Search results

Jump to: navigation, search
  • |Title=Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments |Field=Computer security and reliability
    3 KB (498 words) - 02:52, 22 December 2012
  • - Simulation issues of large-scale VCS and integration of traffic-network simulators - Security, encryption and privacy for vehicular systems
    5 KB (624 words) - 21:14, 4 March 2010
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc * Cloud Security
    4 KB (405 words) - 20:45, 3 November 2010
  • - Security for enabling eCommerce - Trust & Security Issues in e-Commerce
    4 KB (601 words) - 00:22, 28 March 2010
  • |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress
    2 KB (217 words) - 16:50, 19 November 2020
  • |Superevent=2010 secau Security Congress '''INFORMING SECURITY'''
    2 KB (215 words) - 06:52, 13 April 2010
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • - Security of Communication Networks - Network-based Applications (VoIP, streaming)
    5 KB (667 words) - 12:08, 19 May 2010
  • ...eral disciplines and applications (military, industrial, medical, homeland security, etc.) with the aim of collecting and distributing observations of our worl › Sensor/Sensor Network Ontology Engineering
    5 KB (639 words) - 16:17, 20 May 2010
  • 5. WEB SECURITY * › Web Security and Privacy
    5 KB (627 words) - 12:33, 16 June 2010
  • |Field=Network Virtual Environment - Trust and security issues in P2P systems
    6 KB (858 words) - 09:18, 19 August 2010
  • |Title=The Third International Workshop on Systems and Network Telemetry and Analytics (SNTA2020) |Field=systems and network telemetry, Machine learning, data science, High-performance computing, Dist
    4 KB (584 words) - 17:42, 13 March 2020
  • |Title=Usenix Network and Distributed System Security Symposium |Field=Security
    147 bytes (20 words) - 00:56, 28 February 2020
  • *Network and system architectures and protocols *Security and privacy
    3 KB (412 words) - 09:52, 27 February 2020
  • |Title=Usenix Network and Distributed System Security Symposium
    684 bytes (84 words) - 11:33, 10 March 2020
  • * › Database Security and Transaction Support * › Advanced Applications of Neural Network
    19 KB (2,462 words) - 19:10, 26 August 2010
  • * Foundations of Privacy, Trust and Reputation in Network * Network Models for Distributed Computing
    4 KB (602 words) - 06:44, 26 August 2020
  • |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium
    3 KB (343 words) - 16:31, 6 May 2020
  • NEURAL NETWORK MODELS * Neural network approaches to optimization
    5 KB (574 words) - 15:58, 6 March 2020
  • * Security in distributed computing, cryptographic protocols * System-on-chip and network-on-chip architectures
    3 KB (344 words) - 11:30, 21 April 2020
  • Network algorithms • Network architectures
    4 KB (579 words) - 15:24, 13 October 2010
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • ...s a publication vehicle for complete coverage of all topics of interest to network professionals and brings to its readers the latest and most important findi • Network Architectures and Protocols • Network Coding
    3 KB (318 words) - 16:46, 5 July 2020
  • ...practical aspects of health informatics and bioinformatics and a chance to network with others working and researching in this or related areas. Security, Ethics and Privacy
    5 KB (693 words) - 10:44, 14 November 2010
  • * Scale-free network structure of Cyber Physical Systems * System-on-Chip and Network-on-Chip Design
    12 KB (1,378 words) - 21:13, 28 November 2010
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 12:34, 14 October 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (556 words) - 12:33, 14 October 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (552 words) - 08:13, 10 December 2010
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 10:24, 6 July 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 12:33, 14 October 2020
  • |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (217 words) - 16:57, 27 December 2015
  • ...ecial Issue on Smart Protocols and Algorithms of the International Journal Network Protocols and Algorithms (ISSN 1943-3581) ...ng capacity let us include more complex algorithms that can be used by the network device to enhance the communication procedure.
