Search results
Create the page "Information Security" on this wiki! See also the search results found.
- ...for and publish information on scientific events, as well as universities, information infrastructure institutions, specialised societies, publishers and funding <!--[[:category:Information theory|Information theory]], [[:category:Internet|Internet]], [[:category:World wide web|World7 KB (815 words) - 18:03, 14 April 2021
- '''Business Information Systems''' *Cyber Security and Privacy5 KB (663 words) - 11:49, 18 February 2020
- * Semantic Information Management & Knowledge Integration * Trust, Data Privacy, and Security with Semantic Technologies6 KB (872 words) - 14:00, 22 February 2020
- * Knowledge Graph Population and Information Extraction * Trust, Privacy, and Security for Knowledge Graphs4 KB (531 words) - 14:14, 22 February 2020
- |Title=43rd International ACM SIGIR Conference on Research and Development in Information Retrieval |Field=Information retrieval8 KB (1,024 words) - 09:57, 13 May 2020
- ...ter interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational linguistics. ...ividual stakeholders. They can be use by communities to assemble and share information about applications of AI, to inform approaches to ethical use of AI and the6 KB (872 words) - 23:11, 24 February 2020
- Computer & Network Security Systems Information Theory10 KB (1,363 words) - 09:26, 7 May 2012
- |Title=International Journal of Advances in Computing and Information Technology ...ch results and fundamental advances in all aspects of computer science and Information technology. IJACIT offers wide area of scope and aim that covers almost all3 KB (434 words) - 22:46, 30 May 2012
- *Security and privacy ...formatted according to the [http://www.springer.de/comp/lncs/authors.html information for Springer LNCS authors] and submitted in PDF via [https://easychair.org/7 KB (991 words) - 11:15, 12 July 2019
- * Machine learning and information extraction on the Semantic Web * Trust, privacy, and security on the Semantic Web5 KB (663 words) - 14:34, 5 December 2018
- * Machine learning and information extraction on the Semantic Web * Trust, privacy, and security on the Semantic Web5 KB (699 words) - 14:57, 5 December 2018
- Data Security More information on special sessions is available at www.iasted.org/conferences/specialsessi10 KB (1,492 words) - 17:22, 26 June 2012
- |Title=4th International Conference on Information Visualization Theory and Applications |Field=Information Visualization4 KB (466 words) - 16:27, 19 June 2012
- ...munication Protocols, Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tra 2. WIRELESS INFORMATION NETWORKS5 KB (600 words) - 14:41, 20 June 2012
- Service and Systems Design and QoS Network Security Information and Service Economy5 KB (662 words) - 18:50, 20 June 2012
- |Field=INFORMATION TECHNOLOGIES SUPPORTING LEARNING,LEARNING/TEACHING METHODOLOGIES AND ASSESS 1. INFORMATION TECHNOLOGIES SUPPORTING LEARNING5 KB (671 words) - 18:54, 20 June 2012
- ...rested in the advances and applications in the field of Smart Grids, Green Information and Communication Technologies, Sustainability, Energy Aware Systems and Te Smart Grid Security and Reliability5 KB (649 words) - 10:44, 21 June 2012
- |Field=terrorism, national security, crime, politics, law |Superevent=secau Security Congress4 KB (575 words) - 05:16, 28 June 2012
- |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability5 KB (575 words) - 10:16, 1 August 2019
- |Title=IPICS Summer School Intensive Program on Information Communication Security |Field=information and communication security688 bytes (88 words) - 11:28, 1 August 2019
- |Title=Intensive Programme on Information and Communications Security |Field=information and communication security406 bytes (49 words) - 15:37, 1 August 2019
- ...atial exploration (telescopes, lenses), telecommunications (fiber optics), information processing (quantum computing), industry (cutting and precision measurement System Reliability and Security8 KB (1,102 words) - 17:23, 18 July 2012
- |Field=Information and Communication Security ...broad coverage of recent developments in “Information and Communication Security”. In 2012 the IPICS will be hosted by the SBA Research, at Vienna, Austri2 KB (263 words) - 15:04, 24 July 2012
- *Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS) *Intelligent Information & Database Systems2 KB (274 words) - 18:15, 13 August 2012
- - Information and Data Management<br /> - Security and Access Control<br />3 KB (466 words) - 13:00, 16 August 2012
- |Title=15th International Conference on Enterprise Information Systems ...y, Systems Integration, Artificial Intelligence, Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce5 KB (552 words) - 15:08, 21 August 2012
- ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. • Information and innovation diffusion6 KB (728 words) - 01:01, 25 August 2012
- |Superevent=World congress on Computing and Information Technology (WCIT) ...heir research activities in the field of Computer Science, Engineering and Information Technology. ICGCTI 2013 provides opportunities for the delegates to share t4 KB (491 words) - 22:39, 28 August 2012
- The 2013 International Conference of Information Engineering The 2013 International Conference of Information Security and Internet Engineering7 KB (903 words) - 16:27, 10 September 2020
