Search results

Jump to: navigation, search

Page title matches

Page text matches

  • * Security issues of data management in wireless networks MEXT grant-in-aid for Priority area Research called Cyber
    5 KB (611 words) - 15:43, 16 September 2008
  • ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are
    18 KB (2,408 words) - 02:37, 16 December 2008
  • * Security, Privacy and Trust * WWW, Semantic Web and Cyber World
    34 KB (4,565 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust * WWW, Semantic Web and Cyber World
    8 KB (1,037 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust * WWW, Semantic Web and Cyber World
    9 KB (1,189 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust * WWW, Semantic Web and Cyber World
    26 KB (3,456 words) - 22:20, 10 January 2018
  • IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009)
    3 KB (376 words) - 17:47, 14 October 2008
  • .Cyber-Physical Systems .Network Protocol and Security
    3 KB (375 words) - 17:48, 14 October 2008
  • ...structure and theory, as well as two additional areas of special emphasis: cyber-physical systems and embedded applications, benchmarks and tools. ...cations o real-time resource management and scheduling o embedded system security o programming languages and software engineering for real-time or
    8 KB (939 words) - 17:48, 14 October 2008
  • - Building Smart Worlds in Real and Cyber Spaces - * Real/Cyber World Modeling and Semantics
    7 KB (942 words) - 20:05, 14 October 2008
  • Cyber Law • Ethical, Social, Privacy, Security and moral Issues in an e-societ
    5 KB (530 words) - 10:27, 24 June 2011
  • - Data Security Issues - IS Security Issues
    6 KB (780 words) - 20:06, 14 October 2008
  • * Cyber Crimes * Security Technologies
    2 KB (193 words) - 20:06, 14 October 2008
  • | Title = IEEE Symposium on Computational Intelligence in Cyber Security
    585 bytes (66 words) - 23:03, 14 October 2008
  • b. Security/accreditation c. Cyber Security
    16 KB (2,200 words) - 20:51, 18 February 2021
  • Cyber Security
    3 KB (427 words) - 17:01, 29 May 2016
  • | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability
    5 KB (673 words) - 23:19, 14 October 2008
  • embedded and cyber physical systems design: o Language features to enhance reliability and security
    5 KB (673 words) - 23:30, 14 October 2008
  • ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.
    5 KB (580 words) - 10:32, 12 May 2020
  • * Formal methods for cyber-physical systems * Formal models and methods for security
    2 KB (291 words) - 11:09, 20 November 2020
  • Cyber threats, emerging risks, systemic concerns, and emergency preparedness Trust, security, and privacy
    8 KB (1,075 words) - 23:52, 14 October 2008
  • * Cyber-physical computing and networking * Security, trust, & privacy
    3 KB (380 words) - 19:34, 17 November 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • - Safety & Security Assurance of Avionic & Medical Cyber-Physical Systems.
    1 KB (187 words) - 21:13, 12 July 2020
  • large-scale application domains such as Healthcare, Cyber-Physical Systems, 3. RTSOAA for Cyber-Physical Systems
    7 KB (922 words) - 00:58, 9 January 2009
  • |Title=Conference on Cyber Warfare |Field=Internet security
    2 KB (219 words) - 17:25, 14 January 2009
  • ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Computer and Network Security Systems
    5 KB (526 words) - 01:02, 2 February 2009
  • Trust, Privacy & Security in Digital Business (TrustBus'09) Security patterns have arrived to a stage where there are a significant
    6 KB (740 words) - 12:58, 18 January 2009
  • | Title = The International Workshop on Cyber Physical and Social Computing ...cal, economic and social revolution have changed the world we are used to. Cyber-Physical Systems (CPS)
    3 KB (446 words) - 13:02, 18 January 2009
  • o Cyber-terrorism and cyber-crime; ...nticipating and responding to attacks that cross international boundaries; cyber crime
    4 KB (557 words) - 16:33, 27 February 2009
  • 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.
