Search results

Jump to: navigation, search
  • |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress
    2 KB (217 words) - 16:50, 19 November 2020
  • * Theory of Security in Networks According to the ICALP policy, for every accepted paper it is required that at least one author attends the meeting and delivers the t
    4 KB (602 words) - 06:44, 26 August 2020
  • * IT governance * Privacy, security, trust, and safety management
    3 KB (395 words) - 15:14, 24 September 2020
  • ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)
    2 KB (298 words) - 16:47, 5 July 2020
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • ...ance the state-of-the-art and practical applications of computer networks. It provides a publication vehicle for complete coverage of all topics of inter • Network Security and Privacy • Network Services and Applications
    3 KB (318 words) - 16:46, 5 July 2020
  • |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (217 words) - 16:57, 27 December 2015
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev
    3 KB (462 words) - 11:51, 22 March 2020
  • − Information Security and Applied Cryptography. ...ferences. The paper should not exceed twelve pages and should be edited so it can be properly printed on letter size paper.
    3 KB (367 words) - 16:37, 27 December 2015
  • ...ivilization that can resolve the conflict of civilizations, and how should it be discussed? 4-1-2. Is it possible to envisage the evolution or development of ethics?
    10 KB (1,552 words) - 17:04, 24 February 2016
  • ...range of audiences over large numbers of geographically dispersed people. It is evident that the satellite will play a complementary, but essential, rol - Security related issues of satellite communications
    9 KB (1,218 words) - 16:06, 1 October 2020
  • indexes so that it can be assessed easily. Revised and expanded version of the The 2012 International Conference of Information Security and Internet Engineering
    7 KB (909 words) - 16:30, 10 September 2020
  • ...ple. It is time to ask: can the Web be reimagined for the public good? Can it be made more human-centric, and if so, how? ...rity & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and trust for Web access; false news; data for the public good; and crime o
    6 KB (910 words) - 12:04, 31 January 2020
  • *Models to Support IT Management *Cyber Security and Privacy
    5 KB (663 words) - 11:49, 18 February 2020
  • * Trust, Data Privacy, and Security with Semantic Technologies ...ces. Each submission will be reviewed by several PC members who will judge it based on its innovativeness, appropriateness, and impact of results in term
    6 KB (872 words) - 14:00, 22 February 2020
  • • Information and data governance, information assurance, security, compliance • Role of mutual impact of society on/by IT (with focus on ontologies and databases)
    6 KB (872 words) - 23:11, 24 February 2020
  • ...st is a metropolitan region south of Brisbane on Australia’s east coast. It's famed for its long sandy beaches, surfing spots and elaborate system of i * Trust, privacy, and security on the Semantic Web
    5 KB (663 words) - 14:34, 5 December 2018
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • indexes so that it can be assessed easily. Revised and expanded version of the The 2013 International Conference of Information Security and Internet Engineering
    7 KB (903 words) - 16:27, 10 September 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)