Search results

Jump to: navigation, search
  • |Title=10th International Conference on Availability, Reliability and Security The 10th International Conference on Availability, Reliability and Security (ARES) 2015
    5 KB (590 words) - 11:54, 25 August 2020
  • * Algorithms for network optimization * Algorithms for information security and privacy
    4 KB (436 words) - 12:06, 25 August 2020
  • |Title=11th International Conference on Availability, Reliability and Security The 11th International Conference on Availability, Reliability and Security (ARES) 2016
    5 KB (581 words) - 12:47, 25 August 2020
  • |Title=13th International Conference on Security and Privacy in Communications Networks Also known as: 13th EAI International Conference on Security and Privacy in Communication Networks (EAI = European Alliance for Innovati
    3 KB (326 words) - 09:35, 10 September 2020
  • |Title=12th International Conference on Security and Privacy in Communications Networks Also known as: 12th EAI International Conference on Security and Privacy in Communication Networks (EAI = European Alliance for Innovati
    3 KB (336 words) - 09:51, 10 September 2020
  • * Social Network Management * Database Privacy and Security
    4 KB (478 words) - 11:05, 11 September 2020
  • |Title=4th International Conference on Networking, Systems and Security (NSysS) |Field=security
    4 KB (587 words) - 12:07, 5 November 2020
  • modeling; Security, privacy, and trust; Radio resource management; IT architectures for cognitive radio; Access schemes; Wireless network
    11 KB (1,377 words) - 20:26, 22 November 2020
  • network analysis, error detection of atmospheric data, exploring urban Model training, inference, and serving; Trust and security for machine
    9 KB (1,239 words) - 14:37, 29 December 2020
  • ...; Cognitive machine-to-machine networks; Adaptive multiple access schemes; Network service providers; Heterogeneous cellular networks; Caching in mobile cellu ENCOT: Emerging Network Communications and Technologies
    13 KB (1,574 words) - 12:11, 24 November 2020
  • ...power lines) in Smart Grids; Data aggregation, privacy considerations, and network data anonymization; Mobility issues in Smart Grids; Demand - response with Utilities and transportation assets; Smart Grid efficiency, security and reliability; Smart Grids and renewable technologies; Enabling active pa
    10 KB (1,235 words) - 18:42, 26 November 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    17 KB (2,035 words) - 14:45, 18 February 2021
  • ...; Access control in mobile environments; Advanced roaming concepts; Mobile network edge-based service delivery platforms; Mobile content delivery networks; Mo Security and privacy environments; Protection and safety of distributed mobile data;
    7 KB (868 words) - 15:11, 18 February 2021
  • ...king; Software defined radio and cognitive radio networking; Content-based network service; Certification, public key infrastructures, data integrity; Privacy ...d management; Denial of service mitigation and prevention; System and data security; Communication visualization
    11 KB (1,325 words) - 15:01, 18 February 2021
  • receivers; Traffic-aware of NFV (Network Function Virtualization); Based Management in wireless LANS and MANs; Wireless and Mobile Network
    12 KB (1,454 words) - 19:21, 30 November 2020
  • Delay-tolerant IoT; IoP and Smart cities; Multi-vendor NVF (Network Network)--based resilience; Policy-based NFV management; Performance of
    13 KB (1,607 words) - 19:32, 30 November 2020
  • ...-driven workflow design and management; Web content performance, accuracy, security, and reliability; Web content modeling; Web content-based applications; (Se ...S-China, HEVC); Video coders and decoders; Video surveillance and privacy; Network video recorders; Video streaming; Video data integrity (error detection, er
    13 KB (1,567 words) - 18:56, 8 December 2020
  • ...Collaborative services; Service business models; Service personalization; Security and trust in services ...or ubiquitous and pervasive services; Energy management and harvesting for network with ubiquitous and pervasive systems; Case studies, lessons learned, exper
    10 KB (1,221 words) - 18:57, 8 December 2020
  • routing; Communications modeling; Communications security; Autonomic security and reliability through linked data in cloud and fog computing;
    8 KB (1,012 words) - 10:45, 9 December 2020
  • OFDMA, MC-CDMA, DFTS-OFDM, IFDMA, OFDM-IDMA; RFID and Sensor Network home network technologies; Deployment, trial experience, business
    19 KB (2,346 words) - 10:51, 9 December 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)