    7 KB (897 words) - 17:05, 27 February 2009
  • * Cyber-physical computing/networking * Security, trust, & privacy
    4 KB (559 words) - 17:06, 27 February 2009
  • Special theme: Cyber Engineering and Human Space Computing ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver
    7 KB (941 words) - 17:07, 27 February 2009
  • spontaneously in cyber space and with the cyber physical world, create content in harmony with societal values and economic viability, with enhanced security,
    11 KB (1,440 words) - 17:08, 27 February 2009
  • Information security IT and network security
    2 KB (258 words) - 11:33, 2 August 2009
  • Web Security and Privacy Cyber threats
    4 KB (564 words) - 12:01, 6 November 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    14 KB (1,651 words) - 15:56, 15 February 2017
  • |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability
    6 KB (766 words) - 10:54, 26 April 2010
  • - Internet security - Cyber law
    4 KB (507 words) - 22:37, 18 November 2009
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • ...of research in networked embedded sensing systems. The currently emerging cyber-physical systems community emphasizes the integration of actuation and cont * Security and Privacy
    8 KB (1,066 words) - 19:39, 8 July 2010
  • * Cyber-physical systems and Internet of Things (IoT) * Privacy, security, trust, and safety management
    3 KB (395 words) - 15:14, 24 September 2020
  • - Internet security - Cyber law
    6 KB (732 words) - 05:52, 5 December 2010
  • * Cyber-Physical & Cooperative Systems Cyber-Physical & Cooperative Systems
    12 KB (1,378 words) - 21:13, 28 November 2010
  • ...cannot afford, as a country, to be left behind. It events such as a cyber security challenge bring otherwise hidden talents forward, then that's a good thing.
    326 bytes (55 words) - 01:08, 26 June 2012
  • ...and practical implementation for low-power/energy, high dependability and security, etc.. The SAAES special session addresses these important and challenging ...elf-aware and Adaptive Operations for Energy Efficiency, Dependability and Security
    4 KB (598 words) - 18:55, 23 December 2010
  • ...and practical implementation for low-power/energy, high dependability and security, etc.. The SAAES special session addresses these important and challenging ...elf-aware and Adaptive Operations for Energy Efficiency, Dependability and Security
    4 KB (593 words) - 17:49, 7 January 2011
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev
    3 KB (462 words) - 11:51, 22 March 2020
  • ...ated, multi-domain system modeling: architectural models, resource models, cyber-physical models, service models, etc. ...ional aspects (such as performance, quality of service, real-time aspects, security, etc.)
    5 KB (598 words) - 17:05, 24 February 2016
  • - Internet security - Cyber law
    5 KB (595 words) - 05:03, 15 January 2012
  • • SASO Principles in Cyber-Security • SASO Principles in Cyber-Physical Systems
    7 KB (969 words) - 04:02, 17 January 2012
  • |Title=3rd International Cyber Resilience Conference |Field=Computer security and reliability
    2 KB (304 words) - 10:54, 5 March 2012
  • |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security
    4 KB (581 words) - 18:48, 24 February 2020
  • |Title=19th International Conference on Applied Cryptography and Network Security |Field=computer security
    870 bytes (109 words) - 19:16, 22 January 2021
  • *Cyber Security and Privacy
    5 KB (663 words) - 11:49, 18 February 2020
  • ...gineering || Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Cyber physical systems || Knowledge acquisition and management || Refactoring ||
    6 KB (738 words) - 11:21, 6 July 2020
  • *Security and privacy, cryptographic protocols *Internet of things and cyber-physical systems
    2 KB (299 words) - 11:51, 8 April 2020
  • |Field=terrorism, national security, crime, politics, law |Superevent=secau Security Congress
    4 KB (575 words) - 05:16, 28 June 2012
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • 3. International Journal of Cyber-Security and Digital Forensics (IJCSDF) http://sdiwc.net/security-journal/
    4 KB (491 words) - 22:39, 28 August 2012
  • ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Cyber-physical systems
    3 KB (375 words) - 15:06, 24 September 2020
  • * Information/Cyber Security * Information Security
    3 KB (408 words) - 11:39, 5 January 2013
  • - Internet security - Cyber law
    4 KB (535 words) - 14:38, 17 January 2013
  • - Cyber-identities and privacy ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust
    5 KB (702 words) - 10:02, 5 March 2013
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • *Cyber Security *Security & Cryptography
    3 KB (308 words) - 17:30, 26 May 2016
  • *Information Security and Cryptography *Network and Cyber Security
    2 KB (227 words) - 11:30, 21 June 2016
  • ...istributed platforms, middleware, embedded- and cyber-physical-systems and security infrastructures. *Quality Aspects: Functionality, interoperability, performance, conformance, security, reliability, robustness, etc.
