Search results
Create the page "Internet security" on this wiki! See also the search results found.
Page title matches
- 55 bytes (5 words) - 06:20, 26 December 2011
- 24 bytes (2 words) - 12:01, 3 September 2017
- ...yberIoT 2017 : Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal |Field=security4 KB (547 words) - 09:58, 21 August 2017
- 25 bytes (2 words) - 13:40, 3 September 2017
- 27 bytes (2 words) - 11:53, 3 September 2017
Page text matches
- ** Privacy, safety and security ** Privacy, safety, and security6 KB (777 words) - 22:54, 14 August 2008
- *Network Security *Internet Applications5 KB (571 words) - 09:22, 19 July 2019
- The 2011 International Conference of Information Security and Internet Engineering3 KB (454 words) - 12:34, 8 October 2020
- Distributed computing and communication infrastructures: Internet QoS inter-operability, security, trusted and dependable systems, fault5 KB (715 words) - 17:43, 11 September 2008
- |Title=The Fourth International Conference on Internet and Web Applications and Services he Fourth International Conference on Internet and Web Applications and Services) continues a series of co-located events18 KB (2,408 words) - 02:37, 16 December 2008
- ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...databases; Automated prediction of relationships; Linked data streams and Internet of things; Preferred repairs; Parallel-correctness and transferability; Gua11 KB (1,371 words) - 12:28, 18 May 2020
- ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.) ** Data integration resources on the Internet11 KB (1,446 words) - 18:26, 13 October 2008
- Software Security Internet and Information Systems Development2 KB (293 words) - 10:35, 24 June 2011
- * Internet Technology and IP-based Applications * Security, Privacy and Trust34 KB (4,565 words) - 22:20, 10 January 2018
- * Internet Technology and IP-based Applications * Security, Privacy and Trust8 KB (1,037 words) - 22:20, 10 January 2018
- * Internet Technology and IP-based Applications * Security, Privacy and Trust9 KB (1,189 words) - 22:20, 10 January 2018
- * Internet Technology and IP-based Applications * Security, Privacy and Trust26 KB (3,456 words) - 22:20, 10 January 2018
- * Security and Privacy * Novel Applications of Internet10 KB (1,263 words) - 22:20, 10 January 2018
- * Security and Privacy * Novel Applications of Internet12 KB (1,537 words) - 22:19, 10 January 2018
- * Security and Privacy * Novel Applications of Internet8 KB (1,040 words) - 22:20, 10 January 2018
- * Storage systems issues related to long term preservation, archival storage, internet-scale storage, and replication and consistency ...issues such as workload modeling, performance metrics, power consumption, security, usability, and experience with real systems and failures5 KB (777 words) - 05:50, 14 October 2008
- ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusio9 KB (1,216 words) - 17:32, 14 October 2008
- Internet pattern recognition ...multimedia databases, digital and video libraries, compression and coding, security over the network.2 KB (268 words) - 17:47, 14 October 2008
- * Mobile Internet * Wireless privacy and security3 KB (456 words) - 18:10, 14 October 2008
- * Security, privacy, and trustworthiness of mobile and wireless systems ...and protocols for cognitive wireless networks and their integration in the Internet7 KB (974 words) - 12:28, 3 August 2023
- | Acronym = INTERNET 2009 | Title = The First International Conference on Evolving Internet11 KB (1,385 words) - 17:48, 14 October 2008
- | Title = The First International Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability7 KB (960 words) - 17:48, 14 October 2008
- * Web services and internet computing * Trust, security and privacy19 KB (2,503 words) - 13:25, 28 October 2020
- + Security and information assurance VP of Data Solutions and Advertising Systems at the Internet7 KB (907 words) - 21:51, 14 October 2008
- Internet Computing, Web applications and Web services Privacy, Trust, and Security is Distributed Systems2 KB (208 words) - 20:05, 14 October 2008
- • E-learning, Multimedia conferencing, internet phones, and mail • Ethical, Social, Privacy, Security and moral Issues in an e-societ5 KB (530 words) - 10:27, 24 June 2011
- |Field=Computer security and reliability ...(railways, airlines, road), life related (health, emergency response, and security), manufacturing (chips, computers, cars) or financial (credit cards, on-lin15 KB (2,175 words) - 21:03, 19 March 2013
- ...r, PVR, Interconnects, Game Systems, Interactive and Directed Programming, Internet Integration, Next-Generation DVD, Displays Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability, Application Control, H3 KB (354 words) - 20:06, 14 October 2008