    6 KB (833 words) - 15:16, 24 September 2020
  • |Field=Computer security and reliability `SysSec <http://syssec-project.eu>`_ is a Network of Excellence in the
    5 KB (701 words) - 05:52, 14 April 2011
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev
    3 KB (462 words) - 11:51, 22 March 2020
  • |Title=10th IEEE International Symposium on Network Computing and Applications The IEEE International Symposium on Network Computing and Applications is seeking articles concerning fundamental resea
    3 KB (322 words) - 05:59, 8 March 2011
  • A rational network can be defined as a network in which rational (self interested) participants have no reason to deviate from the actual network intended purposes (critical or not). To this
    7 KB (1,019 words) - 18:29, 8 April 2011
  • * Network Optimization * Security
    3 KB (283 words) - 11:37, 1 July 2011
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc Service and Systems Design and QoS Network Security
    5 KB (677 words) - 11:59, 1 July 2011
  • ...Applications, Society, e-Communities, e-Business, Web Intelligence and Web Security. Web Security and Privacy
    5 KB (612 words) - 12:07, 1 July 2011
  • *Network Interfaces *Network Management
    13 KB (1,774 words) - 18:35, 31 August 2011
  • * What does a network of truly interconnected documents look like? How could interoperability acr ...semantic technologies for HealthCare, Medical Informatics and Computer Security. Projects with high relevance to social networking, low-tech environments
    8 KB (1,106 words) - 15:50, 20 July 2011
  • - Security related issues of satellite communications - Infrastructure and network management
    9 KB (1,218 words) - 16:06, 1 October 2020
  • Network models (mobility models, traffic models, network topology) Security and emergency applications
    6 KB (809 words) - 16:26, 28 September 2011
  • Don't miss out on the opportunity to network with international researchers and practitioners and discuss the latest res *Privacy and Security
    5 KB (669 words) - 14:40, 20 December 2011
  • Information Security Network Management
    8 KB (1,085 words) - 16:28, 6 February 2012
  • - SOFTNETWORKING: Advances in Software Defined Networking and Network Communications modeling; Communications security; Computer
    6 KB (725 words) - 19:58, 22 November 2020
  • Neural network Head of 'Decision Support and Control Systems' Network Research Centre and Director of Postgraduate Admissions,
    11 KB (1,490 words) - 11:59, 27 January 2012
  • |Field=Computer security and reliability * Cyber Security
    2 KB (304 words) - 10:54, 5 March 2012
  • Energy-aware network equipments and applications Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability
    10 KB (1,297 words) - 17:49, 24 February 2012
  • ...venth International Workshop on Frontiers in Availability, Reliability and Security |Field=Computer security and reliability
    2 KB (221 words) - 16:12, 29 February 2012
  • ...ques to adjust the multimedia transmission protocols to compliant with the network’s various situations. This workshop will be held in conjunction with the - Intelligent Video Network Engineering with Distributed Optimization
    5 KB (726 words) - 15:28, 2 March 2012
  • ...t-contention protocols; Named data networking; Adaptive contention window; Network mobility models; Spectrum aggregation schemes; Smart meters; Dynamic load; ...rks; Network function virtualization (NFV) of small cells; Self-organizing network functionalities for virtualized small cells; The role of open source softwa
    13 KB (1,580 words) - 19:35, 18 February 2021
  • |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security
    4 KB (581 words) - 18:48, 24 February 2020
  • ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modelling) ...cessing (e.g. graph neural networks, domain adaptation, transfer learning, network architectures, neural ranking, neural recommendation, and neural prediction
    5 KB (653 words) - 13:04, 3 August 2023
  • |Title=19th International Conference on Applied Cryptography and Network Security |Field=computer security
    870 bytes (109 words) - 19:16, 22 January 2021
  • *Security, privacy, and trust *Social network analytics
    4 KB (535 words) - 21:32, 11 February 2020
  • *Security, privacy, and trust *Social network analytics
    4 KB (500 words) - 17:29, 6 January 2021
  • • Semantic social network analysis • Information and data governance, information assurance, security, compliance
    6 KB (872 words) - 23:11, 24 February 2020
  • * Network operations and management * Network security
    5 KB (630 words) - 05:00, 19 April 2012
  • Communication & Network systems: Computer & Network Security Systems
    10 KB (1,363 words) - 09:26, 7 May 2012
  • ...cations, Neural Networks and Applications, Remote Sensing, Self Organizing Network (SON), Project IEEE.802. ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and
    3 KB (434 words) - 22:46, 30 May 2012
  • Neural Network Applications Data Security
    10 KB (1,492 words) - 17:22, 26 June 2012
  • Wireless Network Protocols Network Architecture
    5 KB (600 words) - 14:41, 20 June 2012
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc Service and Systems Design and QoS Network Security
    5 KB (662 words) - 18:50, 20 June 2012
  • Smart Grid Security and Reliability Energy Efficient Network Hardware
    5 KB (649 words) - 10:44, 21 June 2012
  • |Field=terrorism, national security, crime, politics, law |Superevent=secau Security Congress
    4 KB (575 words) - 05:16, 28 June 2012
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • |Title=25th Usenix Network and Distributed System Security Symposium
    638 bytes (81 words) - 11:59, 10 March 2020
  • - Security and Access Control<br /> - Network Systems and Devices <br />
    3 KB (466 words) - 13:00, 16 August 2012
  • Advanced Applications of Neural Network Security
    5 KB (552 words) - 15:08, 21 August 2012
  • Co-sponsorship with International Network of Social Network Analysis (INSNA) ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society.