    3 KB (405 words) - 10:56, 24 April 2016
  • |Title=CYMADA 2016 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...rity assessment, cyber risk management, cyber training technologies, cyber security data analytics
    514 bytes (63 words) - 20:31, 1 June 2016
  • ...IEICE Transactions Special Section on Information and Communication System Security (August 2017) |Field=security, informatioin security, network security, cyber security
    421 bytes (51 words) - 15:56, 15 February 2017
  • |Title=CCOE - CFP 2016 : Cyber Center of Excellence (CCOE) Call For Research Papers |Field=cyber security, computer science, electronic warfare, quantum computing
    465 bytes (61 words) - 16:52, 18 February 2021
  • |Title=PiSecon 2017 : 3rd Pirate Security Conference |Field=security, cyber, GOVERNANCE, defense
    367 bytes (44 words) - 15:35, 27 August 2016
  • |Title=MLSCPS 2016 : 2016 IEEE Workshop on Machine Learning in Security of Cyber-Physical Systems (MLSCPS) |Field=machine learning, cyber security, cyber-physical system, IEEE
    469 bytes (59 words) - 15:06, 17 August 2016
  • |Title=SMGSSP 2017: Smart Micro-Grid Systems Security and Privacy |Field=privacy, security, smart micro-grids, cyber-physical systems
    2 KB (246 words) - 09:12, 3 September 2017
  • - Internet security - Cyber law
    5 KB (641 words) - 22:32, 29 July 2016
  • |Acronym=JIP SI: Computer Security Technologies 2017 ...pecial issue of “Computer Security Technologies against Sophisticated Cyber Attacks”
    513 bytes (62 words) - 14:44, 6 November 2020
  • |Title=CyberSec 2017 : The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic |Field=security, cyber security, cyber welfare, digital forensic
    462 bytes (44 words) - 15:07, 25 September 2016
  • * Software & System Security ** Software and system security and privacy
    18 KB (2,288 words) - 12:48, 27 October 2016
  • complex cyber systems for smart cities requires the use of state-of-the-art - Smart city system security and privacy
    4 KB (565 words) - 09:46, 7 February 2017
  • *security and privacy *internet of things and cyber-physical systems
    10 KB (1,309 words) - 10:29, 5 June 2019
  • Cyber monitoring, incident response Big data security, Database security
    3 KB (464 words) - 09:30, 3 September 2017
  • |Title=ICISS 2017 : International Conference on Information Systems Security |Field=security
    5 KB (626 words) - 12:02, 3 September 2017
  • |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
    5 KB (722 words) - 10:00, 21 August 2017
  • |Title=DMCS 2017 : DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17) |Field=security
    4 KB (626 words) - 09:30, 3 September 2017
  • |Title=SPIoT 2017 : The 6th International Symposium on Security and Privacy on Internet of Things |Field=security
    3 KB (379 words) - 12:01, 3 September 2017
  • and network security. • Cyber surveillance for unlawful activities for critical infrastructure
    4 KB (442 words) - 10:00, 21 August 2017
  • - Cyber-Infrastructure for Big Data - Big Data Privacy and Security
    4 KB (583 words) - 10:01, 3 September 2017
  • 2. Security and Intelligence 3. Information Security
    4 KB (507 words) - 09:52, 3 September 2017
  • Computer Security SEC Cyber-Physical Systems CPS
    5 KB (660 words) - 13:50, 8 April 2020
  • communication, Cyber-Physical Systems (CPSs), Mobile-Edge Computing, Social -SOCA in IoT and Cyber-Physical Systems
    4 KB (494 words) - 13:20, 28 July 2017
  • Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile and network infrastructures; Crowd sourcing; Reliability, Security, Privacy and
    4 KB (508 words) - 13:23, 28 July 2017
  • of man and machine in a cyber world : Smart response to challenges of smart Homeland Security
    3 KB (324 words) - 13:34, 5 December 2017
  • * Test, Verification, and Security of Digital Systems * Embedded and Cyber-Physical systems
    1 KB (178 words) - 10:05, 20 November 2020
  • cyber-physical systems. Enabling a smart life has become a popular research communications, from smart cloud computing to smart security. The conference is
    3 KB (412 words) - 11:51, 3 September 2017
  • |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security
    4 KB (565 words) - 17:27, 18 February 2021
  • |Field=security Communications Systems, Embedded Systems and Information Security , to attract a
    6 KB (743 words) - 11:45, 8 August 2017
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security
    5 KB (611 words) - 11:47, 8 August 2017
  • networks, peer-to-peer, mobile and wireless systems, cyber-physical scalability, elasticity, availability, reliability, and security.
