Contribuciones  |
|
Número
|
Título
|
Origen
|
AI/Cuestión
|
Fecha
|
|
[ 627 ]
|
Revised baseline text for X.srgsdcs: Security requirements and guidelines of sensing and data collection system for city infrastructure (Proposed new content of security threats)
|
China Unicom
|
Q7/17
|
2024-02-07 |
|
[ 626 ]
|
Revised baseline text for X.srgsc: Security requirements and guideline s of application and service for smart city platform (proposed new content for security requirements)
|
China Unicom
|
Q7/17
|
2024-02-07 |
|
[ 625 ]
(Rev.1) |
Proposal for new Technical Report on TR.emm-tfm: Evaluation methods and metrics for trustworthiness of AI foundation models
|
China Telecommunications Corporation
,
China Unicom
,
Korea (Rep. of)
,
Soonchunhyang University (Korea (Rep. of))
,
State Grid Corporation of China
|
Q15/17
|
2024-02-07 |
|
[ 624 ]
|
Revised baseline text for X.sec_QKD_profr: Framework of quantum key distribution (QKD) protocols in QKD network
|
National University of Singapore
|
Q15/17
|
2024-02-07 |
|
[ 623 ]
|
Proposal for new work item X.FR-MSP: Functional Requirements of Microsegmentation Platform in a cloud-based environment
|
China Telecommunications Corporation
|
Q8/17
|
2024-02-07 |
|
[ 622 ]
|
6th Revised baseline text for X.sa-ec: Security architecture of edge cloud (for consent)
|
China Telecommunications Corporation
|
Q8/17
|
2024-02-07 |
|
[ 621 ]
|
Revised baseline text for X.gecds: Guidelines on edge computing data security
|
China Unicom
|
Q8/17
|
2024-02-07 |
|
[ 620 ]
|
Revised baseline text for X.ra-iot: Security risk analysis framework for IoT devices
|
Hitachi, Ltd. (Japan)
|
Q6/17
|
2024-02-07 |
|
[ 619 ]
|
Revised baseline text for X.sg-tc: Security guidelines of trusted cloud services
|
China Unicom
|
Q8/17
|
2024-02-07 |
|
[ 618 ]
|
3rd Revised baseline text for X.sup-cdc: Supplement to ITU-T X.1060 - Framework for the creation and operation of a cyber defence centre
|
NEC Corporation (Japan)
,
Nippon Telegraph and Telephone Corporation (NTT) (Japan)
|
Q3/17
|
2024-02-07 |
|
[ 617 ]
|
Proposal for the revised Q3/17 text
|
NEC Corporation (Japan)
|
Q3/17
|
2024-02-07 |
|
[ 616 ]
|
Proposal for new work item TR.ct_iot: Common Threats in Internet of Things Scenarios
|
Brazil
|
Q6/17
|
2024-02-07 |
|
[ 615 ]
(Rev.1) |
Revised baseline text for X.sr-ai:Security requirements for AI systems
|
China Telecommunications Corporation
,
Soonchunhyang University (Korea (Rep. of))
|
Q15/17
|
2024-02-07 |
|
[ 614 ]
|
Proposed tutorial: Using tools to support the development of Recommendations
|
Broadcom Europe Ltd. (United Kingdom)
|
QALL/17
|
2024-02-06 |
|
[ 613 ]
|
Proposal for new work item corrigendum 1 to X.1060 and new work item X.cdc csirt: Cyber Defence/Security Center and Computer Security Incident Response Team relationships
|
Broadcom Europe Ltd. (United Kingdom)
,
Broadcom Corporation (United States)
,
Forum of Incident Response and Security Teams (FIRST) (United States)
|
Q3/17
|
2024-02-06 |
|
[ 612 ]
(Rev.1) |
Comments on baseline text for X.1221 (X.stie) and X.1222 (X.taeii) - How the threat actors concept is used and why it is important/existential for security
|
Broadcom Corporation (United States)
,
Broadcom Europe Ltd. (United Kingdom)
|
Q4/17
|
2024-02-06 |
|
[ 611 ]
|
4th Revised baseline text for X.icd-schemas, Vendor agnostic security data schemas for integrated cyber defence solutions
|
Broadcom Europe Ltd. (United Kingdom)
|
Q15/17
|
2024-02-06 |
|
[ 610 ]
|
Proposal for new work item X.sa-iot: Technology requirements for security awareness of IoT devices
|
China Mobile Communications Co. Ltd.