    6 KB (728 words) - 01:01, 25 August 2012
  • - Energy-efficient network services and operations - Energy-aware network equipments and applications
    4 KB (491 words) - 22:39, 28 August 2012
  • Network Security
    2 KB (234 words) - 08:25, 26 October 2012
  • Information Security Computer & Network Security
    2 KB (224 words) - 08:27, 26 October 2012
  • • Wireless Network Protocols • Network Architecture
    5 KB (647 words) - 19:06, 5 April 2013
  • ...esearchers, academics and practitioners specializing in the area of Mobile Network Management, Service Management, Virtualization and Object Management. ...and cooperation in an environment with a multitude of access technologies, network operators and business actors.
    9 KB (1,145 words) - 16:57, 11 April 2013
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • ** Social network analysis with Semantic Web Technologies ** Representing and reasoning about trust, privacy, and security
    5 KB (711 words) - 19:02, 7 March 2020
  • *Information Security and Cryptography *Network and Cyber Security
    2 KB (227 words) - 11:30, 21 June 2016
  • ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.
    3 KB (422 words) - 12:09, 24 April 2016
  • ...ogy; Computational neuroscience; Cognitive models; Neural hardware; Neural network theory & models; Neurodynamics; Neuroinformatics; Neuroengineering; Computa ...en Computing; Hybrid systems; Self-aware systems; Sensor networks; Network security; Petrochemical; Oil & Gas.
    3 KB (309 words) - 17:11, 18 February 2021
  • ...by people who make things work - just like you. In addition, attendees can network with experts in a variety of fields. These relationships provide great valu * Data Science (Data Mining, Machine Learning, Network Analytics)
    10 KB (1,347 words) - 15:01, 26 September 2016
  • Climate, Energy, Food, Health, Transport, Security, and Social Sciences – are the most important societal challenges tackled * Transport - Streaming sensor network and geospatial data integration
    3 KB (412 words) - 08:53, 24 September 2016
  • * Semantic social network analysis * Information Assurance and Security
    9 KB (1,131 words) - 23:18, 24 February 2020
  • |Field=social networks, complex networks, large networks, network and security
    529 bytes (63 words) - 13:47, 25 September 2016
  • * Information systems and Network security
    2 KB (197 words) - 16:16, 10 November 2016
  • ...IEICE Transactions Special Section on Information and Communication System Security (August 2017) |Field=security, informatioin security, network security, cyber security
    421 bytes (51 words) - 15:56, 15 February 2017
  • * Semantic social network analysis * Information and data governance, information assurance, security, compliance
    6 KB (877 words) - 23:06, 24 February 2020
  • ...ACM 2016 : 2016 6th International Conference on Communication and Network Security(ICCNS 2016)--ACM, EI and Scopus
    451 bytes (56 words) - 16:17, 8 July 2016
  • - Knowledge Base and Semantic Network - Security and Privacy
    12 KB (1,565 words) - 04:15, 5 August 2023
  • ...NCS 2016 : Eighth International Conference on Network and Communications Security |Field=security, networking, communications, network security
    433 bytes (52 words) - 11:17, 5 September 2016
  • |Title=ICNCT 2017 : 5th International Conference on Network and Computing Technologies (ICNCT 2017) |Field=networks, computing, cloud computing, network security
    443 bytes (50 words) - 09:31, 19 July 2019
  • |Field=cloud computing, multimedia, network security, networking
    416 bytes (48 words) - 10:48, 11 September 2016
  • |Field=communications, software engineering, networks, network security
    467 bytes (58 words) - 10:48, 11 September 2016
  • |Field=data mining, network, mechanisms&methods ...ment for sensors; Data mining and management for wireless systems; Dynamic network discovery; Mining from multiple sources; Mining personal semantic data; Min
    10 KB (1,305 words) - 00:29, 12 December 2020
