghanistan, and gives a harrowing account of his 2008 kidnapping and imprisonment by the Taliban in the no-man's land between Afghanistan and Pakistan.
Cloud security and OpenStack|
Provided security is one of the key requirements of cloud computing users. In our presentation we will give a short overview of the current state of security in cloud computing, introduce security mechanisms that are part of the latest OpenStack ...
Debt Detection in Social Security by Sequence Classification Using Both Positive and Negative Patterns|
Debt detection is important for improving payment accuracy in social security. Since debt detection from customer transactional data can be generally modelled as a fraud detection problem, a straightforward solution is to extract features from transaction sequences and build a ...
Jerome I. Friedman, Phillip A. Sharp:
Defining the Boundaries: Homeland Security and Its Impact on Scientific Research|
In August 2001, MIT launched a review of the university’s commitment to unclassified research on campus. One month later, the events of September 11th gave this review a harsh immediacy, and transformed the discussion. New government policies that constrain the ...
|Oliver Hidalgo: Democratic Antinomies: Freedom and Security, Liberty and Equality, Individual and Collective Claims|
|Robert Sraka: eSecurity & eHealth|
Fisheries and Global Warming: Impacts on Marine Ecosystems and Food Security|
Downward swooping lines on the graphs say it all: The world’s fish populations, and hence its fisheries, are collapsing. Daniel Pauly has analyzed reams of data -- including number of boats fishing, their reported catch, the amount of fish thrown ...
|Danilo Türk: From Helsinki Final Act to an OSCE Charter: A Case for a New Security Architecture|
|Charlotta Johansson: Improved Mobility, Security and Safety of Pedestrians and Bicyclists on Roads through Small Towns and Villages|
|Aleksander Šinigoj: Information Security Policies the Primary Building Blocks For Our Security Strategies|
|Michael Nielsen: International cooperation on Road Transport leading to improved mobility, safety, security and prosperity|
Learning to Extract Security-related Event Information from Large News Collections|
Automatic Event Extraction from texts emerges as an im- portant and complex text mining task. Its goal is to detect description of events of a speci¯c type described in the text. For each event the Event Extraction system is expected ...
Lecture 11 - Social Security|
This lecture continues the analysis of Social Security started at the end of the last class. We describe the creation of the system in 1938 by Franklin Roosevelt and Frances Perkins and its current financial troubles. For many Democrats, Social ...
|Samuel Madden: Lecture 21: Security Introduction|
Lecture 24 - Risk, Return, and Social Security|
This lecture addresses some final points about the CAPM. How would one test the theory? Given the theory, what's the right way to think about evaluating fund managers' performance? Should the manager of a hedge fund and the manager of ...
Net Delusion: The Dark Side of Internet Freedom |
By falling for the supposedly democratizing nature of the Internet, Western do-gooders may have missed how it also entrenches dictators, threatens dissidents, and makes it harder—not easier—to promote democracy. Buzzwords like "21st-century statecraft" sound good in PowerPoint presentations, but the ...
Ernest J. Moniz, Dean Kamen:
Oil, Security, Environment, Technology - The Segway Alternative|
Oil, Security, Environment, Technology As an energy source, oil is hard to beat. In spite of reports to the contrary, there’s still lots of it available—1 trillion barrels—and the cost of extracting and harnessing it for use in transportation and ...
One Nation Under Surveillance: A New Social Contract to Defend Freedom Without Sacrificing Liberty|
Advances in technology make it impractical to distinguish between "foreign" and "local" communications. What limits, if any, should be placed on a government's efforts to spy on its citizens in the name of national security?
|Pinar Oezden Wennerberg: Security Applications of Web mining|
|Istvan Mezgar: Security infrastructures for CNs|
|Andre Groll: Security issues related to the use of cooperative systems - eSecurity WG of eSafety|
Kenneth Starr, Nadine Strossen, Charles Stuckey, Lewis M. Branscomb, Steven Levy:
Security, Privacy and Technology|
New technologies allow individuals, corporations and government entities to monitor, track and identify employees, customers and the general public. This panel provides a forum to discuss security and privacy in today's global economy.
SETCCE – Security Technology Competence Centre|
E-commerce products and services (globally used and W3C-compliant digital signature components; products for electronic invoicing process management, and outsourced services; products and services for trusted electronic archiving; CA’s) IT consulting services (company-wide business process de-materialization and optimization; PKI-related security policies; ...
|Inger Ultvedt: Swedish Experience in Adopting Action Plan 1325 [UN S/RES 1325 (2000) on Women, Peace and Security]|
John A. Fallon, Rory Stewart:
The Afghan Challenge|
Rebuilding Afghanistan will be a long process, says Rory Stewart, and so our presence there needs to be much lighter. It's inconceivable that for the next 30-40 years we can sustain investments of $85 billion and up and maintain 90,000 ...
Katherine Brown, Robert Diamond:
The Ethics of Exit from Afghanistan|
Katherine Brown and Robert Diamond, Truman Fellows with first-hand experience in Afghanistan, discuss just how and when--both ethically and pragmatically--the U.S. can leave that troubled country. Their prediction? Not for a long time.
Michael E. O’Hanlon:
The Science of War: Defense Budgeting, Military Technology, Logistics, and Combat Outcomes|
Michael O'Hanlon explains how military modeling and planning are done, taking as examples Desert Storm, the Iraq War, and the decisions to be made now about Afghanistan.
The Security of Mobile Agent Systems|
In  a model for mobility, called Petri hypernets, was presented. Hypernets offer a visual formalism to describe hierarchically structured dynamic agents. The agents take the form of Petri nets, which manipulate other agents as resources. In  a logic ...
|Malcolm Wicks: UK Minister of State for Energy - Energy Security and Market Liberalisation|
|Niko Neufeld: Welcome Presentation/ Computer Security/ Workshops presentation|
Peter W. Singer:
Wired for War: The Robotics Revolution and Conflict in the 21st Century|
Science fiction is fast becoming reality on the battlefield and robotics are already changing the way wars are being fought. How will they affect the politics, economics, laws, and ethics of warfare?
Reverse engineering techniques to find security bugs: A case study of the ANI|
Alex Sotirov is a vulnerability engineer at determina. He will discuss some latest techniques in reverse engineering software to find vulnerabilities. Particularly, he'll discuss his technique that lead him to find the ANI bug (a critical new bug in WinXP ...
|James Wells, Dale Myers, Niko Neufeld, Ingrid Schmid: Welcome presentation/ Computer security/ Workshop presentation|
Milind Tambe, Christopher Kiekintveld:
Game Theory for Security: Lessons learned from deployed applications|
Security at infrastructure of economic, political, or symbolic importance is a key concern around the world. Game theory is well-suited to adversarial reasoning for security resource allocation and scheduling problems, and allows us to generate security strategies that are unpredictable, ...