ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 92016 | ISO/IEC WD 14888-6 | Information security — Digital signatures with appendix — Part 6: Stateless hash-based mechanisms | Izstrādē |
| 92017 | ISO/IEC AWI 14888-5 | Information security — Digital signatures with appendix — Part 5: Lattice-based mechanisms | Izstrādē |
| 92164 | ISO/IEC AWI 25959 | Information security, cybersecurity and privacy protection — Application of attack potential to deep learning-based technology | Izstrādē |
| 92416 | ISO/IEC CD 27007 | Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing | Izstrādē |
| 92749 | ISO/IEC NP 26160 | Information security, cybersecurity and privacy protection — Enhancing the ISO/IEC 15408 series and ISO/IEC 18045 for the Evaluation of Artificial Intelligence (AI) Functionality | Izstrādē |
| 92936 | ISO/IEC PWI TR 26239 | Cybersecurity education and training | Izstrādē |
| 92942 | ISO/IEC PWI 26241 | Consideration of transciphering mechanisms for future ISO/IEC standardization | Izstrādē |
| 92943 | ISO/IEC PWI 26242 | An analysis of consolidation of vocabulary used in ISO/IEC 15408 (multipart) and ISO/IEC 18045 (WG 3 N2965) | Izstrādē |
| 92944 | ISO/IEC PWI TR 26245 | Information security, cybersecurity and privacy protection — Best practices on reuse of single evaluations for multipurpose usage | Izstrādē |
| 92945 | ISO/IEC AWI 29147 | Cybersecurity — Vulnerability disclosure processes | Izstrādē |
Displaying 771-780 of 791 results.