  • |Title=SMGSSP 2017: Smart Micro-Grid Systems Security and Privacy |Field=privacy, security, smart micro-grids, cyber-physical systems
    2 KB (246 words) - 09:12, 3 September 2017
  • - Data Science: Methods for analyzing scientific data, business data, social network analysis, recommender systems, mining sequences, time series analysis, onli ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (282 words) - 10:48, 8 February 2020
  • * Data Science: Methods for analyzing scientific data, business data, social network analysis, recommender systems, mining sequences, time series analysis, onli ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (270 words) - 10:49, 8 February 2020
  • ...S-ACM 2016 : 2016 4th International Conference on Information and Network Security (ICINS 2016)--Ei Compendex
    452 bytes (54 words) - 10:46, 11 September 2016
  • * security and privacy * social network applications
    9 KB (1,190 words) - 10:12, 5 June 2019
  • Emerging cellular and new network architectures for 5G Communication Security, Trust, Protocols and Applications
    5 KB (588 words) - 18:00, 21 January 2017
  • - Smart city network management and services - Smart city system security and privacy
    4 KB (565 words) - 09:46, 7 February 2017
  • Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –
    5 KB (631 words) - 15:09, 10 April 2017
  • Security and Access Control Information Content Security
    4 KB (528 words) - 18:46, 29 August 2017
  • *security and privacy *social network analytics
    10 KB (1,309 words) - 10:29, 5 June 2019
  • *Web Security, Integrity, Privacy, and Trust *Visualizing Social Network Data
    18 KB (2,394 words) - 16:28, 29 January 2018
  • * Semantic social network analysis * Information/data governance, information assurance, security, compliance
    6 KB (798 words) - 23:16, 24 February 2020
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • ...inals, users’ needs and services (data, content, live streams or complex network services). - Network interoperability in the e-health ecosystems
    4 KB (509 words) - 11:36, 8 August 2017
  • *Semantics for Safety, Security & Privacy *Semantics for IT Safety & Security
    6 KB (759 words) - 15:52, 5 December 2018
  •  Data collection, analytics, security and management  Network techniques for real-time data processing
    4 KB (532 words) - 13:28, 28 July 2017
  • through the global network. Further, the conference considers as essential the - Edge Cloud Network Management
    7 KB (1,009 words) - 13:39, 3 September 2017
  • Management Issues of Social Network Big Data Security Applications of Big Data
    3 KB (461 words) - 13:22, 3 September 2017
  • |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)
    4 KB (562 words) - 12:05, 3 September 2017
  • * Security and Information Assurance * International Journal of Network Security & Its Applications (IJNSA)
    5 KB (651 words) - 11:34, 8 August 2017
  • Big data security, Database security Security and fault tolerance for embedded or ubiquitous systems
    3 KB (464 words) - 09:30, 3 September 2017
  • science and services, Web Information Systems and Applications, Computer Network Computer Network and Application Technology
    5 KB (673 words) - 09:53, 3 September 2017
  • research that includes AI and Big Data Analytics, Network Communication & Security, Computer Vision. Following the past successful symposium SoICT 2016,
    4 KB (559 words) - 11:58, 8 August 2017
  • researchers to extend their research network. Databases; Security and Cryptography; Operating Systems; Networks, Distributed
    3 KB (438 words) - 11:45, 8 August 2017
  • |Title=IJMNCT 2017 : International Journal of Mobile Network Communications & Telematics INTERNATIONAL JOURNAL OF MOBILE NETWORK COMMUNICATIONS & TELEMATICS (IJMNCT)
    6 KB (751 words) - 13:28, 28 July 2017
  • |Title=SPDF-Mobile 2017 : Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security
    4 KB (536 words) - 09:59, 21 August 2017
  • * Cryptography, security and privacy of mobile & wireless networks Network research field.
