Search results

Jump to: navigation, search
  • ...for and publish information on scientific events, as well as universities, information infrastructure institutions, specialised societies, publishers and funding <!--[[:category:Information theory|Information theory]], [[:category:Internet|Internet]], [[:category:World wide web|World
    7 KB (815 words) - 18:03, 14 April 2021
  • '''Business Information Systems''' *Cyber Security and Privacy
    5 KB (663 words) - 11:49, 18 February 2020
  • * Semantic Information Management & Knowledge Integration * Trust, Data Privacy, and Security with Semantic Technologies
    6 KB (872 words) - 14:00, 22 February 2020
  • * Knowledge Graph Population and Information Extraction * Trust, Privacy, and Security for Knowledge Graphs
    4 KB (531 words) - 14:14, 22 February 2020
  • |Title=43rd International ACM SIGIR Conference on Research and Development in Information Retrieval |Field=Information retrieval
    8 KB (1,024 words) - 09:57, 13 May 2020
  • ...ter interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational linguistics. ...ividual stakeholders. They can be use by communities to assemble and share information about applications of AI, to inform approaches to ethical use of AI and the
    6 KB (872 words) - 23:11, 24 February 2020
  • Computer & Network Security Systems Information Theory
    10 KB (1,363 words) - 09:26, 7 May 2012
  • |Title=International Journal of Advances in Computing and Information Technology ...ch results and fundamental advances in all aspects of computer science and Information technology. IJACIT offers wide area of scope and aim that covers almost all
    3 KB (434 words) - 22:46, 30 May 2012
  • *Security and privacy ...formatted according to the [http://www.springer.de/comp/lncs/authors.html information for Springer LNCS authors] and submitted in PDF via [https://easychair.org/
    7 KB (991 words) - 11:15, 12 July 2019
  • * Machine learning and information extraction on the Semantic Web * Trust, privacy, and security on the Semantic Web
    5 KB (663 words) - 14:34, 5 December 2018
  • * Machine learning and information extraction on the Semantic Web * Trust, privacy, and security on the Semantic Web
    5 KB (699 words) - 14:57, 5 December 2018
  • Data Security More information on special sessions is available at www.iasted.org/conferences/specialsessi
    10 KB (1,492 words) - 17:22, 26 June 2012
  • |Title=4th International Conference on Information Visualization Theory and Applications |Field=Information Visualization
    4 KB (466 words) - 16:27, 19 June 2012
  • ...munication Protocols, Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tra 2. WIRELESS INFORMATION NETWORKS
    5 KB (600 words) - 14:41, 20 June 2012
  • Service and Systems Design and QoS Network Security Information and Service Economy
    5 KB (662 words) - 18:50, 20 June 2012
  • |Field=INFORMATION TECHNOLOGIES SUPPORTING LEARNING,LEARNING/TEACHING METHODOLOGIES AND ASSESS 1. INFORMATION TECHNOLOGIES SUPPORTING LEARNING
    5 KB (671 words) - 18:54, 20 June 2012
  • ...rested in the advances and applications in the field of Smart Grids, Green Information and Communication Technologies, Sustainability, Energy Aware Systems and Te Smart Grid Security and Reliability
    5 KB (649 words) - 10:44, 21 June 2012
  • |Field=terrorism, national security, crime, politics, law |Superevent=secau Security Congress
    4 KB (575 words) - 05:16, 28 June 2012
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • |Title=IPICS Summer School Intensive Program on Information Communication Security |Field=information and communication security
    688 bytes (88 words) - 11:28, 1 August 2019
  • |Title=Intensive Programme on Information and Communications Security |Field=information and communication security
    406 bytes (49 words) - 15:37, 1 August 2019
  • ...atial exploration (telescopes, lenses), telecommunications (fiber optics), information processing (quantum computing), industry (cutting and precision measurement System Reliability and Security
    8 KB (1,102 words) - 17:23, 18 July 2012
  • |Field=Information and Communication Security ...broad coverage of recent developments in “Information and Communication Security”. In 2012 the IPICS will be hosted by the SBA Research, at Vienna, Austri
    2 KB (263 words) - 15:04, 24 July 2012
  • *Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS) *Intelligent Information & Database Systems
    2 KB (274 words) - 18:15, 13 August 2012
  • - Information and Data Management<br /> - Security and Access Control<br />
    3 KB (466 words) - 13:00, 16 August 2012
  • |Title=15th International Conference on Enterprise Information Systems ...y, Systems Integration, Artificial Intelligence, Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce
    5 KB (552 words) - 15:08, 21 August 2012
  • ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. • Information and innovation diffusion
    6 KB (728 words) - 01:01, 25 August 2012
  • |Superevent=World congress on Computing and Information Technology (WCIT) ...heir research activities in the field of Computer Science, Engineering and Information Technology. ICGCTI 2013 provides opportunities for the delegates to share t
    4 KB (491 words) - 22:39, 28 August 2012
  • The 2013 International Conference of Information Engineering The 2013 International Conference of Information Security and Internet Engineering
    7 KB (903 words) - 16:27, 10 September 2020
  • The 2013 International Conference of Information Engineering The 2013 International Conference of Information Security and Internet Engineering
    6 KB (868 words) - 17:21, 29 August 2012
  • |Field=databases, data warehousing, data mining,data management,data security ...ehousing, data mining, data management, data security and other aspects of information systems and technology involving advanced applications of data.