- ...d to publish extended versions of their papers in the IADIS Journal on WWW/Internet (ISSN: 1645-7641) and other selected Journals. - Internet Cultures and new interpretations of �??Space�??6 KB (780 words) - 20:06, 14 October 2008
- o Security and Privacy o Network and Internet Support for Distributed Applications2 KB (303 words) - 20:06, 14 October 2008
- ...mic experts to present and discuss communications quality, reliability and security issues as they relate to real world issues. The output from the workshops a * Current and Next-generation Internet4 KB (505 words) - 22:15, 14 October 2008
- Internet integration of wireless networks. * Internet integration6 KB (686 words) - 20:06, 14 October 2008
- Homeland Security Systems Safety and Security6 KB (708 words) - 22:49, 14 October 2008
- -Protocol and log visualization (security, trust) -Software visualization on the internet3 KB (355 words) - 22:53, 14 October 2008
- �?� Internet computing, web environment for collaborative working �?� Security for CDVE4 KB (468 words) - 22:54, 14 October 2008
- ...Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce and Human Factors. 4. Software Agents and Internet Computing9 KB (1,240 words) - 22:56, 14 October 2008
- B10. Security and Intrusion Detection B11. Web Data and the Internet2 KB (295 words) - 12:03, 18 October 2008
- * Cryptography and Network Security * Internet Technology and Applications2 KB (167 words) - 23:05, 14 October 2008
- * models of concurrency, security, and mobility * parallel, distributed, and internet-based (grid) computing8 KB (1,085 words) - 18:01, 12 February 2009
- Data Privacy and Security Internet and Web-Based Database Systems7 KB (1,006 words) - 23:08, 14 October 2008
- ...stributed Applications), and IS'08 (International Symposium on Information Security).8 KB (1,081 words) - 08:21, 22 December 2011
- - Security and Access Control - Information Content Security4 KB (595 words) - 23:09, 14 October 2008
- * Internet services scalability, including locally and geographically * Security, reliability and availability in distributed storage systems,5 KB (644 words) - 23:10, 14 October 2008
- Integration of Security and Privacy Privacy and Anonymity on the Internet2 KB (193 words) - 23:10, 14 October 2008
- and military operations. Such networking is essential for safety, security and economic vitality in Internet to reduce cost of deployment and maintenance and to enhance reachability an5 KB (549 words) - 17:15, 5 July 2020
- Quality of service, authentication and security, multimedia protocols, web architectures and protocols, network measurement Next Generation Internet7 KB (981 words) - 03:18, 6 January 2009
- 1. NGN(Next Generation Network), NGI(Next Generation Internet) and Future Internet Technologies 9. Information Security Technologies2 KB (200 words) - 23:11, 14 October 2008
- * Internet architecture and protocols * Network Security4 KB (465 words) - 23:11, 14 October 2008
- * Optical Internet * Network Security & Reliability4 KB (559 words) - 23:11, 14 October 2008
- | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability4 KB (587 words) - 23:30, 14 October 2008
- ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob5 KB (694 words) - 23:11, 14 October 2008
- Security/privacy in wireless systems Wireless / Mobile Internet2 KB (244 words) - 23:12, 14 October 2008
- 1 .10 Internet and Intranet 5 .54 Network Security2 KB (250 words) - 23:12, 14 October 2008
- ...Generation Internet Networks - 4th EURO-NGI Conference on Next Generation Internet Networks ...2008 focuses on the design, engineering, and operation of Next Generation Internet networks. It is organized by the Network of Excellence (NoE) Euro-FGI (http3 KB (382 words) - 23:12, 14 October 2008
- Internet integration of wireless networks. * Internet integration3 KB (413 words) - 23:13, 14 October 2008
- Internet routing, peer-to-peer and overlay networks, sensor networks, * Security and resilience of networked systems4 KB (528 words) - 23:13, 14 October 2008
- ...t, particularly with properties such as reliability, availability, safety, security, and real time. The major areas of interest include, but are not limited to, dependability, security and/or real-time aspects within the following topics:2 KB (255 words) - 23:14, 14 October 2008
- in the Services Computing discipline, Web services are Internet-based * Security Challenges for Web Services8 KB (1,158 words) - 23:14, 14 October 2008
- ...on of large-scale networked and distributed systems. Systems as diverse as Internet routing, peer-to-peer and overlay networks, sensor networks, Web-based syst * Security, robustness, and fault-tolerance in networked environments8 KB (1,093 words) - 23:15, 14 October 2008
- * Handoffs for Entertainment (Internet to WLAN, to 3G/BT/...) * QoS and Security Support for Entertainment8 KB (1,011 words) - 23:15, 14 October 2008
