Search results
Create the page "Computer Security" on this wiki! See also the search results found.
- |Field=Computer science ...business computer applications, consultants helping to properly implement computer technology and applications in the industry.6 KB (806 words) - 14:48, 16 November 2010
- security * Human-computer studies and validation of interaction12 KB (1,378 words) - 21:13, 28 November 2010
- |Title=CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - Volume 8, Issue 2 - March 2011 Issue CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - Volume 8, Issue 2 - March 2011 Issue4 KB (554 words) - 12:34, 14 October 2020
- |Title=CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - Volume 8, Issue 2 - March 2011 Issue CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - Volume 8, Issue 3 - May 2011 Issue4 KB (556 words) - 12:33, 14 October 2020
- |Title=CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - Volume 8, Issue 5 - September 2011 Issue CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - Volume 8, Issue 5 - September 2011 Issue4 KB (552 words) - 08:13, 10 December 2010
- |Title=CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - Volume 8, Issue 4 - July 2011 Issue CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - Volume 8, Issue 4 - July 2011 Issue4 KB (554 words) - 10:24, 6 July 2020
- |Title=CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - Volume 8, Issue 2 - March 2011 Issue CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - Volume 8, Issue 6 - November 2011 Issue4 KB (554 words) - 12:33, 14 October 2020
- |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability2 KB (217 words) - 16:57, 27 December 2015
- |Field=Computer science ...g area. The applied computing concentrates on the advanced techniques from computer science can solve complex problems found in industry, science or other area4 KB (505 words) - 08:07, 14 April 2011
- |Field=Computer security and reliability field of Systems Security, which has been created to build on the5 KB (701 words) - 05:52, 14 April 2011
- |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability5 KB (597 words) - 10:45, 21 August 2020
- ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...ver-increasing dependency on tightly interconnected, complex and pervasive computer systems and networks. The ubiquitous nature of our digital lifestyle presen3 KB (462 words) - 11:51, 22 March 2020
- |Title=International Workshop on Visualization and Information Security Management |Field=Security Management3 KB (468 words) - 00:17, 2 March 2011
- * Network Security ...or publication in the NCA Proceedings, which will be published by the IEEE Computer Society Press.3 KB (322 words) - 05:59, 8 March 2011
- |Title=17th International Congress on Computer Science Research |Field=Computer science3 KB (367 words) - 16:37, 27 December 2015
- ...Computer Science (Cloud Computing, Informational Retrieval, Informational Security, Mobile Platforms and others); ...nce (Biologically Plausible Modeling of Neurons and Neural Networks, Brain-computer Interface, Models of Synaptic Transmission, Models of Neuron Population and2 KB (306 words) - 14:54, 12 November 2020
- ...re aspects related to node behaviour, node nature, node interactions, node security, node privacy, network lifecycle, network performance, network security, network privacy, etc.7 KB (1,019 words) - 18:29, 8 April 2011
- |Field=Computer communications (networks) ...for an interdisciplinary field of R&D that combines signal processing with computer hardware and software technologies, and utilizes and integrates pervasive,4 KB (463 words) - 11:41, 1 July 2011
- |Field=Computer graphics * Internet, Web and Security Visualization4 KB (461 words) - 11:48, 1 July 2011
- |Title=International Conference on Computer Vision Theory and Applications (VISAPP) |Field=Computer vision4 KB (538 words) - 11:34, 21 February 2020