- The 2013 International Conference of Information Engineering The 2013 International Conference of Information Security and Internet Engineering6 KB (868 words) - 17:21, 29 August 2012
- |Field=databases, data warehousing, data mining,data management,data security ...ehousing, data mining, data management, data security and other aspects of information systems and technology involving advanced applications of data.5 KB (558 words) - 13:27, 27 November 2020
- |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".6 KB (801 words) - 11:04, 14 April 2020
- |title=International Journal of Science and Applied Information Technology (IJSAIT) |Field=Computer Science, Information Technology2 KB (234 words) - 08:25, 26 October 2012
- Information and Computer Technology Information Security2 KB (224 words) - 08:27, 26 October 2012
- Security and Cryptography Web Information Systems2 KB (211 words) - 08:30, 26 October 2012
- |Title=6th International Conference on Information Security and Cryptology 6th International Conference on Information Security and Cryptology3 KB (351 words) - 09:52, 28 October 2012
- |Title=31st Conference on Advanced Information Systems Engineering ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness.3 KB (375 words) - 15:06, 24 September 2020
- |Title=2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013) 2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013)6 KB (764 words) - 02:27, 11 December 2012
- ...ents, logistics and networking, to complex event processing in finance and security. The DEBS conference brings together researchers and practitioners from the More information about the tracks and submission information can be found on the DEBS 2013 website:6 KB (826 words) - 15:44, 29 January 2021
- ...ternative technologies (e.g. solar, tidal, wind, biofuels); food and water security; lobbying efforts by oil and multi-national companies to counter climate sc ...iters to visit www.alternateroutes.ca for author guidelines and additional information. Submissions must be sent directly to editor@alternateroutes.ca. Publicatio3 KB (404 words) - 15:10, 10 December 2020
- |Title=The Second Asian Conference on Information Systems ...the Institute of Electrical Engineers of Japan (IEEJ) and the Electronics, Information and Systems Society under IEEJ and supported by SIIT, OPU, JAIST, NECTEC, P3 KB (408 words) - 11:39, 5 January 2013
- |Title=International Conference on Information Society |Field=Information and communication technologies4 KB (535 words) - 14:38, 17 January 2013
- |Title=5th International Conference on Knowledge Management and Information Sharing ...tures. Although standardization is indeed an essential element for sharing information, IS effectiveness requires going beyond the syntactic nature of IT and delv3 KB (441 words) - 14:52, 1 October 2020
- - Information systems and people in organizations - Information and communications technologies and development5 KB (702 words) - 10:02, 5 March 2013
- Privacy, Security and Neuroethics award and a best poster award. Please check the website for further information.5 KB (571 words) - 11:33, 26 March 2013
- ...munication Protocols, Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tra 2. WIRELESS INFORMATION NETWORKS5 KB (647 words) - 19:06, 5 April 2013
- information from content and the connection of semantics to knowledge, Please refer to the conference website for further information:5 KB (609 words) - 11:08, 26 July 2016
- |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability2 KB (264 words) - 15:32, 7 January 2021
- ...SCI indexed journals, including International Journal on Semantic Web and Information Systems (IJSWIS). More journals will be added soon. ** Machine learning and information extraction on the Web5 KB (711 words) - 19:02, 7 March 2020
- *Cyber Security *Data Mining & Information Retrieval3 KB (308 words) - 17:30, 26 May 2016
- |Title=3rd International Conference on Digital Information Processing, Data Mining, and Wireless Communications *Digital Information Processing2 KB (227 words) - 11:30, 21 June 2016
- ...istributed platforms, middleware, embedded- and cyber-physical-systems and security infrastructures. *Quality Aspects: Functionality, interoperability, performance, conformance, security, reliability, robustness, etc.3 KB (405 words) - 10:56, 24 April 2016
- ...achine learning, computational biology, agent-based systems, semantic web, information extraction and retrieval, text and web mining, health care and public servi ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.3 KB (422 words) - 12:09, 24 April 2016
- |Title=Computational Intelligence in Information Systems The main goals of Computational Intelligence in Information Systems (CIIS) are to understand better these technologies and their applic3 KB (309 words) - 17:11, 18 February 2021
- * Semantic Information Management * Semantics for IT Safety & Security10 KB (1,347 words) - 15:01, 26 September 2016
- * Information extraction and content analysis * Semantic-based information retrieval6 KB (898 words) - 14:42, 24 September 2016
- Faculty of Information Technology, Le Quy Don Technical University Information Security3 KB (359 words) - 22:34, 30 September 2016
- |Title=17th International Conference on Web Information Systems Engineering WISE 2016 welcomes all submissions that fall in the domain of Web, information systems, data analytics, and knowledge and data engineering. The decision o2 KB (230 words) - 00:37, 28 May 2016
