Search results

Jump to: navigation, search
  • ...ks. Features including the extremely large number of sensor devices in the network, the severe power, computing and memory limitations, their dense, random de * Cryptography, Security and trust
    6 KB (750 words) - 16:50, 27 December 2015
  • Computer System, Information Security and Networks • Network Dimensioning
    3 KB (319 words) - 17:07, 27 February 2009
  • ...l Applications, Practice, Extensions, XML, Open Source, Model Development, Network Modeling, Distributed Simulation and Industry, Modeling Very Large Scale Sy ...ng on line, Computational resources are becoming cheaper, while ubiquitous network access has started to appear.
    38 KB (4,832 words) - 17:07, 27 February 2009
  • | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability
    12 KB (1,690 words) - 17:08, 27 February 2009
  • | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability
    3 KB (480 words) - 17:08, 27 February 2009
  • | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability
    6 KB (828 words) - 17:08, 27 February 2009
  • * Measurement-based network management such as traffic engineering * Network applications such as multimedia streaming, gaming and on-line social networ
    6 KB (774 words) - 17:08, 27 February 2009
  • * Project, risk and security management * Social network analysis
    4 KB (571 words) - 12:58, 9 March 2020
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • * Network management and planning * Network topology
    1 KB (148 words) - 10:22, 29 May 2016
  • - Web Security and Privacy - Network systems, proxies and servers
    3 KB (440 words) - 15:25, 9 December 2009
  • |Title=5th European Conference on Computer Network Defence |Field=Computer security and reliability
    4 KB (530 words) - 15:02, 27 December 2015
  • |Title=International Workshop on Wireless Multimedia Computing and Security Services - Security, privacy, and cryptographic protocols for WMC
    3 KB (477 words) - 16:54, 8 August 2009
  • |Field=Network Virtual Environment -Trust and security issues in P2P systems
    5 KB (738 words) - 16:48, 10 August 2009
  • * Network architectures and protocols * Network security and intrusion detection
    5 KB (630 words) - 11:13, 1 November 2009
  • * Coordination and deployment of multi-robots system or wireless sensors network on site, * Security issues in agent-based systems for search and rescue missions, use of games,
    6 KB (783 words) - 17:04, 27 December 2015
  • | Title = International journal of Network Security & Its Applications (IJNSA) International journal of Network Security & Its Applications (IJNSA)
    3 KB (339 words) - 11:32, 2 August 2009
  • ...their research results and address open issues in Wireless Communications, Network Technologies, Services and Application. Network Technologies
    2 KB (230 words) - 11:32, 2 August 2009
  • * Network-based applications * Network Security
    7 KB (1,054 words) - 16:43, 27 December 2015
  • * Data privacy and security * Social Network Analysis
    4 KB (553 words) - 11:33, 2 August 2009
  • Information security IT and network security
    2 KB (258 words) - 11:33, 2 August 2009
  • - Social network analysis and mining - Personalization, security and privacy
    4 KB (525 words) - 11:34, 2 August 2009
  • Web Security and Privacy Network systems, proxies and servers
    4 KB (564 words) - 12:01, 6 November 2020
  • |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security
    5 KB (599 words) - 10:21, 20 November 2020
  • * Self-aware and self- adaptive network design and evaluation * Network self-healing, security and self-defence
    4 KB (479 words) - 11:35, 2 August 2009
  • to refer specifically to network performance and reliability dependability, security, accuracy, customer service, trust, etc.). The
    8 KB (1,033 words) - 11:35, 2 August 2009
  • | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)
    6 KB (746 words) - 11:35, 2 August 2009
  • ...so on. Novel mechanisms and designs are required which integrate QoI with network and computational QoS that take into account the aforementioned challenges - Network services (time sync, QoS) for target/event detection, localization, trackin
    5 KB (734 words) - 11:35, 2 August 2009
  • ...o enable seamless, smooth, and reliable multimedia streaming over wireless network. * Security issues and solutions for mobile multimedia retrieval.