    11 KB (1,364 words) - 13:23, 3 September 2017
  • |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer
    5 KB (571 words) - 11:53, 3 September 2017
  • Information Security Network Security
    2 KB (269 words) - 11:57, 3 September 2017
  • |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service
    5 KB (571 words) - 10:51, 3 September 2017
  • ...International Association for Cryptologic, Technion Hiroshi Fujiwara Cyber Security Research Center
    1 KB (168 words) - 12:19, 24 May 2019
  • *A Maturity Model for IT-related Security Incident Management *Cyber Treat Intelligence Modeling
    7 KB (917 words) - 18:07, 17 March 2020
  • *Cyber-security, Privacy and Ethics of IS
    2 KB (215 words) - 10:18, 12 June 2019
  • * Security and privacy in mobile and wireless systems, * Cyber foraging and resource discovery for mobile services,
    4 KB (479 words) - 10:05, 17 August 2023
  • Cyber computing Security
    4 KB (401 words) - 07:52, 29 July 2020
  • '''Security''' * Secure document workflows, policy, and access, security for mobile and printing devices
    3 KB (368 words) - 07:27, 17 April 2020
  • |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
    11 KB (1,549 words) - 11:34, 17 April 2020
  • |Title=39th International Conference on Computer Safety, Reliability and Security The 39th International Conference on Computer Safety, Reliability and Security ( SafeComp)
    5 KB (617 words) - 11:54, 19 June 2020
  • === Information Security === ...lysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies.
    3 KB (314 words) - 11:52, 27 March 2020
  • |Title=17th International Conference on Trust, Privacy and Security in Digital Business ...lack of trust in electronic procedures and the extent to which information security and user privacy can be ensured.
    5 KB (690 words) - 12:02, 26 March 2020
  • |Title=16th EAI International Conference on Security and Privacy in Communication Networks * Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
    2 KB (299 words) - 13:10, 30 March 2020
  • * IoT and cyber-physical systems, * security and practical applications of cryptography,
    2 KB (210 words) - 12:33, 22 December 2020
  • |Title=14th International Conference on Provable and Practical Security ...s are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:
    2 KB (208 words) - 10:19, 9 April 2020
  • |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions
    2 KB (195 words) - 11:08, 9 April 2020
  • * Software & System Security * Software and system security and privacy
    5 KB (608 words) - 13:03, 15 April 2020
  • *IoT and cyber-physical systems, *security and practical applications of cryptography,
    3 KB (303 words) - 08:58, 16 April 2020
  • * cyber-physical systems, * security and practical applications of cryptography,
    2 KB (222 words) - 11:23, 16 April 2020
  • ...rmation processing; Biometric analysis, forensic analysis watermarking and security; Processing signal, image and video collections; Implementation of signal, ...ons Networks and mm-Wave Systems; Cognitive radio networks; Cyber-physical security; Social networks and finance applications, etc.
    10 KB (1,215 words) - 14:46, 19 April 2020
  • ...ced Metering Infrastructure); QoS, latency and reliability in Smart Grids; Security (including wireless, wire-line, broadband over power lines) in Smart Grids; ...Business issues for Smart Grids; Resilient operations against physical and cyber attacks, and natural disasters; Power quality operations in a digital econo
    10 KB (1,331 words) - 14:52, 19 April 2020
  • ...hoc networks; Opportunistic unlicensed spectra utilization; Adaptation in Cyber-physical systems; Service availability models ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;
    14 KB (1,770 words) - 14:56, 19 April 2020
  • Document system components: security, versioning, synchronization ==== Security ====
    3 KB (361 words) - 14:48, 22 April 2020
  • * How can MAS help developing Cyber-Physical Systems and Internet-of-Things? Which development tools and framew safety and security for mobile MAS deployment
    8 KB (1,092 words) - 12:49, 22 April 2020
  • |Title=38th International Conference on Computer Safety, Reliability, and Security The 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP)
    3 KB (419 words) - 10:51, 19 June 2020
  • Document system components: security, versioning, synchronization ==== Security ====
    3 KB (363 words) - 14:44, 22 April 2020
  • * Software & System Security * Software and system security and privacy
    4 KB (490 words) - 09:38, 23 April 2020
  • * - Simulation for Cybersecurity and Cyber-Physical Systems * - Security in Computer and Telecommunication Systems
    5 KB (640 words) - 13:03, 5 May 2020
  • ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc. ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of serv
    4 KB (457 words) - 10:25, 6 May 2020
  • ...x effects, which must be controlled to adhere to safety, availability, and security guarantees where needed. This special day will cover the latest trends in a ...lidation challenges, and test or fault injection methods addressing system security.