- ...ntegration, and information extraction, as well as papers that examine the information needs of various applications. ...ication of semantics and semantic modelling to enable co-operation between information systems. This year, we would also welcome additional submissions on the cha9 KB (1,131 words) - 23:18, 24 February 2020
- |Title=25th European Conference on Information Systems |Field=Information Systems1 KB (177 words) - 10:04, 26 July 2016
- * Information systems and Network security2 KB (197 words) - 16:16, 10 November 2016
- ...IEICE Transactions Special Section on Information and Communication System Security (August 2017) |Field=security, informatioin security, network security, cyber security421 bytes (51 words) - 15:56, 15 February 2017
- ...ter interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational linguistics. ...ividual stakeholders. They can be use by communities to assemble and share information about applications of AI, to inform approaches to ethical use of AI and the6 KB (877 words) - 23:06, 24 February 2020
- ...ACM 2016 : 2016 6th International Conference on Communication and Network Security(ICCNS 2016)--ACM, EI and Scopus |Field=information technology, multimedia, wireless, information systems451 bytes (56 words) - 16:17, 8 July 2016
- |Field=information security, anti-virus358 bytes (42 words) - 16:18, 8 July 2016
- |Title=Ekoparty 2016 : Ekoparty Security Conference |Field=hacking, information security, offensive security384 bytes (45 words) - 16:18, 8 July 2016
- |Field=information security, hacking321 bytes (39 words) - 16:18, 8 July 2016
- |Field=information security, hacking282 bytes (29 words) - 18:24, 8 July 2016
- |Field=information security, hacking, it security386 bytes (48 words) - 16:18, 8 July 2016
- |Title=FC 2017 : Financial Cryptography and Data Security 2017 |Field=cryptography, information security364 bytes (45 words) - 16:19, 8 July 2016
- |Title=ICIT 2016 : 15th International Conference on Information Technology |Field=information security, biomedical informatics, text and web-data analytics426 bytes (51 words) - 16:19, 8 July 2016
- |Title=CISSI 2016 : International Symposium on Information Systems Security |Field=computer sciences, security, big data, cloud computing329 bytes (35 words) - 17:36, 8 July 2016
- ...rnational Conference on Semantic Technology for Intelligence, Defense, and Security ...chnology and ontology relevant to the fields of Intelligence, Defense, and Security. We are especially interested in papers on the following topics:4 KB (506 words) - 11:39, 8 October 2020
- |Title=ICISSP 2017 : 3rd International Conference on Information Systems Security and Privacy |Field=security systems, privacy385 bytes (48 words) - 16:21, 8 July 2016
- |Title=9th Asian Conference on Intelligent Information and Database Systems The 9th Asian Conference on Intelligent Information and Database Systems (ACIIDS) 20174 KB (464 words) - 11:38, 4 September 2020
- |Title=23rd ACM International Conference on Information and Knowledge Management |Field=Information and Knowledge Management12 KB (1,565 words) - 04:15, 5 August 2023
- - Security and Data Protection For further information please visit WCE-2016 at www.worldconedu.org6 KB (777 words) - 23:29, 29 July 2016
- ...e=IEEE iNIS 2016 : 2nd IEEE International Symposium on Nanoelectronic and Information Systems ...ation systems, iot-big data, nanoelectronic systems, cyberphysical systems security464 bytes (56 words) - 15:35, 27 August 2016
- |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things870 bytes (100 words) - 18:53, 2 March 2021
- |Title=INCISCOS 2016 : International Conference on Information Systems and Computer Science |Field=computer science, information systems, data mining, security472 bytes (58 words) - 15:36, 27 August 2016
- |Title=ICISE 2017 : 2017 2nd International Conference on Information Systems Engineering (ICISE 2017)--IEEE, Ei |Field=information technology, information systems, information security, signal processing454 bytes (53 words) - 15:36, 27 August 2016
- ...le=International Conference on Research and Practical Issues of Enterprise Information Systems |Field=Information Systems925 bytes (116 words) - 11:05, 24 August 2016
- ...cond International Conference on Computer Graphics, Vision and Information Security (CGVIS) |Field=computer graphics, computer vision, image processing, information security1 KB (143 words) - 12:26, 5 November 2020
- |Title=7th International Conference on Communications Security & Information Assurance |Field=security, communications, information security, cryptography370 bytes (37 words) - 06:18, 20 September 2016
- |Title=ICISC 2016 : The 19th Annual International Conference on Information Security and Cryptology402 bytes (52 words) - 11:16, 5 September 2016
- |Title=The Eleventh International Conference on Advances in Information Mining and Management - IMMM 2021, The Eleventh International Conference on Advances in Information Mining and Management10 KB (1,305 words) - 00:29, 12 December 2020
- |Title=23rd European Conference on Information Systems |Field=Information Systems3 KB (434 words) - 10:28, 26 July 2016
- |Title=2015 International Conference on Information Systems |Field=Information Systems2 KB (263 words) - 10:32, 26 July 2016
- ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di2 KB (282 words) - 10:48, 8 February 2020
- ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di2 KB (270 words) - 10:49, 8 February 2020
- |Title=International Conference on Information Society |Field=Information Society5 KB (641 words) - 22:32, 29 July 2016
- ...ional Civil Aviation Organization New Technology Working Group Request For Information |Field=technology, biometrics, identity management, security467 bytes (59 words) - 13:50, 25 September 2016
- ...S-ACM 2016 : 2016 4th International Conference on Information and Network Security (ICINS 2016)--Ei Compendex452 bytes (54 words) - 10:46, 11 September 2016
- |Acronym=JIP SI: Computer Security Technologies 2017 ...2017 : Journal of Information Processing, Special issue of âComputer Security Technologies against Sophisticated Cyber Attacksâ513 bytes (62 words) - 14:44, 6 November 2020
- * data mining, information extraction, search * data privacy and security4 KB (557 words) - 10:14, 15 May 2019
- ...pers on AI techniques in the context of novel application domains, such as security, sustainability, health care, transportation, and commerce. A special theme ...re allowed as long as the deadline date is not past anywhere in the world. Information about camera ready deadlines will be provided to authors at a later date.10 KB (1,466 words) - 15:17, 7 March 2021
- |Field=semantic web, internet of things, big data, information security431 bytes (45 words) - 21:01, 26 November 2016
- |Title=ICICS 2017 : The 8th International Conference on Information and Communication Systems |Field=online social networks, security, big data, communication systems441 bytes (55 words) - 13:49, 25 September 2016
- |Title=7th Asian Conference Intelligent Information and Database Systems |Field=Intelligen Information and Database Systems3 KB (340 words) - 11:27, 4 September 2020
- ...ssing, neuroscience, bioinformatics, privacy and security, machine vision, information retrieval2 KB (240 words) - 15:50, 21 May 2019
- * Software & System Security ** Software and system security and privacy18 KB (2,288 words) - 12:48, 27 October 2016
- |Title=20th International Conference on Business Information Systems BIS 2017 |Field=[[Category:Business Information Systems]]9 KB (1,190 words) - 10:12, 5 June 2019
- |Title=8th Asian Conference Intelligent Information and Database Systems |Field=Intelligent Information and Database Systems3 KB (361 words) - 10:38, 4 September 2020
- Communication Security, Trust, Protocols and Applications Communication Network Security5 KB (588 words) - 18:00, 21 January 2017
- |Title=21st European Conference on Advances in Databases and Information Systems ...ents and to promote interaction and collaboration between the database and information system research communities from European countries and the rest of the wor3 KB (421 words) - 20:37, 11 February 2021
- |Title=2017 4th IEEE ICIIP - International Conference on Image Information Processing ...ocused on all aspect of Image Processing, Computer Vision, and Information security. Like previous conferences, ICIIP 2017 will feature world class speakers, t2 KB (323 words) - 13:36, 6 March 2017
- Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –5 KB (631 words) - 15:09, 10 April 2017
- |Title=Twelfth International Conference on Digital Information Management Twelfth International Conference on Digital Information Management (ICDIM 2017)4 KB (528 words) - 18:46, 29 August 2017
- * Information extraction and content analysis * Semantic-based information retrieval7 KB (988 words) - 09:50, 14 August 2019
- |Title=The 21st International Conference on Business Information Systems |Field=Business Information Systems10 KB (1,309 words) - 10:29, 5 June 2019
- *Security, privacy, and identity on the Web *All submitted papers must be formatted in accordance to the information for Springer LNCS authors at http://www.springer.de/comp/lncs/authors.html5 KB (671 words) - 11:07, 12 July 2019
- ...to cross-fertilize their ideas on the development of Web-based intelligent information management solutions across different domains. *Indexing and Information Extraction from the (Semantic) Deep Web18 KB (2,394 words) - 16:28, 29 January 2018
- the 22nd European Symposium on Research in Computer Security (ESORICS information that they manage (as witnessed, for example, by lawsuits7 KB (887 words) - 15:22, 15 July 2017
- Large Scale Information Systems (ODBASE'17) provides a forum on the use of systems, information retrieval, knowledge discovery, and computational6 KB (798 words) - 23:16, 24 February 2020
- * Geographical Information Systems/ Global Navigation Satellite Systems * Intelligent Information & Database Systems10 KB (1,396 words) - 13:30, 28 July 2017
- |Title=IJAIT 2017 : International Journal of Advanced Information Technology ...ai Li, IT Technical Analyst, AustraliaBhupendra Gupta, Indian Institute of Information Technology, IndiaC. Gomathy, Sathyabama University, IndiaChin-Chih Chang, C3 KB (403 words) - 09:15, 12 July 2017
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 13:28, 28 July 2017
- ...IJCSEIT 2017 : International Journal of Computer Science, Engineering and Information Technology INTERNATIONAL JOURNAL OF COMPUTER SCIENCE, ENGINEERING AND INFORMATION5 KB (679 words) - 13:28, 28 July 2017