    6 KB (820 words) - 13:30, 28 July 2017
  • Performance analysis, QoS and network management Advanced wireless network technologies, architectures
    3 KB (415 words) - 13:30, 28 July 2017
  • - Network Functions Virtualization - Software Define Network
    6 KB (873 words) - 13:30, 28 July 2017
  • Network functions virtualization and software defined networking Network coding techniques
    4 KB (524 words) - 13:30, 28 July 2017
  • Network-based computing systems Network management & security
    4 KB (497 words) - 11:58, 8 August 2017
  • - Computer Network and Architecture - Information Security & Risk Management
    6 KB (814 words) - 09:03, 3 September 2017
  • Network architecture and protocols for heterogeneous IoT Network operation and management
    4 KB (483 words) - 10:00, 21 August 2017
  • |Field=security aspects. Original papers are invited on Computer Networks, Network Protocols and
    4 KB (486 words) - 11:57, 8 August 2017
  • |Title=IJNSA 2017 : International Journal of Network Security & Its Applications -- UGC, ERA Indexed |Field=security
    4 KB (628 words) - 13:34, 28 July 2017
  • |Field=security aspects. Original papers are invited on computer Networks, Network Protocols and
    4 KB (546 words) - 11:35, 8 August 2017
  • |Acronym=COMNET SI SDN/NFV Security/Performance 2017 ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV
    4 KB (515 words) - 11:28, 6 November 2020
  • |Title=ICISS 2017 : International Conference on Information Systems Security |Field=security
    5 KB (626 words) - 12:02, 3 September 2017
  • |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
    5 KB (722 words) - 10:00, 21 August 2017
  • |Title=DMCS 2017 : DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17) |Field=security
    4 KB (626 words) - 09:30, 3 September 2017
  • |Title=ICNS - Ei 2017 : 2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus |Field=security
    2 KB (308 words) - 11:50, 3 September 2017
  • |Title=SPIoT 2017 : The 6th International Symposium on Security and Privacy on Internet of Things |Field=security
    3 KB (379 words) - 12:01, 3 September 2017
  • and network security. Large Network Analysis - methods, algorithms, processes, analytic tools
    4 KB (442 words) - 10:00, 21 August 2017
  • Embedded Systems and Communication: Computer Networks; Network and Security; Signal Processing; Sensor Network; Network and Systems.
    4 KB (495 words) - 13:34, 28 July 2017
  • ...: ACM--2017 the 7th International Conference on Communication and Network Security (ICCNS 2017)--SCOPUS, Ei Compendex |Field=network security
    2 KB (216 words) - 13:34, 28 July 2017
  • ...ICINS 2017 : 2017 5th International Conference on Information and Network Security (ICINS 2017)--Ei Compendex and Scopus |Field=network security
    1 KB (130 words) - 13:34, 28 July 2017
  • - Security - Sensor networks / Ad hoc network
    4 KB (580 words) - 20:58, 12 November 2020
  • wellness, safety and security, energy and environment, communication and • Safety, security, data privacy, reputation and trust management in smart
    5 KB (696 words) - 11:36, 8 August 2017
  • - Wireless Network Protocols - Network Performance
    5 KB (632 words) - 12:30, 3 September 2017
  • |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)
    5 KB (640 words) - 13:34, 28 July 2017
  • Allocation and Network Optimization in C-RAN" - Security
    4 KB (475 words) - 12:34, 8 August 2017
  • (18) Heterogeneous Network Topologies and Configurations (20) Information Security and Cryptography
    1 KB (157 words) - 13:19, 28 July 2017
  • * Security and Privacy on the Web *Social Network Analysis and Graph Algorithms for the Web
    12 KB (1,422 words) - 10:18, 5 October 2023
  • questions of peace, security and human security abound. In this period of great intersection of security and sustainability, as well as of the continued legacy
    7 KB (1,000 words) - 12:07, 3 September 2017
  • Computer Security SEC Social Network and Media Analysis SONAMA
    5 KB (660 words) - 13:50, 8 April 2020
  • Advanced Machine Learning Technologies for Network Security.
    3 KB (355 words) - 12:33, 3 September 2017
  • Network Security
    2 KB (212 words) - 13:19, 28 July 2017
  • |Title=WiMoA 2017 : 9th International Conference on Wireless, Mobile Network & Applications 9th International Conference on Wireless, Mobile Network & Applications (WiMoA
    5 KB (616 words) - 13:19, 28 July 2017
  • various types of networks, including emerging network function virtualization -Security and privacy for SOCA
    4 KB (494 words) - 13:20, 28 July 2017
  • - Information Content Security - Web Services Security
    2 KB (242 words) - 11:35, 8 August 2017
  • Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile and network infrastructures; Crowd sourcing; Reliability, Security, Privacy and
    4 KB (508 words) - 13:23, 28 July 2017
  • - Security - Sensor networks / Ad hoc network
    3 KB (346 words) - 19:16, 26 November 2020
  • * Test, Verification, and Security of Digital Systems * Network Processor Architectures
    1 KB (178 words) - 10:05, 20 November 2020
  • - Advanced Applications of Neural Network - Security
    6 KB (818 words) - 13:40, 3 September 2017
  • |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security
    4 KB (565 words) - 17:27, 18 February 2021
  • ...e=WICS 2017 : 4th International Workshop on Information and Communication Security |Field=security
    3 KB (347 words) - 19:48, 22 November 2017