    5 KB (558 words) - 13:27, 27 November 2020
  • |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".
    6 KB (801 words) - 11:04, 14 April 2020
  • |title=International Journal of Science and Applied Information Technology (IJSAIT) |Field=Computer Science, Information Technology
    2 KB (234 words) - 08:25, 26 October 2012
  • Information and Computer Technology Information Security
    2 KB (224 words) - 08:27, 26 October 2012
  • Security and Cryptography Web Information Systems
    2 KB (211 words) - 08:30, 26 October 2012
  • |Title=6th International Conference on Information Security and Cryptology 6th International Conference on Information Security and Cryptology
    3 KB (351 words) - 09:52, 28 October 2012
  • |Title=31st Conference on Advanced Information Systems Engineering ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness.
    3 KB (375 words) - 15:06, 24 September 2020
  • |Title=2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013) 2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013)
    6 KB (764 words) - 02:27, 11 December 2012
  • ...ents, logistics and networking, to complex event processing in finance and security. The DEBS conference brings together researchers and practitioners from the More information about the tracks and submission information can be found on the DEBS 2013 website:
    6 KB (826 words) - 15:44, 29 January 2021
  • ...ternative technologies (e.g. solar, tidal, wind, biofuels); food and water security; lobbying efforts by oil and multi-national companies to counter climate sc ...iters to visit www.alternateroutes.ca for author guidelines and additional information. Submissions must be sent directly to editor@alternateroutes.ca. Publicatio
    3 KB (404 words) - 15:10, 10 December 2020
  • |Title=The Second Asian Conference on Information Systems ...the Institute of Electrical Engineers of Japan (IEEJ) and the Electronics, Information and Systems Society under IEEJ and supported by SIIT, OPU, JAIST, NECTEC, P
    3 KB (408 words) - 11:39, 5 January 2013
  • |Title=International Conference on Information Society |Field=Information and communication technologies
    4 KB (535 words) - 14:38, 17 January 2013
  • |Title=5th International Conference on Knowledge Management and Information Sharing ...tures. Although standardization is indeed an essential element for sharing information, IS effectiveness requires going beyond the syntactic nature of IT and delv
    3 KB (441 words) - 14:52, 1 October 2020
  • - Information systems and people in organizations - Information and communications technologies and development
    5 KB (702 words) - 10:02, 5 March 2013
  • Privacy, Security and Neuroethics award and a best poster award. Please check the website for further information.
    5 KB (571 words) - 11:33, 26 March 2013
  • ...munication Protocols, Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tra 2. WIRELESS INFORMATION NETWORKS
    5 KB (647 words) - 19:06, 5 April 2013
  • information from content and the connection of semantics to knowledge, Please refer to the conference website for further information:
    5 KB (609 words) - 11:08, 26 July 2016
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • ...SCI indexed journals, including International Journal on Semantic Web and Information Systems (IJSWIS). More journals will be added soon. ** Machine learning and information extraction on the Web
    5 KB (711 words) - 19:02, 7 March 2020
  • *Cyber Security *Data Mining & Information Retrieval
    3 KB (308 words) - 17:30, 26 May 2016
  • |Title=3rd International Conference on Digital Information Processing, Data Mining, and Wireless Communications *Digital Information Processing
    2 KB (227 words) - 11:30, 21 June 2016
  • ...istributed platforms, middleware, embedded- and cyber-physical-systems and security infrastructures. *Quality Aspects: Functionality, interoperability, performance, conformance, security, reliability, robustness, etc.
    3 KB (405 words) - 10:56, 24 April 2016
  • ...achine learning, computational biology, agent-based systems, semantic web, information extraction and retrieval, text and web mining, health care and public servi ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.