- - Wireless network security and privacy (e.g. access networks, exchanged and shared medical data) ...-Health data exchange and distributions (e.g. HL7 norms, electronic health information exchange-HIE, Health Record-HER)4 KB (509 words) - 11:36, 8 August 2017
- *Semantics for Safety, Security & Privacy *Semantic Information Management6 KB (759 words) - 15:52, 5 December 2018
- -Managing personal information disclosure in semantic environments -Shinsaku Kiyomoto, Information Security Laboratory, KDDI Research Inc.,7 KB (901 words) - 11:13, 16 July 2017
- - Information and Service Economy - Services Security and Reliability7 KB (1,009 words) - 13:39, 3 September 2017
- |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)4 KB (562 words) - 12:05, 3 September 2017
- contributions to all major fields of the Computer Science and Information * Geographical Information Systems/ Global Navigation Satellite Systems5 KB (651 words) - 11:34, 8 August 2017
- |Title=CODASPY 2018 : Conference on Data and Application Security and Privacy 8th ACM Conference on Data and Application Security and Privacy will be held on6 KB (807 words) - 13:40, 3 September 2017
- |Title=9th International Conference on Information Visualization Theory and Applications ...ization. The conference will be structured along several topics related to Information Visualization.5 KB (615 words) - 10:58, 15 May 2020
- science and services, Web Information Systems and Applications, Computer Network Geographic Information System5 KB (673 words) - 09:53, 3 September 2017
- - Security and privacy, cryptographic protocols names, affiliations and e-mails, an abstract, information about the contact7 KB (1,009 words) - 15:54, 3 September 2019
- |Title=SoICT 2017 : The Eighth International Symposium on Information and Communication Technology Security, Computer Vision. Following the past successful symposium SoICT 2016,4 KB (559 words) - 11:58, 8 August 2017
- drawn much attention from computer science and information technology as well as Institute of Information Scientists and Engineers), is to provide an3 KB (436 words) - 10:46, 27 May 2020
- * Mobile communication security issues and requirements * Privacy and Security in Mobile Computing and Wireless Systems6 KB (751 words) - 13:28, 28 July 2017
- |Title=FoIKS 2018 : 10th International Symposium on Foundations of Information and Knowledge Systems 10th Int’l. Symposium on Foundations of Information and Knowledge Systems9 KB (1,118 words) - 13:41, 3 September 2017
- |Field=security California Institute for Telecommunications and Information Technology, USA4 KB (472 words) - 14:34, 10 December 2020
- |Title=SPDF-Mobile 2017 : Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security4 KB (536 words) - 09:59, 21 August 2017
- * Information access in wireless networks * Cryptography, security and privacy of mobile & wireless networks6 KB (820 words) - 13:30, 28 July 2017
- Physical layer security As more information becomes available, it will be published at the RTUWO'173 KB (415 words) - 13:30, 28 July 2017
- - Service Security and Privacy - Location-based Information Systems6 KB (873 words) - 13:30, 28 July 2017
- 2017. More information about ICTCE 2017, please visit: http://www.ictce.org/ Ruidong Li (National Institute of Information and Communications Technology4 KB (524 words) - 13:30, 28 July 2017
- * Computer Science / Information Technology Education * Cryptography and Information security3 KB (347 words) - 10:20, 20 November 2020
- increasingly process information digitally. This has led to the study of informatics to solve privacy, security, healthcare, education, poverty, and4 KB (570 words) - 13:30, 28 July 2017
- * Computer Science / Information Technology Education * Cryptography and Information security3 KB (346 words) - 17:32, 18 February 2021
- - Database and Information Retrieval - IT Architecture and Security1 KB (136 words) - 11:52, 8 August 2017
- |Title=SKIMA 2017 : 11th International Conference on Software, Knowledge, Information Management & Applications Management, Software Engineering and Information Systems to share their ideas,4 KB (497 words) - 11:58, 8 August 2017
- |Title=ICTS 2017 : The 11th International Conference on Information & Communication Technology and System The 11th International Conference on Information & Communication Technology and6 KB (814 words) - 09:03, 3 September 2017
- Security and privacy in heterogeneous IoT Information Technology,Wah Cantt,4 KB (483 words) - 10:00, 21 August 2017
- |Field=security Wireless Networks, Data Communication Technologies, and Network Security. The4 KB (486 words) - 11:57, 8 August 2017
- |Title=IJNSA 2017 : International Journal of Network Security & Its Applications -- UGC, ERA Indexed |Field=security4 KB (628 words) - 13:34, 28 July 2017
- |Field=security Wireless Networks, Data communication Technologies, and Network Security. The4 KB (546 words) - 11:35, 8 August 2017
- |Title=ICISS 2017 : International Conference on Information Systems Security |Field=security5 KB (626 words) - 12:02, 3 September 2017
- |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities5 KB (722 words) - 10:00, 21 August 2017
- |Title=DMCS 2017 : DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17) |Field=security4 KB (626 words) - 09:30, 3 September 2017
- |Title=ICNS - Ei 2017 : 2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus |Field=security2 KB (308 words) - 11:50, 3 September 2017