  • |Field=security Communications Systems, Embedded Systems and Information Security , to attract a
    6 KB (743 words) - 11:45, 8 August 2017
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security
    5 KB (611 words) - 11:47, 8 August 2017
  • |Field=security * International Journal On Cryptography And Information Security (IJCIS)
    7 KB (946 words) - 13:28, 28 July 2017
  • ...Ei & Scopus 2018 : 2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus |Field=network security
    1 KB (171 words) - 09:58, 21 August 2017
  • scalability, elasticity, availability, reliability, and security. Alma Riska, Network Appliances, USA
    11 KB (1,364 words) - 13:23, 3 September 2017
  • ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security
    8 KB (1,170 words) - 13:40, 3 September 2017
  • - Energy Efficient Network Hardware - Security and Privacy
    6 KB (825 words) - 13:22, 3 September 2017
  • |Field=network security
    1 KB (160 words) - 09:58, 21 August 2017
  • greatly expand on your global network of scholars and professionals. Human Rights and Security
    2 KB (262 words) - 09:58, 21 August 2017
  • |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer
    5 KB (571 words) - 11:53, 3 September 2017
  • ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security Data intelligence and data security are two closely related views, while data
    4 KB (484 words) - 10:00, 21 August 2017
  • Information Security Network Security
    2 KB (269 words) - 11:57, 3 September 2017
  • Network intelligence and network Control Information Security & Computer Forensics
    2 KB (246 words) - 12:11, 3 September 2017
  • |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service
    5 KB (571 words) - 10:51, 3 September 2017
  • and intelligent data processing, as well as enhanced data security and privacy Management Issues of Social Network Big Data
    6 KB (876 words) - 09:59, 21 August 2017
  • * Security and Information Assurance * International Journal of Network Security & Its Applications (IJNSA)
    4 KB (478 words) - 08:48, 16 May 2020
  • * Scientific information network analysis * Privacy and security issues
    4 KB (566 words) - 10:00, 21 August 2017
  • network-based Processing - Security and Privacy aspects of data management in clouds and IoT systems
    6 KB (880 words) - 10:00, 21 August 2017
  • ...he presentation of work in progress, and the establishment of a scientific network between young researchers in the region. ...would like to provide an opportunity for people to establish a scientific network that can be intensely used, including mutual visits at affordable costs. Th
    7 KB (910 words) - 10:36, 26 November 2017
  • ...he presentation of work in progress, and the establishment of a scientific network between young researchers in the region. - Security, compliance, and non-functional requirements and properties
    4 KB (565 words) - 18:34, 4 July 2020
  • progress, and the establishment of a scientific network between young opportunity for people to establish a scientific network that can be intensely
    7 KB (1,046 words) - 10:36, 26 November 2017
  • * Anonymity, security and trust for Web access ** [[has general chair::Hans Akkermans]], Network Institute, VU Amsterdam, The Netherlands
    8 KB (1,023 words) - 19:05, 7 March 2020
  • ...- just like you. In addition, attendees will have a unique opportunity to network with experts in a variety of fields. These relationships provide great valu *Semantics for IT Safety & Security
    11 KB (1,487 words) - 13:45, 13 May 2019
  • * Interconnection network, router and network interface architecture * Architectural support for security or virtualization
    2 KB (315 words) - 11:47, 11 May 2020
  • ...chine learning, in fields like medicine, biology, industry, manufacturing, security, education, virtual environments, games, are especially encouraged. * neural network learning
    3 KB (425 words) - 20:41, 7 September 2019
  • *Big Data platforms with applications to network management, security, measurements *Design, analysis, and evaluation of network architectures
    2 KB (290 words) - 11:16, 6 April 2020
  • |Title=Usenix Network and Distributed System Security Symposium
    601 bytes (76 words) - 12:01, 10 March 2020
  • |Title=16th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    687 bytes (85 words) - 14:17, 6 November 2020
  • |Title=17th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    712 bytes (89 words) - 14:18, 6 November 2020
  • |Title=18th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    923 bytes (110 words) - 14:21, 6 November 2020
  • *Real-Time Age Detection Using a Convolutional Neural Network *A Maturity Model for IT-related Security Incident Management
    7 KB (917 words) - 18:07, 17 March 2020
  • |Title=International Conference on Cryptology and Network Security |Field=Security
    149 bytes (20 words) - 11:09, 22 March 2020
  • |Title=International Conference on network and System Security
    114 bytes (16 words) - 01:25, 18 March 2020
  • Text mining and social network analysis Security
    4 KB (401 words) - 07:52, 29 July 2020
  • |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
    11 KB (1,549 words) - 11:34, 17 April 2020
  • |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (152 words) - 10:13, 17 April 2020
  • * network theory and communication networks * privacy and security
    2 KB (192 words) - 08:38, 14 April 2020
  • === Information Security === ...lysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies.
