Cyber Security Research Center
GPTKB entity
Statements (55)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Research_Institute
|
gptkbp:analyzes |
Cyber Threats
Security Breaches |
gptkbp:collaboratesWith |
Government Agencies
Universities Private Sector Companies |
gptkbp:conducts |
Workshops
Penetration Testing Vulnerability Assessments |
gptkbp:conductsResearchOn |
Information Security
Network Security Data Protection |
gptkbp:develops |
Security Tools
Incident Response Plans |
gptkbp:engagesIn |
Community Outreach
Public Awareness Campaigns |
gptkbp:focusesOn |
Threat Intelligence
Compliance Standards Cyber Security |
gptkbp:hasEvents |
gptkb:National_Cybersecurity_Awareness_Month
gptkb:Cybersecurity_Awareness_Month Workshops and Seminars Data Privacy Day Cybersecurity_Conferences |
gptkbp:hasExhibition |
Incident Response
Risk Management Malware Analysis |
gptkbp:hasFunding |
Government Grants
Private Donations |
gptkbp:hasPartnershipsWith |
Tech Companies
|
gptkbp:hasPrograms |
Academics
Policy Makers Industry Experts |
gptkbp:hasPublications |
Conferences
Journals |
gptkbp:hasResearchInterest |
Cryptography
Cloud Security Mobile Security IoT Security Blockchain Security |
gptkbp:hosts |
Conferences
|
https://www.w3.org/2000/01/rdf-schema#label |
Cyber Security Research Center
|
gptkbp:offers |
Online Courses
Workshops Training Programs Internship Programs |
gptkbp:participatesIn |
International_Collaborations
|
gptkbp:provides |
Research Grants
Technical Support Policy Recommendations Security Audits Consulting_Services Cybersecurity_Certifications |
gptkbp:publishes |
Research Papers
|
gptkbp:utilizes |
Advanced_Technologies
|