- |Field=security robustness, security, privacy, and ergonomics of EEG-based biometric systems and3 KB (450 words) - 15:32, 9 October 2020
- |Title=ASPMI 2018 : Advances in Security and Privacy of Multimodal Interfaces |Field=security4 KB (592 words) - 13:34, 28 July 2017
- and network security. • Information broadcasting in Social Networks4 KB (442 words) - 10:00, 21 August 2017
- |Field=security information on how to propose a special session.3 KB (449 words) - 12:30, 3 September 2017
- Strategic Information System: Cloud Computing; Knowledge Management; System Embedded Systems and Communication: Computer Networks; Network and Security;4 KB (495 words) - 13:34, 28 July 2017
- ...ICINS 2017 : 2017 5th International Conference on Information and Network Security (ICINS 2017)--Ei Compendex and Scopus |Field=network security1 KB (130 words) - 13:34, 28 July 2017
- assist researchers in extracting useful information from the rapidly growing mining,Pre-processing techniques, Visualization, Security and information hiding5 KB (689 words) - 13:34, 28 July 2017
- Constraint Modelling and ProcessingKnowledge and information processingData and Information Integration & ModellingKnowledge ModellingData and Information3 KB (398 words) - 13:34, 28 July 2017
- |Title=ICAITA 2017 : 6th International Conference on Advanced Information Technologies and Applications 6th International Conference on Advanced Information Technologies and5 KB (589 words) - 11:46, 8 August 2017
- |Title=ACM International Conference on Ubiquitous Information Management and Communication |Field=information management4 KB (580 words) - 20:58, 12 November 2020
- wellness, safety and security, energy and environment, communication and Although Information and Communication Technologies (ICTs) play a critical and5 KB (696 words) - 11:36, 8 August 2017
- information inference associated with identification, embedded signal processing Architectures, Wireless Information Networks, Data Manipulation, Signal5 KB (632 words) - 12:30, 3 September 2017
- - Big Data Search and Information Retrieval Techniques - Big Data Privacy and Security4 KB (583 words) - 10:01, 3 September 2017
- 2. Security and Intelligence 3. Information Security4 KB (507 words) - 09:52, 3 September 2017
- in the areas of communications, computers, control, electronics, information (20) Information Security and Cryptography1 KB (157 words) - 13:19, 28 July 2017
- Cluj-Napoca, Faculty of Electronics, Telecommunications and Information Industrial Electronics, Information Security, Information Theory,4 KB (554 words) - 13:19, 28 July 2017
- ** [[has local chair::Laurent Flory]], Chief Information Officer, Université de Lyon, France * Security and Privacy on the Web12 KB (1,422 words) - 10:18, 5 October 2023
- questions of peace, security and human security abound. In this period of great intersection of security and sustainability, as well as of the continued legacy7 KB (1,000 words) - 12:07, 3 September 2017
- Computer Security SEC Information Access and Retrieval IAR5 KB (660 words) - 13:50, 8 April 2020
- |Title=MIRA 2017 : IEEE-SITIS2017: Multimedia Information Retrieval and Applications Track Multimedia Information Retrieval and Applications (MIRA)5 KB (623 words) - 11:57, 8 August 2017
- |Title=ICCIS 2017 : 2017 2nd International Conference on Communication and Information Systems (ICCIS 2017)--SCOPUS, EI Compendex |Field=information technology2 KB (212 words) - 13:19, 28 July 2017
- * Cryptography, Security and Privacy of Mobile & Wireless Networks * Information Access in Wireless Networks5 KB (616 words) - 13:19, 28 July 2017
- ...=MIPR 2018 : he First (2018) IEEE International Conference on Multimedia Information Processing and Retrieval (MIPR'18) Multimedia Information Processing and Retrieval (MIPR'18)5 KB (654 words) - 09:58, 21 August 2017
- on Semantic Web and Information Systems (IJSWIS), for fast-track publication in - Machine learning and information extraction on the Semantic Web7 KB (903 words) - 13:23, 28 July 2017
- |Title=DIPEWC 2017 : The Second International Conference on Digital Information Processing, Electronics, and Wireless Communications ...epage=http://sdiwc.net/conferences/2nd-international-conference-on-digital-information-processing-electronics-and-wireless-communications/2 KB (242 words) - 11:35, 8 August 2017
- Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile and network infrastructures; Crowd sourcing; Reliability, Security, Privacy and4 KB (508 words) - 13:23, 28 July 2017
- Enterprise Information Systems Homeland Security3 KB (324 words) - 13:34, 5 December 2017
- |Title=International Conference on Ubiquitous Information Management and Communication |Field=information management3 KB (346 words) - 19:16, 26 November 2020
- ...017 : 7th International Conference on Mathematical Aspects of Computer and Information Sciences |Field=information security5 KB (670 words) - 13:24, 28 July 2017
- |Acronym=Technologies for Security of EHR 2017 |Title=Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Cha5 KB (650 words) - 13:24, 28 July 2017
- ...Appr 2018 : Special Section on Formal Approaches at IEICE Transactions on Information and Systems The IEICE Transactions on Information and Systems announces a4 KB (593 words) - 13:24, 28 July 2017
- |Title=ICEIS 2018 : 20th International Conference on Enterprise Information Systems 20th International Conference on Enterprise Information Systems ICEIS6 KB (818 words) - 13:40, 3 September 2017