    3 KB (314 words) - 11:52, 27 March 2020
  • |Title=15th International Conference on Availability, Reliability, and Security The International Conference on Availability, Reliability, and Security (ARES) 2020
    3 KB (313 words) - 17:14, 4 November 2020
  • |Title=International Conference on Cryptology and Network Security
    617 bytes (70 words) - 14:35, 14 January 2021
  • |Title=16th EAI International Conference on Security and Privacy in Communication Networks * Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
    2 KB (299 words) - 13:10, 30 March 2020
  • * Wireless Network Security
    2 KB (192 words) - 14:37, 11 December 2023
  • *Big data platforms with applications to network management, security, measurements *Design, analysis, and evaluation of network architectures
    2 KB (238 words) - 11:18, 6 April 2020
  • |Title=14th International Conference on Provable and Practical Security ...s are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:
    2 KB (208 words) - 10:19, 9 April 2020
  • |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions
    2 KB (195 words) - 11:08, 9 April 2020
  • |Title=11th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (155 words) - 10:20, 17 April 2020
  • |Title=10th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (153 words) - 10:27, 17 April 2020
  • ...power lines) in Smart Grids; Data aggregation, privacy considerations, and network data anonymization; Mobility issues in Smart Grids; Demand - response with Utilities and transportation assets; Smart Grid efficiency, security and reliability; Smart Grids and renewable technologies; Enabling active pa
    10 KB (1,331 words) - 14:52, 19 April 2020
  • ...; Cognitive machine-to-machine networks; Adaptive multiple access schemes; Network service providers; Heterogeneous cellular networks; Caching in mobile cellu ENCOT: Emerging Network Communications and Technologies
    14 KB (1,770 words) - 14:56, 19 April 2020
  • |Title=14-th International Workshop on Advances in Information Security * Security of next generation Operating Systems
    2 KB (200 words) - 12:01, 28 April 2020
  • ...ems, payloads, communications, levels of autonomy, manned-unmanned swarms, network-controlled swarms, as well as challenges related to policies, procedures, r * Security
    3 KB (385 words) - 15:55, 29 April 2020
  • ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc. ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of serv
    4 KB (457 words) - 10:25, 6 May 2020
  • ...omplexity, predictability, quality of service, reliability, dependability, security, scalability, programmer productivity, etc. * Architectures and compilers for embedded processors, DSPs, GPUs, ASIPs (network processors, multimedia, wireless, etc.).
    4 KB (431 words) - 10:40, 6 May 2020
  • ...x effects, which must be controlled to adhere to safety, availability, and security guarantees where needed. This special day will cover the latest trends in a D7 Network on Chip, Click here for details
    12 KB (1,651 words) - 13:30, 27 November 2020
  • * Network Operations and Management * Information Infrastructure and Security
    2 KB (175 words) - 10:44, 7 May 2020
  • * Network Operations and Management * Information Infrastructure and Security
    2 KB (174 words) - 10:43, 7 May 2020
  • ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more. ...s; runtime systems; parallel and distributed systems; storage; networking; security and privacy; virtualization; software-hardware interactions; performance ev
    8 KB (1,078 words) - 09:27, 12 May 2020
  • * Networking (WAN, LAN, and datacenter) and network services * Security, privacy, and trust
    6 KB (729 words) - 09:28, 12 May 2020
  • * 5. Neural Network and Neuromorphic Computing: * 5.1. Hardware and devices for neuromorphic and neural network computing
    6 KB (739 words) - 15:08, 13 May 2020
  • * Visualizing Large Scale Security Data * HCI Challenges for Big Data Security & Privacy
    4 KB (563 words) - 15:55, 23 June 2020
  • * Visualizing Large Scale Security Data * HCI Challenges for Big Data Security & Privacy
    5 KB (543 words) - 21:14, 18 May 2020
  • * Mining graph and network data * Security and intrusion detection
    2 KB (261 words) - 20:06, 20 May 2020
  • ● Mining graph and network data ● Security and intrusion detection
    2 KB (268 words) - 20:28, 20 May 2020
  • * Mining graph and network data * Security and intrusion detection
    2 KB (272 words) - 21:17, 20 May 2020
  • * Web/online/network mining and learning * Structure/group/community/network mining
    4 KB (515 words) - 16:39, 25 May 2020
  • * Web/online/social/network mining and learning. * Structure/group/community/network mining.