- * Security aspects in network management "Design of Next Generation Internet Based on Application-Oriented Networking"6 KB (663 words) - 23:15, 14 October 2008
- | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)5 KB (628 words) - 23:15, 14 October 2008
- 2-02 Internet computing 4. Security and Privacy5 KB (623 words) - 23:15, 14 October 2008
- ...ing development of new mobile technologies and the widespread usage of the Internet ...ng difficult social and policy issues such as those related to privacy and security8 KB (1,003 words) - 23:15, 14 October 2008
- NPSec 2008 particularly welcomes new ideas on security in the context of future Internet design, such as architectural considerations for future4 KB (493 words) - 23:15, 14 October 2008
- | Title = Internet Measurement Conference 2008 Internet Measurement Conference (IMC) 20083 KB (313 words) - 23:15, 14 October 2008
- * Future Internet Services: Teletraffic and Performance Issues * Network Security5 KB (598 words) - 10:18, 29 May 2016
- * Wireless Internet access in ubiquitous systems * Security, privacy and social issues of mobile and ubiquitous systems5 KB (599 words) - 23:15, 14 October 2008
- R. SP for Internet and Wireless Communications V. Signal Processing for Security2 KB (226 words) - 23:17, 14 October 2008
- # security technology and systems * Integrity, Security, and Fault Tolerance6 KB (733 words) - 12:48, 27 October 2016
- ...systems to mobile computing, multimedia systems, peer-to-peer networks and Internet services. All communication systems must interoperate with each other. Conn * Innovative architectures for Internet services, web services3 KB (358 words) - 23:18, 14 October 2008
- |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability4 KB (487 words) - 10:42, 21 August 2020
- | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability5 KB (673 words) - 23:19, 14 October 2008
- | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability6 KB (736 words) - 23:20, 14 October 2008
- |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability6 KB (689 words) - 10:39, 21 August 2020
- | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability4 KB (502 words) - 23:20, 14 October 2008
- - Multimedia security and content protection - Multimedia analysis and social media on the Internet3 KB (425 words) - 23:20, 14 October 2008
- like voice, email, short messages, Internet access, m-commerce, to mobile video conferencing, - Personalization, Privacy and Security in Mobile Computing10 KB (1,262 words) - 23:20, 14 October 2008
- * Internet telephony and hypermedia technologies and systems * Multimedia security including digital watermark and encryption5 KB (595 words) - 23:20, 14 October 2008
- ...in meeting the challenges of scale and complexity in datacenter-scale and Internet-scale computing systems. At the same time, the real-world challenges and op ...learning techniques to address reliability, performance, power management, security, fault diagnosis, or manageability issues in computer systems6 KB (837 words) - 23:21, 14 October 2008
- - Grid, P2P, Web Services and Internet Computing - Security, Privacy and Trust3 KB (357 words) - 23:23, 14 October 2008
- * Internet and Web Applications * Information Security3 KB (415 words) - 23:23, 14 October 2008
- Mobile learning became a fact, due to the technical accessibility and Internet communications. Many online classes, learning systems, university curricula ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design6 KB (765 words) - 23:26, 14 October 2008
- * Architecture/software issues focusing on Internet services * Studies of Internet applications and services with implications for systems design3 KB (406 words) - 17:39, 30 September 2016
- As the global Internet extends its reach with both backbone and "to the edge" bandwidth increasing * Security and Trust in Distributed Systems6 KB (761 words) - 03:28, 6 January 2009
- ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors. * Architecture and protocols for security.4 KB (528 words) - 23:27, 14 October 2008
- ...n progress, with an emphasis on systems that actually run in the wide-area Internet. * Architectural support for improving security or availability4 KB (577 words) - 23:31, 14 October 2008
- | Title = International Conference on Distributed Computing and Internet Technologies International Conference on Distributed Computing and Internet Technologies5 KB (702 words) - 23:31, 14 October 2008
- ...ms, protocols, peer-to-peer computing, sensor networks, inter-operability, security, trusted and dependable systems, fault tolerance, virtual subnets for ORC. ...bility, synchronization, resource allocation, scheduling, fault tolerance, security.3 KB (377 words) - 23:31, 14 October 2008