- |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security4 KB (565 words) - 17:27, 18 February 2021
- ...e=WICS 2017 : 4th International Workshop on Information and Communication Security |Field=security3 KB (347 words) - 19:48, 22 November 2017
- |Field=security Communications Systems, Embedded Systems and Information Security , to attract a6 KB (743 words) - 11:45, 8 August 2017
- ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security5 KB (611 words) - 11:47, 8 August 2017
- |Title=ICISSP 2018 : 4th International Conference on Information Systems Security and Privacy |Field=security3 KB (380 words) - 12:30, 3 September 2017
- |Field=security * Search Engines and Information Retrieval7 KB (946 words) - 13:28, 28 July 2017
- |Field=security challenges brought by the absence of infrastructures and security threats at4 KB (500 words) - 09:56, 21 August 2017
- Big Data Security, Privacy and Trust For more information about international conferences, please visit our2 KB (233 words) - 13:21, 3 September 2017
- ...yberIoT 2017 : Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal |Field=security4 KB (547 words) - 09:58, 21 August 2017
- ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security8 KB (1,170 words) - 13:40, 3 September 2017
- Smart Cities, Green Information and Communication Technologies, Sustainability, - Security and Privacy6 KB (825 words) - 13:22, 3 September 2017
- by numerous physical, financial and information flows, and, as with all systems, pressures ranging from border security and safety to the need to reduce energy2 KB (326 words) - 09:58, 21 August 2017
- |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer5 KB (571 words) - 11:53, 3 September 2017
- ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security Data intelligence and data security are two closely related views, while data4 KB (484 words) - 10:00, 21 August 2017
- |Title=IEEE ITNEC 2017: 2017 IEEE 2nd Information Technology,Networking,Electronic and Automation Control Conference Topic 1: Information Technology and Computer Science2 KB (269 words) - 11:57, 3 September 2017
- Information Security & Computer Forensics More information about ICICC 2018, please visit: http://icicc.org/2 KB (246 words) - 12:11, 3 September 2017
- architectures, protocols, and methodologies for both information management on interconnected world, information can be exchanged easily, tasks can be6 KB (876 words) - 09:59, 21 August 2017
- |Title=International Conference on Computer Science and Information Technology INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (COMIT4 KB (478 words) - 08:48, 16 May 2020
- Recent years have witnessed the rapid growth of scholarly information due to advancements in information and communication technologies. Scholarly big data4 KB (566 words) - 10:00, 21 August 2017
- - Security, compliance, and nonfunctional properties More information7 KB (1,046 words) - 10:36, 26 November 2017
- - Access control and security - Management of Incomplete information3 KB (355 words) - 10:36, 26 November 2017
- |Field=Information Systems ...lated to the temporal and spatial dimensions of the web as a repository of information8 KB (1,023 words) - 19:05, 7 March 2020
- * Database security, privacy, access control * Information extraction4 KB (419 words) - 10:40, 23 February 2020
- ...nce. The ever increasing need to distribute, exchange, and integrate data, information, and knowledge has added further importance to this subject. Advances in th ...to extensively discuss requirements, problems, and solutions in database, information, and knowledge systems. DEXA 2018 will be held in Regensburg, Germany, from4 KB (548 words) - 08:05, 13 September 2019
- ...ions, and workshops. It will cover issues in data management, database and information systems research, since they are the technological cornerstones of the emer Privacy and Security in Data Management.6 KB (826 words) - 09:45, 19 February 2021
- ...ts benefits, and encounter its limitations. Every year, SEMANTiCS attracts information managers, IT-architects, software engineers and researchers from a wide spe ...ar as well as informal settings. SEMANTiCS addresses problems common among information managers, software engineers, IT-architects and various specialist departme11 KB (1,487 words) - 13:45, 13 May 2019
- |Title=27th ACM International Conference on Information and Knowledge Management THEME: FROM BIG DATA AND BIG INFORMATION TO BIG KNOWLEDGE4 KB (546 words) - 14:37, 3 August 2023
- ...ins: Aeronautic & Aerospace, Transport constructors & operators, Defense & security, Electronics & robotics, Energy & environment, Health care & welfare servic * Systems types: Embedded systems, Transportation systems, Software systems, Information systems, Systems of systems, artificial eco-systems.3 KB (440 words) - 16:01, 14 February 2018
- ...ins: Aeronautic & Aerospace, Transport constructors & operators, Defense & security, Electronics & robotics, Energy & environment, Health care & welfare servic * Systems types: Embedded systems, Transportation systems, Software systems, Information systems, Systems of systems, artificial eco-systems.3 KB (368 words) - 16:10, 14 February 2018