    3 KB (422 words) - 12:09, 24 April 2016
  • |Title=Computational Intelligence in Information Systems The main goals of Computational Intelligence in Information Systems (CIIS) are to understand better these technologies and their applic
    3 KB (309 words) - 17:11, 18 February 2021
  • * Semantic Information Management * Semantics for IT Safety & Security
    10 KB (1,347 words) - 15:01, 26 September 2016
  • * Information extraction and content analysis * Semantic-based information retrieval
    6 KB (898 words) - 14:42, 24 September 2016
  • Faculty of Information Technology, Le Quy Don Technical University Information Security
    3 KB (359 words) - 22:34, 30 September 2016
  • |Title=17th International Conference on Web Information Systems Engineering WISE 2016 welcomes all submissions that fall in the domain of Web, information systems, data analytics, and knowledge and data engineering. The decision o
    2 KB (230 words) - 00:37, 28 May 2016
  • ...ntegration, and information extraction, as well as papers that examine the information needs of various applications. ...ication of semantics and semantic modelling to enable co-operation between information systems. This year, we would also welcome additional submissions on the cha
    9 KB (1,131 words) - 23:18, 24 February 2020
  • |Title=25th European Conference on Information Systems |Field=Information Systems
    1 KB (177 words) - 10:04, 26 July 2016
  • * Information systems and Network security
    2 KB (197 words) - 16:16, 10 November 2016
  • ...IEICE Transactions Special Section on Information and Communication System Security (August 2017) |Field=security, informatioin security, network security, cyber security
    421 bytes (51 words) - 15:56, 15 February 2017
  • ...ter interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational linguistics. ...ividual stakeholders. They can be use by communities to assemble and share information about applications of AI, to inform approaches to ethical use of AI and the
    6 KB (877 words) - 23:06, 24 February 2020
  • ...ACM 2016 : 2016 6th International Conference on Communication and Network Security(ICCNS 2016)--ACM, EI and Scopus |Field=information technology, multimedia, wireless, information systems
    451 bytes (56 words) - 16:17, 8 July 2016
  • |Field=information security, anti-virus
    358 bytes (42 words) - 16:18, 8 July 2016
  • |Title=Ekoparty 2016 : Ekoparty Security Conference |Field=hacking, information security, offensive security
    384 bytes (45 words) - 16:18, 8 July 2016
  • |Field=information security, hacking
    321 bytes (39 words) - 16:18, 8 July 2016
  • |Field=information security, hacking
    282 bytes (29 words) - 18:24, 8 July 2016
  • |Field=information security, hacking, it security
    386 bytes (48 words) - 16:18, 8 July 2016
  • |Title=FC 2017 : Financial Cryptography and Data Security 2017 |Field=cryptography, information security
    364 bytes (45 words) - 16:19, 8 July 2016
  • |Title=ICIT 2016 : 15th International Conference on Information Technology |Field=information security, biomedical informatics, text and web-data analytics
    426 bytes (51 words) - 16:19, 8 July 2016
  • |Title=CISSI 2016 : International Symposium on Information Systems Security |Field=computer sciences, security, big data, cloud computing
    329 bytes (35 words) - 17:36, 8 July 2016
  • ...rnational Conference on Semantic Technology for Intelligence, Defense, and Security ...chnology and ontology relevant to the fields of Intelligence, Defense, and Security. We are especially interested in papers on the following topics:
    4 KB (506 words) - 11:39, 8 October 2020
  • |Title=ICISSP 2017 : 3rd International Conference on Information Systems Security and Privacy |Field=security systems, privacy
    385 bytes (48 words) - 16:21, 8 July 2016
  • |Title=9th Asian Conference on Intelligent Information and Database Systems The 9th Asian Conference on Intelligent Information and Database Systems (ACIIDS) 2017
    4 KB (464 words) - 11:38, 4 September 2020
  • |Title=23rd ACM International Conference on Information and Knowledge Management |Field=Information and Knowledge Management
    12 KB (1,565 words) - 04:15, 5 August 2023
  • - Security and Data Protection For further information please visit WCE-2016 at www.worldconedu.org
    6 KB (777 words) - 23:29, 29 July 2016
  • ...e=IEEE iNIS 2016 : 2nd IEEE International Symposium on Nanoelectronic and Information Systems ...ation systems, iot-big data, nanoelectronic systems, cyberphysical systems security
    464 bytes (56 words) - 15:35, 27 August 2016
  • |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things
    870 bytes (100 words) - 18:53, 2 March 2021
  • |Title=INCISCOS 2016 : International Conference on Information Systems and Computer Science |Field=computer science, information systems, data mining, security
    472 bytes (58 words) - 15:36, 27 August 2016
  • |Title=ICISE 2017 : 2017 2nd International Conference on Information Systems Engineering (ICISE 2017)--IEEE, Ei |Field=information technology, information systems, information security, signal processing
    454 bytes (53 words) - 15:36, 27 August 2016
  • ...le=International Conference on Research and Practical Issues of Enterprise Information Systems |Field=Information Systems
    925 bytes (116 words) - 11:05, 24 August 2016