    12 KB (1,651 words) - 13:30, 27 November 2020
  • |Title=37th International Conference on Computer Safety, Reliability, and Security The 37th International Conference on Computer Safety, Reliability and Security (SAFECOMP)
    4 KB (475 words) - 10:23, 19 June 2020
  • * 2.5. Cyber physical system * 13. Hardware and Embedded Security:
    6 KB (739 words) - 15:08, 13 May 2020
  • * Autonomic Computing and Cyber-infrastructure, System Architectures, Design and Deployment * Visualizing Large Scale Security Data
    4 KB (563 words) - 15:55, 23 June 2020
  • * Autonomic Computing and Cyber-infrastructure, System Architectures, Design and Deployment * Visualizing Large Scale Security Data
    5 KB (543 words) - 21:14, 18 May 2020
  • * Security and intrusion detection ...omputational chemistry, finance, eco-informatics, marketing, gaming, cyber-security, and industry-related problems
    2 KB (261 words) - 20:06, 20 May 2020
  • Security and intrusion detection ...omputational chemistry, finance, eco-informatics, marketing, gaming, cyber-security, and industry-related problems
    2 KB (268 words) - 20:28, 20 May 2020
  • * Security and intrusion detection ...omputational chemistry, finance, eco-informatics, marketing, gaming, cyber-security, and industry-related problems
    2 KB (272 words) - 21:17, 20 May 2020
  • * Autonomic Computing and Cyber-infrastructure, System Architectures, Design and Deployment * Visualizing Large Scale Security Data
    9 KB (1,187 words) - 14:18, 27 May 2020
  • * Cyber Physical Systems * Intelligence for Security
    2 KB (239 words) - 14:17, 2 June 2020
  • ...s; Automatic computing for Web services; Web services challenges on trust, security, performance, scalability; Enterprise Web services; Web services discovery, ...chitectures, techniques, paradigms; P2P programming and data handling; P2P security features; Data and compute intensive applications; P2P networks and protoco
    14 KB (1,804 words) - 13:49, 5 June 2020
  • ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...digital health services; Monitoring mission-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assess
    17 KB (2,088 words) - 12:49, 14 June 2020
  • |Title=36th International Conference on Computer Safety, Reliability, and Security ...ustrial Computer Systems, Technical Committee 7 on Reliability, Safety and Security (EWICS TC7). Since then, it has contributed to the progress of the state-of
    4 KB (457 words) - 11:48, 17 June 2020
  • |Title=Conference on the Decision and Game Theory for Security ...eneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-re
    401 bytes (52 words) - 06:54, 23 June 2020
  • |Title=11th Conference on Decision and Game Theory for Security 2020 Conference on Decision and Game Theory for Security
    3 KB (353 words) - 12:35, 23 June 2020
  • |Title=9th Conference on Decision and Game Theory for Security 2018 Conference on Decision and Game Theory for Security
    3 KB (423 words) - 11:27, 23 June 2020
  • |Title=8th Conference on Decision and Game Theory for Security 2017 Conference on Decision and Game Theory for Security
    3 KB (407 words) - 11:20, 23 June 2020
  • Cyber-manufacturing systems Intelligent security systems and applications
    5 KB (599 words) - 19:46, 9 July 2020
  • ...DN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality ...and discovery of things on the Internet; Crowd-sourcing and things; Trust, security and privacy in Internet of Things; Lightweight implementations of cryptogra
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ...applications; Advances on software product line engineering; Software for Cyber-physical systems; Internet-of-Things (IoT)-oriented software; Software for ...ased software development; Service-oriented software development; Software security-based development; Aspect-oriented software development
    13 KB (1,573 words) - 12:00, 10 July 2020
  • ...; Methods and tools for system quality prediction; Reliability prediction; Security prediction; Risk prediction; Performance prediction; Uncertainty handling i ...simulations /reliability, queuing, fault spreading, virus contamination/; Cyber-attack modeling and simulation; Sensor fusion simulation
    12 KB (1,421 words) - 12:02, 10 July 2020