- *Big Data platforms with applications to network management, security, measurements *Internet measurement and modeling4 KB (514 words) - 12:03, 6 April 2020
- ...ternet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation.4 KB (504 words) - 23:33, 14 October 2008
- International Conference on Internet and Web Applications and Services, Trust, security, and privacy8 KB (1,075 words) - 23:52, 14 October 2008
- ...n Social and Facebook APIs for socially networked applications, OpenID for security, and cloud computing offerings from Amazon, Microsoft, Google, and others w * Portal security models and solutions;3 KB (378 words) - 23:34, 14 October 2008
- ...ement ?Ontology Information/Knowledge/Service Integration ?Knowledge Flow ?Internet-based Knowledge Engineering and Software Engineering ...sed Multi-agent Systems ?Nature-Inspired Computing ? Autonomous Computing ?Internet-based Intelligent Applications ?P2P Computing ?Grid Computing ?Self-Organiz3 KB (367 words) - 23:35, 14 October 2008
- | Title = SANS Network Security 2007 | Field = Internet492 bytes (57 words) - 23:36, 14 October 2008
- Internet and Web technologies, information systems, information retrieval, applications for the Internet and Web.9 KB (1,215 words) - 23:38, 14 October 2008
- * Future Internet design * Security, trust, & privacy3 KB (380 words) - 19:34, 17 November 2008
- ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network - Future Internet2 KB (303 words) - 23:42, 14 October 2008
- - Internet applications, social networks, recommender systems - security in distributed computing, cryptographic protocols6 KB (766 words) - 13:19, 28 November 2016
- |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols13 KB (1,617 words) - 19:03, 24 November 2008
- ** Security, Privacy, and Trust ** Broadband Internet access5 KB (670 words) - 15:15, 16 February 2009
- |Title=The First International Conference on Advances in Future Internet * Internet Mechanisms7 KB (883 words) - 17:35, 7 January 2021
- ** Privacy and security ** Evolution of mobile internet technologies11 KB (1,366 words) - 16:44, 14 January 2009
- |Field=Internet security2 KB (219 words) - 17:25, 14 January 2009
- - Distributed applications ICTs: trade, medicine, industry, the Internet, etc.. - Technology for Internet6 KB (812 words) - 12:55, 18 January 2009
- ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Internet Protocols5 KB (526 words) - 01:02, 2 February 2009
- | Title = 3rd International Conference on Network and System Security 3rd International Conference on Network and System Security (NSS 2009)12 KB (1,669 words) - 12:58, 18 January 2009
- o Game-theoretic aspects of network formation on the Internet * Security, Privacy, Encryption, and Digital Rights, including9 KB (1,221 words) - 12:58, 18 January 2009
- | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)16 KB (2,178 words) - 12:59, 18 January 2009
- ...o raises a host of ethical issues, such as those pertaining to information security, privacy, data mining, and intellectual property. Therefore, as e-business The new paradigm of business on the internet and its ethical implications6 KB (856 words) - 13:00, 18 January 2009
- both on usage of mashup solutions in open Internet environments underlining in business intranet environments stressing the need for security and6 KB (684 words) - 13:00, 18 January 2009
- Internet Modeling Security and Access Control4 KB (529 words) - 13:00, 18 January 2009
- * Internet Services * Security Systems & Services9 KB (1,183 words) - 13:41, 23 January 2009
- economies. The term Internet of Services relates to the representation Internet. Many issues around the mapping between economic services and6 KB (798 words) - 13:01, 18 January 2009
- - AI in Computer Security - Intelligent Internet Agents4 KB (582 words) - 14:47, 2 December 2010
- o Internet broadcasting o Security in Power Line Communications14 KB (1,518 words) - 13:01, 18 January 2009
- - Intelligent Internet Systems - Security, Privacy and Trust4 KB (588 words) - 13:01, 18 January 2009
- - Security Engineering 17) Security & Privacy in Pervasive Computing environments - SPPC 0910 KB (1,321 words) - 13:01, 18 January 2009
- |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)6 KB (793 words) - 15:12, 1 October 2020
- ...point is far away from sufficient, which has been proved by the dilemma of Internet QoS research and applications. More important, multidisciplinary perspectiv * Privacy, security, ethics, culture, and anonymity issues6 KB (767 words) - 13:01, 18 January 2009
- infrastructure that is enabled by various kinds of networks including the Internet. - Security, privacy, trust and safety of cyber physical & social computing3 KB (446 words) - 13:02, 18 January 2009
- | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)6 KB (852 words) - 13:02, 18 January 2009
- * security in distributed computing, cryptographic protocols * distributed computing issues in the Internet and the world-wide web7 KB (890 words) - 15:05, 27 December 2015
- ...temas, Wireless communications, Technologies and applications, Information security ...an overhead projector, a screen and a video projector. Unlimited access to Internet for all participants.8 KB (977 words) - 16:33, 27 February 2009
- ISGIG 2009 - the Internet of the Future ...rld. The large number of devices connected to the networks has changed the Internet to a "network of things and computers". These trends, plus the rise of coll4 KB (557 words) - 16:33, 27 February 2009
- ...ibilities in artificial intelligence) to the observation that increases in Internet connection speeds, modular web applications, and advances in computer graph - Web Security4 KB (630 words) - 16:33, 27 February 2009
- • Internet based applications • Network security5 KB (654 words) - 17:06, 27 February 2009
- · Reliability, fault-tolerance, and security · Internet computing and web services8 KB (1,050 words) - 18:04, 5 January 2017
- * Future Internet design * Security, trust, & privacy4 KB (559 words) - 17:06, 27 February 2009
- dominant consumers of residential Internet subscribers' bandwidth, and are * Security and privacy in P2P systems5 KB (623 words) - 17:06, 27 February 2009
- | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability8 KB (967 words) - 17:07, 27 February 2009
- ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Security and Privacy7 KB (941 words) - 17:07, 27 February 2009
- in harmony with societal values and economic viability, with enhanced security, -Web and Internet Applications11 KB (1,440 words) - 17:08, 27 February 2009
- | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability3 KB (480 words) - 17:08, 27 February 2009
- - Security, reliability, biometrics - Power management, reliability, security, performance4 KB (589 words) - 17:08, 27 February 2009
- | Title = Internet Measurement Conference 2009 | Field = Internet6 KB (774 words) - 17:08, 27 February 2009
- |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security5 KB (578 words) - 10:21, 20 November 2020
- ...in track, covering different aspects of Web Information Systems, including Internet Technology, Web Interfaces and Applications, Society, e-Communities, e-Busi 1. Internet Technology3 KB (440 words) - 15:25, 9 December 2009
- * Security issues in agent-based systems for search and rescue missions, use of games, == Internet ==6 KB (783 words) - 17:04, 27 December 2015
- | Title = International journal of Network Security & Its Applications (IJNSA) International journal of Network Security & Its Applications (IJNSA)3 KB (339 words) - 11:32, 2 August 2009
- * Internet architecture and protocols * Network Security7 KB (1,054 words) - 16:43, 27 December 2015
- Information security IT and network security2 KB (258 words) - 11:33, 2 August 2009
- | Acronym = IJEB - Spl Issue on Internet Technology 2009 | Title = Internet Technology: Emerging Technologies & Applications - A Special Issue of the I4 KB (564 words) - 12:01, 6 November 2020
- |Title=International Workshop on P2P, Parallel, Grid and Internet Computing Fourth International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC-2010)7 KB (912 words) - 17:36, 5 November 2020
- |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security5 KB (599 words) - 10:21, 20 November 2020
- | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)6 KB (746 words) - 11:35, 2 August 2009
- | Title = First Iberic Conference on Web-Applications Security (IBWAS’09) First Iberic Conference on Web-Applications Security (IBWAS’09)9 KB (1,261 words) - 11:35, 2 August 2009
- ? Security and privacy ? Wireless & Mobile network Security5 KB (571 words) - 11:35, 2 August 2009
- -Journal of Internet Technology (JIT) (SCI) IASM 2009 (Information Assurance and Security Management)- http://ispan2009.comm.ccu.edu.tw/IASM2009.html4 KB (422 words) - 11:36, 2 August 2009
- | Title = International Workshop on the Future Internet of Things and Services - Embedded Web Services for Pervasive Devices International Workshop on the Future Internet of Things and Services - Embedded Web Services for Pervasive Devices (http:9 KB (1,206 words) - 11:40, 2 August 2009
- |Title=The Fifth International Conference on Internet Monitoring and Protectio ICIMP 2010: The Fifth International Conference on Internet Monitoring and Protection14 KB (1,651 words) - 15:56, 15 February 2017
- |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security3 KB (352 words) - 12:39, 11 August 2009
