Skip to main content

Search results for "peripheral nervous"

Filters: Information Security and Privacy Information Security and Privacy ×
Viewing 1 - 17 of 17 results by relevance

Scaling Up: A Research Agenda for Software Engineering  (1989)

Consensus Study Report

Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data  (2007)

Threatening Communications and Behavior: Perspectives on the Pursuit of Public Figures  (2011)

NAM Special Publication

Health Data Sharing to Support Better Outcomes: Building a Foundation of Stakeholder Trust  (2020)

Consensus Study Report

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities  (2003)

Consensus Study Report

Engaging Privacy and Information Technology in a Digital Age  (2007)

Proceedings

Opportunities and Challenges for Using Digital Health Applications in Oncology: Proceedings of a Workshop  (2021)

Proceedings

Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop  (2019)

Proceedings

Planning for Long-Term Use of Biomedical Data: Proceedings of a Workshop  (2020)

Consensus Study Report

Conducting Biosocial Surveys: Collecting, Storing, Accessing, and Protecting Biospecimens and Biodata  (2010)

Consensus Study Report

Toward a Safer and More Secure Cyberspace  (2007)

Consensus Study Report

Bits of Power: Issues in Global Access to Scientific Data  (1997)

Proceedings

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Consensus Study Report

Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment  (2008)

Proceedings

Protecting Student Records and Facilitating Education Research: A Workshop Summary  (2009)

Proceedings

Improving Business Statistics Through Interagency Data Sharing: Summary of a Workshop  (2006)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)