enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Sybe I. Rispens - Wikipedia

    en.wikipedia.org/wiki/Sybe_I._Rispens

    He received his Master's in the Philosophy of Science from the University of Amsterdam in 1996. In 2005, Rispens was awarded a PhD in the History of Artificial Intelligence from Rijksuniversiteit Groningen [1] with the dissertation, Machine Reason: A History of Clocks, Computers and Consciousness. [2] He is a certified ISO27001 IT-security ...

  3. Chuck Easttom - Wikipedia

    en.wikipedia.org/wiki/Chuck_Easttom

    In addition to computer security, Easttom has done work in software engineering., [9] [10] applied mathematics, quantum computing, and other areas. He has authored 43 books [11] on computer security, programming languages, Linux, cyber forensics, quantum computing, computer networks, penetration testing, and cryptography. His books are used as ...

  4. Michael Franz - Wikipedia

    en.wikipedia.org/wiki/Michael_Franz

    Franz's doctoral dissertation, entitled "Code Generation On-The-Fly: A Key To Portable Software" [17] proposed to make software portable among different target computer architectures by way of using on-the-fly compilation at load time from a semantic dictionary encoding, a compressed intermediate data structure. Two years later, the Java ...

  5. Zero trust architecture - Wikipedia

    en.wikipedia.org/wiki/Zero_trust_architecture

    [10] [11] The publication defines zero trust (ZT) as a collection of concepts and ideas designed to reduce the uncertainty in enforcing accurate, per-request access decisions in information systems and services in the face of a network viewed as compromised. A zero trust architecture (ZTA) is an enterprise's cyber security plan that utilizes ...

  6. Paulo Shakarian - Wikipedia

    en.wikipedia.org/wiki/Paulo_Shakarian

    Paulo Shakarian is an associate professor at Arizona State University where he leads Lab V2 [1] which is focused on neurosymbolic artificial intelligence.His work on artificial intelligence and security has been featured in Forbes, the New Yorker, Slate, the Economist, Business Insider, TechCrunch, CNN and BBC.

  7. Edward G. Amoroso - Wikipedia

    en.wikipedia.org/wiki/Edward_G._Amoroso

    Edward G. Amoroso is an American computer security professional, entrepreneur, author, and educator based in the New York City area. His research interests have centered on techniques and criteria for measuring trustworthy software development.

  8. Ibrahim Baggili - Wikipedia

    en.wikipedia.org/wiki/Ibrahim_Baggili

    Baggili is a Jordanian/Arab American first generation college graduate and a well-known scientist in the domain of Cyber Forensics and Cybersecurity with seminal peer-reviewed work in the areas of Virtual Reality Forensics (VR) and security, mobile device forensics and security, application forensics, drone forensics and memory forensics.

  9. Duminda Wijesekera - Wikipedia

    en.wikipedia.org/wiki/Duminda_Wijesekera

    Duminda Wijesekera is an American computer scientist of Sri Lankan descent. He is a professor in the Department of Computer Science at George Mason University and acting chair of Cyber Security Engineering Department. [1]