    5 KB (674 words) - 11:35, 2 August 2009
  • ...pers, IPSN is very interested in showcasing demonstrations of novel sensor network technology, applications, and hardware as well as posters showing exiting e ...Sensor Networks (IPSN) is a leading, single-track, annual forum on sensor network research. IPSN brings together researchers from academia, industry, and gov
    8 KB (1,119 words) - 09:57, 27 February 2020
  • ? Network design and planning ? Security and privacy
    5 KB (571 words) - 11:35, 2 August 2009
  • Global Production Network Risk and Security Management
    4 KB (462 words) - 11:36, 2 August 2009
  • ...ices into every day’s life processes. This leads to a highly distributed network of devices communicating with human beings as well as other devices. With t ...onse time, resource consumption, throughput, availability, reliability and security.
    9 KB (1,206 words) - 11:40, 2 August 2009
  • ...ons and Technologies - Applications, Protocols, Algorithms, Simulators and Security Security aspects
    3 KB (339 words) - 11:36, 2 August 2009
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    14 KB (1,651 words) - 15:56, 15 February 2017
  • |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security
    3 KB (352 words) - 12:39, 11 August 2009
  • * Database Security and Transaction Support * Advanced Applications of Neural Network
    5 KB (552 words) - 17:06, 12 August 2009
  • |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability
    6 KB (766 words) - 10:54, 26 April 2010
  • |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security
    5 KB (667 words) - 14:27, 13 September 2009
  • * Application security * Blended Internet security methods
    5 KB (607 words) - 18:01, 3 December 2009
  • |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust
    4 KB (484 words) - 14:20, 14 December 2009
  • |Title=3rd International Workshop on Wireless Multimedia Computing and Security Services ...ward for a deeper understanding in wireless multimedia computing (WMC) and security services.
    3 KB (497 words) - 03:43, 28 February 2010
  • ...ometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications in the above themes. Fuzzy and neural network systems
    3 KB (382 words) - 18:27, 20 January 2010
  • |Title=3rd International Conference on Security of Information and Networks |Field=Computer security
    10 KB (1,270 words) - 17:12, 20 April 2010
  • |Title=The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems
    3 KB (338 words) - 16:53, 27 December 2015
  • * › Mobile Network Protocols and Packet Services * › Adaptive Wireless Network Protocols
    4 KB (379 words) - 15:35, 5 February 2010
  • |Title=International Conference on Security and Cryptography |Field=Computer security and reliability
    4 KB (409 words) - 15:40, 5 February 2010
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • |Title=Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments |Field=Computer security and reliability
    3 KB (498 words) - 02:52, 22 December 2012
  • - Simulation issues of large-scale VCS and integration of traffic-network simulators - Security, encryption and privacy for vehicular systems
    5 KB (624 words) - 21:14, 4 March 2010
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc * Cloud Security
    4 KB (405 words) - 20:45, 3 November 2010
  • - Security for enabling eCommerce - Trust & Security Issues in e-Commerce
    4 KB (601 words) - 00:22, 28 March 2010
  • |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress
    2 KB (217 words) - 16:50, 19 November 2020
  • |Superevent=2010 secau Security Congress '''INFORMING SECURITY'''
    2 KB (215 words) - 06:52, 13 April 2010
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • - Security of Communication Networks - Network-based Applications (VoIP, streaming)
    5 KB (667 words) - 12:08, 19 May 2010
  • ...eral disciplines and applications (military, industrial, medical, homeland security, etc.) with the aim of collecting and distributing observations of our worl › Sensor/Sensor Network Ontology Engineering
    5 KB (639 words) - 16:17, 20 May 2010
  • 5. WEB SECURITY * › Web Security and Privacy
    5 KB (627 words) - 12:33, 16 June 2010
  • |Field=Network Virtual Environment - Trust and security issues in P2P systems
    6 KB (858 words) - 09:18, 19 August 2010
  • |Title=The Third International Workshop on Systems and Network Telemetry and Analytics (SNTA2020) |Field=systems and network telemetry, Machine learning, data science, High-performance computing, Dist
    4 KB (584 words) - 17:42, 13 March 2020
  • |Title=Usenix Network and Distributed System Security Symposium |Field=Security
    147 bytes (20 words) - 00:56, 28 February 2020
  • *Network and system architectures and protocols *Security and privacy
    3 KB (412 words) - 09:52, 27 February 2020
  • |Title=Usenix Network and Distributed System Security Symposium
    684 bytes (84 words) - 11:33, 10 March 2020