- ...Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce and Human Factors. 4. Software Agents and Internet Computing5 KB (552 words) - 17:06, 12 August 2009
- |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability6 KB (766 words) - 10:54, 26 April 2010
- |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security5 KB (667 words) - 14:27, 13 September 2009
- - Internet technologies - Internet security4 KB (507 words) - 22:37, 18 November 2009
- |Title=The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI C The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), Technical Co-Sponsored5 KB (607 words) - 18:01, 3 December 2009
- |Title=7th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS |Field=Computer security and reliability7 KB (982 words) - 19:13, 3 January 2010
- ...ometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications in the above themes. Information retrieval and internet applications3 KB (382 words) - 18:27, 20 January 2010
- |Title=3rd International Conference on Security of Information and Networks |Field=Computer security10 KB (1,270 words) - 17:12, 20 April 2010
- * › Multimedia Security * › Internet QoS for Multimedia Applications3 KB (310 words) - 15:37, 5 February 2010
- The 2010 International Conference of Information Security and Internet Engineering4 KB (559 words) - 08:31, 9 March 2010
- ...chnology has the capacity to destroy African commodity markets. This poses security threats if plans are not developed to retrain those that will be displaced ...ation, Environment & Sustainability, Education, Currency, Energy, Risk and Security, Welfare, Poverty, Employment, Corruption, Terrorism, Economic Growth, et4 KB (631 words) - 06:05, 16 March 2010
- * Internet of Services * Cloud Security4 KB (405 words) - 20:45, 3 November 2010
- - Security for enabling eCommerce - Trust & Security Issues in e-Commerce4 KB (601 words) - 00:22, 28 March 2010
- |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress2 KB (217 words) - 16:50, 19 November 2020
- |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy4 KB (490 words) - 14:42, 6 November 2020
- |Title=3rd International Workshop on Internet and Distributed Computing Systems 2010 (IDCS'10) |Field=Internet, Distributed Computing5 KB (667 words) - 12:08, 19 May 2010
- ...a larger and larger group of end-user applications (e.g., climate change, security, land use, weather). › Fusion and enriching of EO images with, the image product metadata, Internet tagged resources, photography, text, maps, etc…4 KB (582 words) - 16:22, 20 May 2010
- ...n tracks, covering different aspects of Web Information Systems, including Internet Technology, Web Interfaces and Applications, Society, e-Communities, e-Busi 1. INTERNET TECHNOLOGY5 KB (627 words) - 12:33, 16 June 2010
- ...fax services] demonstrate that everyday more and more people are utilizing internet faxing services because the offer very effective, efficiency user friendlin The benefits of [http://www.faxfromcomputer.org/ internet fax] over traditional fax machine is a lot and it provides with flexible us4 KB (626 words) - 14:16, 29 July 2010
- ...orks and protocols, wireless communications, collaborative objects and the Internet of Things, machine learning, mobile and social sensing, and embedded system *Security and privacy3 KB (412 words) - 09:52, 27 February 2020
- ...Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce and Human Factors. 4. SOFTWARE AGENTS AND INTERNET COMPUTING19 KB (2,462 words) - 19:10, 26 August 2010
- ...happen to be new to these service providers and might be worried about the security of using these online services then, the following benefits are sure to get ...es also boast of good contact management systems they are also akin to our internet email accounts and also having good facilities to keep track of your faxes3 KB (610 words) - 16:33, 27 August 2010
- The 2011 International Conference of Information Security and Internet Engineering3 KB (458 words) - 08:06, 31 August 2010
- * Cyber-physical systems and Internet of Things (IoT) * Privacy, security, trust, and safety management3 KB (395 words) - 15:14, 24 September 2020
- * Internet and Web applications, social networks and recommendation systems * Security in distributed computing, cryptographic protocols3 KB (344 words) - 11:30, 21 April 2020
- - Internet technologies - Internet security6 KB (732 words) - 05:52, 5 December 2010
- |Title=Fourth International Conference on Internet Technologies and Applications (ITA 11) |Field=Internet4 KB (579 words) - 15:24, 13 October 2010
- |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)5 KB (609 words) - 17:01, 5 July 2020
- security * Internet-based platforms based on AR/MR for mechatronics12 KB (1,378 words) - 21:13, 28 November 2010
- Security in network, systems, and applications<br> Internet and web technologies<br>4 KB (554 words) - 12:34, 14 October 2020