- ...ation in the Life Sciences 2018 (DILS2018) will be held by TIB – Leibniz Information Centre for Science and Technology in Hannover (Germany) at Leibnizhaus on N ...esearch Center Leibniz Universität Hannover (L3S in Hannover), ZB MED – Information Centre for Life Sciences (ZB MED in Cologne/Bonn) and MHH - Hannover Medica5 KB (751 words) - 11:13, 21 April 2020
- ...to extensively discuss requirements, problems, and solutions in database, information, and knowledge systems. DEXA 2019 will be held in Linz, Austria from 26 to DEXA 2019 invites research submissions on all topics related to database, information, and knowledge systems including, but not limited to the points in the list4 KB (510 words) - 09:37, 21 April 2020
- ...chine learning, in fields like medicine, biology, industry, manufacturing, security, education, virtual environments, games, are especially encouraged. * machine learning and information retrieval3 KB (425 words) - 20:41, 7 September 2019
- * privacy and security issues * multimedia databases and information systems4 KB (436 words) - 11:49, 21 April 2020
- |Title=26th ACM Conference on Computer and Communications Security |Field=Information Security723 bytes (85 words) - 10:47, 10 March 2020
- |Title=25th Conference on Computer and Communications Security |Field=Information Security794 bytes (105 words) - 21:35, 10 March 2020
- * Privacy, trust and security in databases * Text databases and information retrieval2 KB (281 words) - 09:35, 25 March 2020
- |Field=Information Security1 KB (161 words) - 11:10, 22 May 2019
- |Title=The 22nd International Conference on Business Information Systems |Field=Business Information Systems7 KB (917 words) - 18:07, 17 March 2020
- |Title=40th International Conference on Information Systems |Field=Information Systems2 KB (215 words) - 10:18, 12 June 2019
- |Title=International Conference on Information and Communications Security |Field=Security144 bytes (18 words) - 23:02, 3 April 2020
- |Title=Information Security Practice and Experience Conference |Field=Security111 bytes (13 words) - 00:14, 31 March 2020
- |Title=IFIP Information Security & Privacy Conference |Field=Security105 bytes (13 words) - 00:16, 31 March 2020
- |Title=International Conference on Information Security and Cryptology124 bytes (16 words) - 01:07, 18 March 2020
- |Title=Information Security Conference |Field=Security119 bytes (16 words) - 18:06, 25 March 2020
- ...Systems Association (IFSA) held jointly with the 38th North American Fuzzy Information Processing Society (NAFIPS) Annual Conference''' Fuzzy information processing4 KB (401 words) - 07:52, 29 July 2020
- |Title=11th International Conference on Information Resources Management * Information Security, Privacy, and Risk Management1 KB (188 words) - 07:35, 17 April 2020
- * Information Visualization * Usable Security2 KB (200 words) - 08:47, 17 April 2020
- * Security and privacy in mobile systems ...uthors are instructed to not include their names, affiliations and contact information on the manuscript they submit for review. Authors should also anonymize the5 KB (759 words) - 15:21, 18 June 2020
- |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:11 KB (1,549 words) - 11:34, 17 April 2020
- |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict1 KB (152 words) - 10:13, 17 April 2020
- * information theoretical foundation for artificial intelligence * privacy and security2 KB (192 words) - 08:38, 14 April 2020
- |Title=34th International Conference on Information Technologies === Information Technologies ===3 KB (314 words) - 11:52, 27 March 2020
- |Title=15th International Conference on Availability, Reliability, and Security The International Conference on Availability, Reliability, and Security (ARES) 20203 KB (313 words) - 17:14, 4 November 2020
- * Language-Based Security in Data Management * Managing Uncertain and Imprecise Information2 KB (255 words) - 10:39, 17 April 2020
- * Data Privacy and Security * Information Integration and Data Quality3 KB (396 words) - 09:53, 19 February 2021
- |Title=23rd Information Security Conference431 bytes (57 words) - 18:06, 25 March 2020
- |Title=17th International Conference on Trust, Privacy and Security in Digital Business ...lack of trust in electronic procedures and the extent to which information security and user privacy can be ensured.5 KB (690 words) - 12:02, 26 March 2020
- |Title=16th International Conference on Information Security Practice and Experience1 KB (163 words) - 13:46, 30 March 2020
- * Security and privacy in mobile systems ...uthors are instructed to not include their names, affiliations and contact information on the manuscript they submit for review. Authors should also anonymize the5 KB (732 words) - 15:22, 18 June 2020
- |Title=22nd International Conference on Information and Communications Security2 KB (192 words) - 12:22, 3 April 2020
- |Title=21st International Conference on Information and Communications Security1 KB (196 words) - 06:33, 6 April 2020
- |Title=20th International Conference on Information and Communications Security2 KB (208 words) - 07:02, 6 April 2020
- ...URWARE 2021]], The Fifteenth International Conference on Emerging Security Information, Systems and Technologies2 KB (238 words) - 17:26, 14 January 2021
- |Title=22nd Information Security Conference1 KB (196 words) - 11:22, 8 April 2020
- |Title=21st Information Security Conference1 KB (180 words) - 12:46, 8 April 2020
- |Title=20th Information Security Conference1 KB (198 words) - 13:36, 8 April 2020