  • * › Database Security and Transaction Support * › Advanced Applications of Neural Network
    19 KB (2,462 words) - 19:10, 26 August 2010
  • * Foundations of Privacy, Trust and Reputation in Network * Network Models for Distributed Computing
    4 KB (602 words) - 06:44, 26 August 2020
  • |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium
    3 KB (343 words) - 16:31, 6 May 2020
  • NEURAL NETWORK MODELS * Neural network approaches to optimization
    5 KB (574 words) - 15:58, 6 March 2020
  • * Security in distributed computing, cryptographic protocols * System-on-chip and network-on-chip architectures
    3 KB (344 words) - 11:30, 21 April 2020
  • Network algorithms • Network architectures
    4 KB (579 words) - 15:24, 13 October 2010
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • ...s a publication vehicle for complete coverage of all topics of interest to network professionals and brings to its readers the latest and most important findi • Network Architectures and Protocols • Network Coding
    3 KB (318 words) - 16:46, 5 July 2020
  • ...practical aspects of health informatics and bioinformatics and a chance to network with others working and researching in this or related areas. Security, Ethics and Privacy
    5 KB (693 words) - 10:44, 14 November 2010
  • * Scale-free network structure of Cyber Physical Systems * System-on-Chip and Network-on-Chip Design
    12 KB (1,378 words) - 21:13, 28 November 2010
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 12:34, 14 October 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (556 words) - 12:33, 14 October 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (552 words) - 08:13, 10 December 2010
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 10:24, 6 July 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 12:33, 14 October 2020
  • |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (217 words) - 16:57, 27 December 2015
  • ...ecial Issue on Smart Protocols and Algorithms of the International Journal Network Protocols and Algorithms (ISSN 1943-3581) ...ng capacity let us include more complex algorithms that can be used by the network device to enhance the communication procedure.
    6 KB (833 words) - 15:16, 24 September 2020
  • |Field=Computer security and reliability `SysSec <http://syssec-project.eu>`_ is a Network of Excellence in the
    5 KB (701 words) - 05:52, 14 April 2011
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev
    3 KB (462 words) - 11:51, 22 March 2020
  • |Title=10th IEEE International Symposium on Network Computing and Applications The IEEE International Symposium on Network Computing and Applications is seeking articles concerning fundamental resea
    3 KB (322 words) - 05:59, 8 March 2011
  • A rational network can be defined as a network in which rational (self interested) participants have no reason to deviate from the actual network intended purposes (critical or not). To this
    7 KB (1,019 words) - 18:29, 8 April 2011
  • * Network Optimization * Security
    3 KB (283 words) - 11:37, 1 July 2011
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc Service and Systems Design and QoS Network Security
    5 KB (677 words) - 11:59, 1 July 2011
  • ...Applications, Society, e-Communities, e-Business, Web Intelligence and Web Security. Web Security and Privacy
    5 KB (612 words) - 12:07, 1 July 2011
  • *Network Interfaces *Network Management
    13 KB (1,774 words) - 18:35, 31 August 2011
  • * What does a network of truly interconnected documents look like? How could interoperability acr ...semantic technologies for HealthCare, Medical Informatics and Computer Security. Projects with high relevance to social networking, low-tech environments
    8 KB (1,106 words) - 15:50, 20 July 2011
  • - Security related issues of satellite communications - Infrastructure and network management
    9 KB (1,218 words) - 16:06, 1 October 2020
  • Network models (mobility models, traffic models, network topology) Security and emergency applications
    6 KB (809 words) - 16:26, 28 September 2011
  • Don't miss out on the opportunity to network with international researchers and practitioners and discuss the latest res *Privacy and Security
    5 KB (669 words) - 14:40, 20 December 2011
  • Information Security Network Management
    8 KB (1,085 words) - 16:28, 6 February 2012
  • - SOFTNETWORKING: Advances in Software Defined Networking and Network Communications modeling; Communications security; Computer
    6 KB (725 words) - 19:58, 22 November 2020
  • Neural network Head of 'Decision Support and Control Systems' Network Research Centre and Director of Postgraduate Admissions,
    11 KB (1,490 words) - 11:59, 27 January 2012
  • |Field=Computer security and reliability * Cyber Security
    2 KB (304 words) - 10:54, 5 March 2012
  • Energy-aware network equipments and applications Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability
    10 KB (1,297 words) - 17:49, 24 February 2012

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)