- Security in network, systems, and applications<br> Internet and web technologies<br>4 KB (556 words) - 12:33, 14 October 2020
- Security in network, systems, and applications<br> Internet and web technologies<br>4 KB (552 words) - 08:13, 10 December 2010
- Security in network, systems, and applications<br> Internet and web technologies<br>4 KB (554 words) - 10:24, 6 July 2020
- Security in network, systems, and applications<br> Internet and web technologies<br>4 KB (554 words) - 12:33, 14 October 2020
- |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability2 KB (217 words) - 16:57, 27 December 2015
- |Field=Computer security and reliability field of Systems Security, which has been created to build on the5 KB (701 words) - 05:52, 14 April 2011
- |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability5 KB (597 words) - 10:45, 21 August 2020
- * Internet, Web and Security Visualization4 KB (461 words) - 11:48, 1 July 2011
- Service and Systems Design and QoS Network Security Internet of Services5 KB (677 words) - 11:59, 1 July 2011
- |Field=Internet, World wide web ...Applications, Society, e-Communities, e-Business, Web Intelligence and Web Security.5 KB (612 words) - 12:07, 1 July 2011
- *Internet Tools *Network Security13 KB (1,774 words) - 18:35, 31 August 2011
- - Security related issues of satellite communications - Voice, broadband Internet, DVB, positioning9 KB (1,218 words) - 16:06, 1 October 2020
- The 2012 International Conference of Information Security and Internet Engineering7 KB (909 words) - 16:30, 10 September 2020
- - Security and Data Protection - Increasing Affordability and Access to the Internet6 KB (784 words) - 03:09, 22 November 2011
- ...created for user needs. This process has now reached the private life. The Internet, Web and wireless communication has fundamentally changed our daily communi *Privacy and Security5 KB (669 words) - 14:40, 20 December 2011
- Information Security Internet Computing8 KB (1,085 words) - 16:28, 6 February 2012
- Communications modeling; Communications security; Computer New Internet technologies6 KB (725 words) - 19:58, 22 November 2020
- - Internet technologies - Internet security5 KB (595 words) - 05:03, 15 January 2012
- Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability Computer occupational diseases and INTERNET harmful information filtering10 KB (1,297 words) - 17:49, 24 February 2012
- ...Telecommunications in Smart Cities; IoT virtual networks; Device-to-device Internet; Mobile clouds; Smart and sustainable cities; Public data centers; Traffic ...t; Communications networks security; Information security; IPR and network security;13 KB (1,580 words) - 19:35, 18 February 2021
- |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security4 KB (581 words) - 18:48, 24 February 2020
- ...ng|Computer networking]]: <span style="font-size:90%">[[:category:Internet|Internet]], [[:category:World wide web|World wide web]] <!--[[:category:Information theory|Information theory]], [[:category:Internet|Internet]], [[:category:World wide web|World wide web]], [[:category:Wireless comput7 KB (815 words) - 18:03, 14 April 2021
- *Industry 4.0, Factory of the Future and Internet of Things *Cyber Security and Privacy5 KB (663 words) - 11:49, 18 February 2020
- ...es (e.g., consumer devices, wearable computing, neuroinformatics, sensors, Internet-of-Things, vehicles). * Information Security (e.g., privacy, surveillance, censorship, encryption, security).8 KB (1,024 words) - 09:57, 13 May 2020
- ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2019 (OnTheMove'19)" that co-locates three conferences: ODBASE'19, • Semantic Web and the Internet of Things (IoT)6 KB (872 words) - 23:11, 24 February 2020
- |Title=8th Asian Internet Engineering Conference 8th Asian Internet Engineering Conference5 KB (630 words) - 05:00, 19 April 2012
- *Security and privacy, cryptographic protocols *Internet of things and cyber-physical systems2 KB (299 words) - 11:51, 8 April 2020
- ...etworks , Network Modeling and Simulation, Computer Network : Performance, Security and Applications, Neural Networks and Applications, Remote Sensing, Self Or ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and3 KB (434 words) - 22:46, 30 May 2012
- * Data streams and the Internet of Things * Trust, privacy, and security on the Semantic Web5 KB (663 words) - 14:34, 5 December 2018
- * Data streams and the Internet of Things * Trust, privacy, and security on the Semantic Web5 KB (699 words) - 14:57, 5 December 2018
- Security & Privacy Internet, Web and Security Visualization4 KB (466 words) - 16:27, 19 June 2012
- Internet of Things Security: Vulnerability and Privacy5 KB (600 words) - 14:41, 20 June 2012