  • Cyber computing Security
    4 KB (422 words) - 08:30, 29 July 2020
  • |Title=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies
    15 KB (1,886 words) - 16:16, 25 August 2020
  • |Field=Networking,Internet,Security,Sensor,Hardware,Technologies ...nts; Evolving software ecosystems; Component semantic similarity analysis; Security variability; Industrial lessons; Customer considerations on post-integratio
    6 KB (769 words) - 14:09, 24 August 2020
  • '''2. Security, Privacy, and Trust''' Physical layer security
    1 KB (164 words) - 08:17, 4 August 2020
  • * Privacy, security, ethical, and social issues * Cyber law, E-commerce Law, and Intellectual property rights
    9 KB (896 words) - 16:31, 6 August 2020
  • * Algorithms for information security and privacy * Distributed human-cyber-physical applications
    4 KB (436 words) - 12:06, 25 August 2020
  • ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV]] ||43 | [[IEEE Symposium on Security and Privacy 2018]] ||[[:39th IEEE Symposium on Security and Privacy]] ||43
    24 KB (2,633 words) - 18:53, 15 October 2020
  • Security and Privacy Cyber-Physical Systems
    2 KB (246 words) - 15:08, 3 September 2020
  • * Cyber-physical systems and Internet of Things (IoT) * Privacy, security, trust, and safety management
    3 KB (346 words) - 16:20, 24 September 2020
  • |Title=4th International Conference on Networking, Systems and Security (NSysS) |Field=security
    4 KB (587 words) - 12:07, 5 November 2020
  • cyber-physical systems; Prioritizing software requirements for smart Software security
    12 KB (1,505 words) - 20:38, 22 November 2020
  • ...hoc networks; Opportunistic unlicensed spectra utilization; Adaptation in Cyber-physical systems; Service availability models ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;
    13 KB (1,574 words) - 12:11, 24 November 2020
  • ...ced Metering Infrastructure); QoS, latency and reliability in Smart Grids; Security (including wireless, wire-line, broadband over power lines) in Smart Grids; ...Business issues for Smart Grids; Resilient operations against physical and cyber attacks, and natural disasters; Power quality operations in a digital econo
    10 KB (1,235 words) - 18:42, 26 November 2020
  • ...ng; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; ...digital health services; Monitoring mission-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assess
    17 KB (2,035 words) - 14:45, 18 February 2021
  • Cross-layer design and optimization; Cyber-physical systems and networks; Data centers, virtualization, and cloud netw ...d management; Denial of service mitigation and prevention; System and data security; Communication visualization
    11 KB (1,325 words) - 15:01, 18 February 2021
  • collection; Accuracy in cyber-physical systems; Internet and home 5G Edge caching techniques; Performance in 5G networks; Security and
    13 KB (1,607 words) - 19:32, 30 November 2020
  • Cyber-manufacturing systems Intelligent security systems and applications
    6 KB (682 words) - 19:34, 30 November 2020
  • ...rmation processing; Biometric analysis, forensic analysis watermarking and security; Processing signal, image and video collections; Implementation of signal, ...ons Networks and mm-Wave Systems; Cognitive radio networks; Cyber-physical security; Social networks and finance applications, etc.
    9 KB (1,125 words) - 10:54, 8 December 2020
  • Computer generated images; Image security, scrambling, and regions of building blocks; Security and firewalls with SIP and H-xxx series;
    19 KB (2,346 words) - 10:51, 9 December 2020
  • Security, Privacy, Trust, Identity, Biometrics Cyber-Science, Cyber-systems, Computer Crime Prevention/ Detection
    5 KB (640 words) - 21:39, 17 December 2020
  • ...s; Automatic computing for Web services; Web services challenges on trust, security, performance, scalability; Enterprise Web services; Web services discovery, ...chitectures, techniques, paradigms; P2P programming and data handling; P2P security features; Data and compute intensive applications; P2P networks and protoco
    15 KB (1,921 words) - 01:00, 12 December 2020
  • ...ems, socio-technical systems, cloud computing, big data, machine learning, security, open source, and sustainability.