    3 KB (308 words) - 16:50, 16 December 2020
  • * Visualizing Large Scale Security Data * HCI Challenges for Big Data Security & Privacy
    9 KB (1,187 words) - 14:18, 27 May 2020
  • * Fuzzy web engineering, information retrieval, text mining, and social network analysis * Computational intelligence in security
    2 KB (238 words) - 17:30, 6 May 2021
  • ...the Conference on Web and Internet Economics (named Workshop on Internet & Network Economics until 2013), which was held annually from 2005 to present. * Economic Aspects of Security and Privacy
    2 KB (329 words) - 13:48, 23 June 2020
  • ...obile devices and Internet technologies; Mobile IPv6 over Software Defined Network (SDN); Generative Mappings; Intensive mobile data processing; Virtualizatio ...s; Automatic computing for Web services; Web services challenges on trust, security, performance, scalability; Enterprise Web services; Web services discovery,
    14 KB (1,804 words) - 13:49, 5 June 2020
  • ...; Access control in mobile environments; Advanced roaming concepts; Mobile network edge-based service delivery platforms; Mobile content delivery networks; Mo Security and privacy environments; Protection and safety of distributed mobile data;
    7 KB (918 words) - 13:51, 5 June 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    17 KB (2,088 words) - 12:49, 14 June 2020
  • ...ment for sensors; Data mining and management for wireless systems; Dynamic network discovery; Mining from multiple sources; Mining personal semantic data; Min ...igration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques
    11 KB (1,356 words) - 12:56, 14 June 2020
  • * Economic Aspects of Security and Privacy * Social Networks and Network Games
    2 KB (291 words) - 14:12, 23 June 2020
  • * Economic Aspects of Security and Privacy * Network Games
    5 KB (601 words) - 07:58, 24 June 2020
  • * Economic Aspects of Security and Privacy * Network Games
    3 KB (409 words) - 11:05, 24 June 2020
  • * R12 Network, Passive and MIMO Radars, Multi-Sensor and Multi-Static Systems and Data Fu * R18 Defence and Security, Surveillance, Remote Traffi c Monitoring, Sense and Avoid Applications
    2 KB (300 words) - 19:03, 25 June 2020
  • ...nt and control of high speed networks; Performance in high speed networks; Security aspects in high speed networks; QoS/SLA in high speed networks; Diagnosing ...Management and control of sensor networks; Performance in sensor networks; Security and reliability aspects in sensor networks; Information assurance in sensor
    13 KB (1,636 words) - 11:51, 10 July 2020
  • * Network Algorithms and Performance Evaluation * Communications and Information Security
    3 KB (483 words) - 08:08, 21 August 2020
  • * Formal Methods for Network Information Management * Network Economics and Incentive-Based Computing Related to Networks
    4 KB (556 words) - 06:42, 26 August 2020
  • * Algorithmic and Complexity Aspects of Network Economics * Algorithmic Aspects of Security and Privacy
    4 KB (503 words) - 06:44, 26 August 2020
  • Air, Road, Rail and Waterways Transportation Network and Systems Security, Privacy and Safety Systems
    1 KB (156 words) - 13:41, 10 July 2020
  • ...or, etc.) in social networks; Dynamicity of social event detection; Social network and interaction analysis around places and events; Social media visualizati ...nalized opinions across blogs, social media, news sites; Balancing privacy/security/reliability/utility/usability of personal data; Multiple patterns extractio
    9 KB (1,068 words) - 19:47, 9 July 2020
  • ...DN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality ...and discovery of things on the Internet; Crowd-sourcing and things; Trust, security and privacy in Internet of Things; Lightweight implementations of cryptogra
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ..."Spectrum Allocation and Management", "Wireless and mobile technologies", "Security in wireless and mobile environment" ...ells; Reconfigurable Radio Frequency (RF) receivers; Traffic-aware of NFV (Network Function Virtualization); Energy harvesting; Large-scale array of dense dis
    11 KB (1,335 words) - 02:28, 10 July 2020
  • ...Networking and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deployment" ...ivate organizations; Cybersecurity risks; Smart home security and privacy; Security awareness; Digital forensics; Large e-Commerce; Digital crowdfunding platfo
    18 KB (2,036 words) - 02:36, 10 July 2020
  • ...entric systems; User-centric business models; User-centric requirements in network-centric approaches; User-centric and critical time-centric applications and Machine learning and artificial neural networks; Network control and feedback with man-in-the-loop; Multi-sensor user interfaces (e.
    10 KB (1,232 words) - 16:20, 22 March 2021
  • Text mining and social network analysis Security
    4 KB (422 words) - 08:30, 29 July 2020

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)