- Service and Systems Design and QoS Network Security Internet of Services5 KB (662 words) - 18:50, 20 June 2012
- ...forget that optical fiber is crucial to telecommunications in general and internet in particular. System Reliability and Security8 KB (1,102 words) - 17:23, 18 July 2012
- *Security and Information Assurance *Web and internet computing2 KB (274 words) - 18:15, 13 August 2012
- - Security and Access Control<br /> - Information Content Security<br />3 KB (466 words) - 13:00, 16 August 2012
- ...Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce, Human Factors and Enterprise Architecture. 3. INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION34. SOFTWARE AGENTS AND INTERNET COMPUTING5 KB (552 words) - 15:08, 21 August 2012
- ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. Security informatics6 KB (728 words) - 01:01, 25 August 2012
- The 2013 International Conference of Information Security and Internet Engineering7 KB (903 words) - 16:27, 10 September 2020
- The 2013 International Conference of Information Security and Internet Engineering6 KB (868 words) - 17:21, 29 August 2012
- Information Security Internet and Web Applications2 KB (224 words) - 08:27, 26 October 2012
- ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Big data and the Internet of Things3 KB (375 words) - 15:06, 24 September 2020
- |Title=2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013) 2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013)6 KB (764 words) - 02:27, 11 December 2012
- ...ents, logistics and networking, to complex event processing in finance and security. The DEBS conference brings together researchers and practitioners from the - Internet of Things (event-processing in M2M)6 KB (826 words) - 15:44, 29 January 2021
- - Internet technologies - Internet security4 KB (535 words) - 14:38, 17 January 2013
- - Internet regulation ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust5 KB (702 words) - 10:02, 5 March 2013
- • Internet of Things • Security: Vulnerability and Privacy5 KB (647 words) - 19:06, 5 April 2013
- - Future Internet architectures and mobile network management - Future Internet architectures with smart objects9 KB (1,145 words) - 16:57, 11 April 2013
- |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability2 KB (264 words) - 15:32, 7 January 2021
- *Cyber Security *Internet & Web Applications3 KB (308 words) - 17:30, 26 May 2016
- * Future Internet Architectures and Protocols * Integration of Web and Internet‐connected Objects2 KB (230 words) - 00:37, 28 May 2016
- ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2016 (OnTheMove'16)" that co-locates three conferences: ODBASE'16, * Semantic Web and the Internet of Things (IoT)9 KB (1,131 words) - 23:18, 24 February 2020
- ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2020 (OnTheMove'20)" that co-locates three conferences: ODBASE'20, * Semantic Web and the Internet of Things (IoT)6 KB (877 words) - 23:06, 24 February 2020
- |Title=CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems |Field=computer security382 bytes (45 words) - 00:54, 14 July 2016
- |Field=embedded systems, internet of things, connectivity, safety and security401 bytes (49 words) - 16:22, 8 July 2016
- * Intelligent Systems: Internet, Software, Energy, Hybrid * Database Privacy and Security4 KB (464 words) - 11:38, 4 September 2020
- - Security and Data Protection - Increasing Affordability and Access to the Internet6 KB (790 words) - 13:45, 24 July 2016
- - Security and Data Protection - Increasing Affordability and Access to the Internet6 KB (777 words) - 23:29, 29 July 2016
- |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things870 bytes (100 words) - 18:53, 2 March 2021
- |Title=RFIDSec 2016 : 12th Workshop on RFID and IoT Security |Field=RFID, internet-of-things, IOT, security372 bytes (47 words) - 15:35, 27 August 2016
- * Security and Privacy Issues * EIS and Internet of Things925 bytes (116 words) - 11:05, 24 August 2016
- - Internet technologies - Internet security5 KB (641 words) - 22:32, 29 July 2016
- |Field=semantic web, internet of things, big data, information security431 bytes (45 words) - 21:01, 26 November 2016
- * Intelligent Systems: Internet, Software, Energy, Hybrid * Database Privacy and Security3 KB (340 words) - 11:27, 4 September 2020
- * Software & System Security ** Software and system security and privacy18 KB (2,288 words) - 12:48, 27 October 2016
- * security and privacy * Internet of Things9 KB (1,190 words) - 10:12, 5 June 2019
- * Intelligent Systems: Internet, Software, Energy, Hybrid * Database Privacy and Security3 KB (361 words) - 10:38, 4 September 2020
- Future Internet and networking architectures Communication Security, Trust, Protocols and Applications5 KB (588 words) - 18:00, 21 January 2017