    2 KB (240 words) - 14:54, 3 February 2021
  • * IoT and cyber-physical systems, * security and practical applications of cryptography,
    2 KB (245 words) - 17:00, 6 January 2021
  • |Title=1st Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of T The 1st Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of T
    6 KB (804 words) - 11:42, 28 January 2021
  • ...rocessing in big and fast data, publish/subscribe, data stream processing, security and encryption in stream processing, rule-based systems, maintenance of mat ...t processing, information-centric networking, software-defined networking, security, reliability and resilience, programmable hardware, energy management and g
    3 KB (344 words) - 15:54, 29 January 2021
  • ...processing, event processing in big and fast data, data stream processing, security and encryption in stream processing, complex event forecasting, in-network ...t processing, information-centric networking, software-defined networking, security, reliability and resilience, distributed ledger and blockchains, programmab
    2 KB (300 words) - 16:01, 29 January 2021
  • ...hoc networks; Opportunistic unlicensed spectra utilization; Adaptation in Cyber-physical systems; Service availability models ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;
    13 KB (1,653 words) - 14:44, 10 February 2021
  • ...ced Metering Infrastructure); QoS, latency and reliability in Smart Grids; Security (including wireless, wire-line, broadband over power lines) in Smart Grids; ...Business issues for Smart Grids; Resilient operations against physical and cyber attacks, and natural disasters; Power quality operations in a digital econo
    10 KB (1,237 words) - 14:50, 10 February 2021
  • ...hoc networks; Opportunistic unlicensed spectra utilization; Adaptation in Cyber-physical systems; Service availability models ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;
    14 KB (1,718 words) - 11:30, 3 March 2021
  • ...ced Metering Infrastructure); QoS, latency and reliability in Smart Grids; Security (including wireless, wire-line, broadband over power lines) in Smart Grids; ...Business issues for Smart Grids; Resilient operations against physical and cyber attacks, and natural disasters; Power quality operations in a digital econo
    10 KB (1,277 words) - 11:56, 3 March 2021
  • * Security, Privacy and Trust * WWW, Semantic Web and Cyber World
    2 KB (230 words) - 12:18, 4 March 2021
  • - TRACK 8: CYBER SECURITY ISSUES -
    2 KB (318 words) - 09:51, 16 March 2021
  • ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modeling, information credibility) ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modeling, information
    37 KB (5,185 words) - 11:25, 3 August 2023
  • Cyber-security, Privacy and Ethics of IS Network security and privacy
    2 KB (240 words) - 09:51, 13 April 2021
  • ► Smart Grid Security and Reliability Management ► Smart Grid Cyber & Physical Security
    2 KB (296 words) - 10:40, 13 April 2021
  • ●Computational Intelligence in Cyber Security
    1 KB (142 words) - 10:22, 11 August 2022
  • ...ransmission; Wireless image transmission; Computer generated images; Image security, scrambling, and regions of interest; Timing requirements for image transmi ...anagement of QoS in SIP and H-xxx environments; Basic SIP building blocks; Security and firewalls with SIP and H-xxx series; Service creation and telephony ser
    19 KB (2,317 words) - 02:40, 26 November 2021
  • ...ions; Testing large-scale software smart systems; Dedicated apps for smart cyber-physical systems; Prioritizing software requirements for smart environments Software security
    13 KB (1,522 words) - 03:32, 3 December 2021
  • |Title=International Conference on Cyber Security and Information Engineering |Field=Cyber Security, Information Engineering
    4 KB (517 words) - 04:36, 29 June 2023
  • * Cyber-physical network systems * Network security and privacy
    8 KB (1,137 words) - 11:08, 3 August 2023
  • Communication and Information Systems Security Network Security and Privacy
    4 KB (550 words) - 05:55, 1 November 2023
  • Energy storage and cyber security for smart grids
    2 KB (285 words) - 08:45, 9 April 2024