|
Q6/17
|
2024-02-06 |
|
[ 609 ]
|
Proposal for new work item TR.sg-lmcs: Security guidelines of DLT-based lifecycle management for computing services
|
Beijing Jiaotong University (China)
,
China Mobile Communications Co. Ltd.
|
Q2/17
|
2024-02-06 |
|
[ 608 ]
|
Revised baseline text for X.tg-fdma: Technical guidelines for fraud detection of malicious applications in mobile devices
|
Ant Group Co., Ltd. (China)
|
Q7/17
|
2024-02-06 |
|
[ 607 ]
|
Revised baseline text for X.tc-ifd: Technical capabilities of interactive fraud detection
|
Ant Group Co., Ltd. (China)
|
Q7/17
|
2024-02-06 |
|
[ 606 ]
|
Proposal for ITU-T SG 17 as Lead Study Group for Child Online Protection
|
Ghana
|
QALL/17
|
2024-02-06 |
|
[ 605 ]
|
Proposal for new work item X.srm-fml: Security requirements and measures of federated machine learning
|
China Information Communication Technologies Group
,
China Telecommunications Corporation
,
China Unicom
|
Q15/17
|
2024-02-06 |
|
[ 604 ]
|
Revised baseline text for X.sf-dtea Security framework for detecting targeted email attacks
|
Broadcom Corporation (United States)
|
Q4/17
|
2024-02-06 |
|
[ 603 ]
|
Revised baseline text for the X.sec_QKDN_tn: Security requirements for the protection of quantum key distribution node (for consent)
|
CAS Quantum Network Co. Ltd. (China)
,
QuantumCTek Co., Ltd. (China)
|
Q15/17
|
2024-02-06 |
|
[ 602 ]
(Rev.1) |
A New Approach to Spam Email Detecting Using Machine Learning
Rev.1 submitted as a late Contribution
|
Iran (Islamic Republic of)
|
Q4/17
|
2024-02-06 |
|
[ 601 ]
|
Revised baseline text for X.gsm-cdc: Guideline on Security Metrics for CDC
|
NEC Corporation (Japan)
|
Q3/17
|
2024-02-06 |
|
[ 600 ]
|
Revised baseline text for X.srgsc: Security requirements and guidelines of application and service for smart city platform - clause 8
|
China Telecommunications Corporation
|
Q7/17
|
2024-02-06 |
|
[ 599 ]
|
5th Revised text for X.IMT-2020/5Gsec-srocvs: Security Requirements for the Operation of IMT-2020/5G Core Network to Support Vertical Services (for determination)
|
China Telecommunications Corporation
|
Q2/17
|
2024-02-06 |
|
[ 598 ]
|
2nd Revised text for X.SecaaS: Security threats to be identified in the domain of security as a service
|
China Telecommunications Corporation
|
Q15/17
|
2024-02-06 |
|
[ 597 ]
|
Proposal for new work item X.ckrp: Framework of cryptographic key resource pool for cloud computing
|
China Telecommunications Corporation
,
ZTE Corporation (China)
|
Q8/17
|
2024-02-06 |
|
[ 596 ]
|
Revised baseline text for X.5gsec-asra:Guidelines and Technical Requirements for 5G Network Asset Security Risk Analysis
|
ZTE Corporation (China)
|
Q2/17
|
2024-02-06 |
|
[ 595 ]
|
Revised baseline text for X.tg-fdma: Technical guidelines for fraud detection of malicious applications in mobile devices
|
Vivo Mobile Communication Co., Ltd. (China)
|
Q7/17
|
2024-02-06 |
|
[ 594 ]
|
3rd Revised baseline text for X.mt-integrity: Security guidelines for mobile terminal integrity protection
|
China Information Communication Technologies Group
,
National Telecommunication Regulatory Authority (NTRA) (Egypt)
,
Vivo Mobile Communication Co., Ltd. (China)
|
Q6/17
|
2024-02-06 |
|
[ 593 ]
|
3rd Revised baseline text for X.mt-feature: Security features for assessment of mobile terminal security
|
China Information Communication Technologies Group
