All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Mission Chief Mobile-App
One Syota All Attacks
Heteroflexible Net
Peter Bruska MD Illini Doctor
Life Lessons Video Game Teaches
FCC BrianG
FM Concepts Us Video
What Does a Security Architect Do
Army's Cyber
Battalion Recruiting Video
Giselle Palmer FM Concepts
Stereo Test
How You Become U.S. Army Securily
Types of Mobile Device Attacks
What Do Games Teach Us
Heterogeneous Domain Adaptation
Upcoming Projects of Micah Moore
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
Mission Chief Mobile-App
One Syota All Attacks
Heteroflexible Net
Peter Bruska MD Illini Doctor
Life Lessons Video Game Teaches
FCC BrianG
FM Concepts Us Video
What Does a Security Architect Do
Army's Cyber
Battalion Recruiting Video
Giselle Palmer FM Concepts
Stereo Test
How You Become U.S. Army Securily
Types of Mobile Device Attacks
What Do Games Teach Us
Heterogeneous Domain Adaptation
Upcoming Projects of Micah Moore
Teaching Cybersecurity
Oct 29, 2020
acm.org
Corrigendum: Quantitative Measurement of Cyber Resilience: Modeling and Experimentation | ACM Transactions on Cyber-Physical Systems
2 weeks ago
acm.org
The case for disappearing cyber security | Communications of the ACM
3 months ago
acm.org
Implementing insider defenses | Communications of the ACM
Apr 26, 2021
acm.org
Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures: ACM Computing Surveys: Vol 52, No 2
2 months ago
acm.org
Security Modelling for Cyber-Physical Systems: A Systematic Literature Review | ACM Transactions on Cyber-Physical Systems
1 month ago
acm.org
AuthPLC: Authenticating PLC Communication Using ST-based Extended Cryptographic Library | Proceedings of the 11th ACM Cyber-Physical System Security Workshop
2 months ago
acm.org
0:17
This week, the Association for Computing Machinery (ACM) announced its new leadership team — and we are SO proud! 💻✨ These students continue to raise the bar through innovation, collaboration, and a true passion for computing. We’re incredibly grateful for the work they’ve already done, and we cannot wait to see what’s next under this new leadership team. | Augusta University School of Computer and Cyber Sciences
51 views
5 months ago
Facebook
Augusta University School of Computer and Cy…
Cyber security in the quantum era | Communications of the ACM
Mar 20, 2019
acm.org
Generative Vulnerability Assessment for Cyber-Physical Systems | ACM Transactions on Cyber-Physical Systems
2 months ago
acm.org
Improving the Security of Visual Challenges | ACM Transactions on Cyber-Physical Systems
5 months ago
acm.org
Blockchain-Based Administration of Access in Smart Home IoT | Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
Apr 28, 2022
acm.org
Hypergames and Cyber-Physical Security for Control Systems | ACM Transactions on Cyber-Physical Systems
2 months ago
acm.org
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats | Guide books | ACM Digital Library
2 months ago
acm.org
Cyber Range - Active Countermeasures
8 months ago
activecountermeasures.com
Scenario-Driven Cyber-Physical-Social System: Intelligent Workflow Generation Based on Capability | Companion Proceedings of the ACM Web Conference 2024
Sep 29, 2024
acm.org
Cybersecurity Event Detection with New and Re-emerging Words | Proceedings of the 15th ACM Asia Conference on Computer and Communications Security
Oct 7, 2020
acm.org
Information hiding: Challenges for forensic experts: Communications of the ACM: Vol 61, No 1
Dec 31, 2019
acm.org
Watch Your Back | Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
Nov 11, 2022
acm.org
Data-Driven Model Predictive Control with Regression Trees—An Application to Building Energy Management | ACM Transactions on Cyber-Physical Systems
2 months ago
acm.org
Social phishing | Communications of the ACM
2 months ago
acm.org
Generative adversarial networks | Communications of the ACM
Nov 10, 2020
acm.org
As the world’s largest computing society, ACM offers its members the resources and experiences to help shape the future of computing.
Jan 28, 2010
acm.org
A method for obtaining digital signatures and public-key cryptosystems | Communications of the ACM
2 months ago
acm.org
A new golden age for computer architecture | Communications of the ACM
Jan 28, 2019
acm.org
Cybersecurity and AI: The challenges and opportunities
Jun 5, 2023
weforum.org
A view of cloud computing | Communications of the ACM
2 months ago
acm.org
Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles | Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
Nov 4, 2020
acm.org
Ransomware: Extortion Is My Business
Apr 24, 2025
acm.org
Last-Mile Transit Service with Urban Infrastructure Data | ACM Transactions on Cyber-Physical Systems
Feb 9, 2020
acm.org
See more
More like this
Feedback