,
National Telecommunication Regulatory Authority (NTRA) (Egypt)
,
Vivo Mobile Communication Co., Ltd. (China)
|
Q6/17
|
2024-02-06 |
|
[ 592 ]
|
Revised baseline text for X.idse: Evaluation methodology for in-vehicle intrusion detection systems
|
China Telecommunications Corporation
|
Q13/17
|
2024-02-06 |
|
[ 591 ]
|
Revised baseline text for X.srapi-cc: Security requirements of application programming interface (API) for cloud computing
|
China Telecommunications Corporation
|
Q8/17
|
2024-02-06 |
|
[ 590 ]
|
Revised baseline text for X.gdsml: Guidelines for data security using machine learning in big data infrastructure
|
China Telecommunications Corporation
|
Q8/17
|
2024-02-06 |
|
[ 589 ]
|
Revised baseline text for TR.smpa Security Middle Platform Architecture
|
China Telecommunications Corporation
|
Q15/17
|
2024-02-06 |
|
[ 588 ]
(Rev.1) |
Revised baseline text for X.asm-cc: Requirements of Attack Surface Management for cloud computing
|
China Telecommunications Corporation
|
Q8/17
|
2024-02-06 |
|
[ 587 ]
|
Revised baseline text for X.cs-ra: Cyber Security Reference Architecture
|
Soonchunhyang University (Korea (Rep. of))
|
Q1/17
|
2024-02-06 |
|
[ 586 ]
(Rev.1) |
Revised baseline text for X.soar-cc: Framework of Security Orchestration, Automation and Response for cloud computing
|
China Telecommunications Corporation
|
Q8/17
|
2024-02-06 |
|
[ 585 ]
|
Proposal for new work item X.cpn-tp-sec: Security requirements and architecture of transaction platform of computing power network
|
China Information Communication Technologies Group
,
China Unicom
,
Institute of Computing Technology Chinese Academy of Sciences (China)
,
ZTE Corporation (China)
|
Q2/17
|
2024-02-06 |
|
[ 584 ]
|
Proposal for new work item TR.saai: Guidelines for Security Evaluation on Artificial Intelligence Technology
|
China Mobile Communications Co. Ltd.
|
Q15/17
|
2024-02-06 |
|
[ 583 ]
|
Proposal for new work item TR.cs-uc: Use cases for extracting the security requirements for cyber security reference architecture
|
Soonchunhyang University (Korea (Rep. of))
|
Q1/17
|
2024-02-06 |
|
[ 582 ]
|
Proposal for new work item X.qsdlt-ca: Guidelines for quantum-safe DLT systems with crypto-agility
|
China Mobile Communications Co. Ltd.
|
Q14/17
|
2024-02-06 |
|
[ 581 ]
|
Proposal for new work item X.mbaas-sc-sec: Security requirements and framework of collaboration service for multiple blockchain as a service platforms
|
China Information Communication Technologies Group
,
China Unicom
,
ZTE Corporation (China)
|
Q8/17
|
2024-02-06 |
|
[ 580 ]
|
Proposal for new work item X.rf-dw: Requirements and application framework for digital watermarking
|
China Mobile Communications Co. Ltd.
|
Q7/17
|
2024-02-06 |
|
[ 579 ]
(Rev.1) |
Proposal for new work item X.gnssa-iot: Guidelines of network security situational awareness for IoT systems
|
China Telecommunications Corporation
|
Q6/17
|
2024-02-06 |
|
[ 578 ]
|
2nd Revised baseline text for X.sg-scmr: Security guidelines for selecting computing methods and resources from Cloud Service Providers
|
China Mobile Communications Co. Ltd.
|
Q8/17
|
2024-02-06 |
Resultados :827 documentos Resultados :
Anterior -
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11 -
12 -
13 -
14 -
15 -
16 -
17
- Siguiente

|
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):