  • ...cond International Conference on Computer Graphics, Vision and Information Security (CGVIS) |Field=computer graphics, computer vision, image processing, information security
    1 KB (143 words) - 12:26, 5 November 2020
  • |Title=7th International Conference on Communications Security & Information Assurance |Field=security, communications, information security, cryptography
    370 bytes (37 words) - 06:18, 20 September 2016
  • |Title=ICISC 2016 : The 19th Annual International Conference on Information Security and Cryptology
    402 bytes (52 words) - 11:16, 5 September 2016
  • |Title=The Eleventh International Conference on Advances in Information Mining and Management - IMMM 2021, The Eleventh International Conference on Advances in Information Mining and Management
    10 KB (1,305 words) - 00:29, 12 December 2020
  • |Title=23rd European Conference on Information Systems |Field=Information Systems
    3 KB (434 words) - 10:28, 26 July 2016
  • |Title=2015 International Conference on Information Systems |Field=Information Systems
    2 KB (263 words) - 10:32, 26 July 2016
  • ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (282 words) - 10:48, 8 February 2020
  • ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (270 words) - 10:49, 8 February 2020
  • |Title=International Conference on Information Society |Field=Information Society
    5 KB (641 words) - 22:32, 29 July 2016
  • ...ional Civil Aviation Organization New Technology Working Group Request For Information |Field=technology, biometrics, identity management, security
    467 bytes (59 words) - 13:50, 25 September 2016
  • ...S-ACM 2016 : 2016 4th International Conference on Information and Network Security (ICINS 2016)--Ei Compendex
    452 bytes (54 words) - 10:46, 11 September 2016
  • |Acronym=JIP SI: Computer Security Technologies 2017 ...2017 : Journal of Information Processing, Special issue of “Computer Security Technologies against Sophisticated Cyber Attacks”
    513 bytes (62 words) - 14:44, 6 November 2020
  • * data mining, information extraction, search * data privacy and security
    4 KB (557 words) - 10:14, 15 May 2019
  • ...pers on AI techniques in the context of novel application domains, such as security, sustainability, health care, transportation, and commerce. A special theme ...re allowed as long as the deadline date is not past anywhere in the world. Information about camera ready deadlines will be provided to authors at a later date.
    10 KB (1,466 words) - 15:17, 7 March 2021
  • |Field=semantic web, internet of things, big data, information security
    431 bytes (45 words) - 21:01, 26 November 2016
  • |Title=ICICS 2017 : The 8th International Conference on Information and Communication Systems |Field=online social networks, security, big data, communication systems
    441 bytes (55 words) - 13:49, 25 September 2016
  • |Title=7th Asian Conference Intelligent Information and Database Systems |Field=Intelligen Information and Database Systems
    3 KB (340 words) - 11:27, 4 September 2020
  • ...ssing, neuroscience, bioinformatics, privacy and security, machine vision, information retrieval
    2 KB (240 words) - 15:50, 21 May 2019
  • * Software & System Security ** Software and system security and privacy
    18 KB (2,288 words) - 12:48, 27 October 2016
  • |Title=20th International Conference on Business Information Systems BIS 2017 |Field=[[Category:Business Information Systems]]
    9 KB (1,190 words) - 10:12, 5 June 2019
  • |Title=8th Asian Conference Intelligent Information and Database Systems |Field=Intelligent Information and Database Systems
    3 KB (361 words) - 10:38, 4 September 2020
  • Communication Security, Trust, Protocols and Applications Communication Network Security
    5 KB (588 words) - 18:00, 21 January 2017
  • |Title=21st European Conference on Advances in Databases and Information Systems ...ents and to promote interaction and collaboration between the database and information system research communities from European countries and the rest of the wor
    3 KB (421 words) - 20:37, 11 February 2021
  • |Title=2017 4th IEEE ICIIP - International Conference on Image Information Processing ...ocused on all aspect of Image Processing, Computer Vision, and Information security. Like previous conferences, ICIIP 2017 will feature world class speakers, t
    2 KB (323 words) - 13:36, 6 March 2017
  • Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –
    5 KB (631 words) - 15:09, 10 April 2017
  • |Title=Twelfth International Conference on Digital Information Management Twelfth International Conference on Digital Information Management (ICDIM 2017)
    4 KB (528 words) - 18:46, 29 August 2017
  • * Information extraction and content analysis * Semantic-based information retrieval
    7 KB (988 words) - 09:50, 14 August 2019
  • |Title=The 21st International Conference on Business Information Systems |Field=Business Information Systems
    10 KB (1,309 words) - 10:29, 5 June 2019
  • *Security, privacy, and identity on the Web *All submitted papers must be formatted in accordance to the information for Springer LNCS authors at http://www.springer.de/comp/lncs/authors.html
    5 KB (671 words) - 11:07, 12 July 2019
  • ...to cross-fertilize their ideas on the development of Web-based intelligent information management solutions across different domains. *Indexing and Information Extraction from the (Semantic) Deep Web
    18 KB (2,394 words) - 16:28, 29 January 2018
  • the 22nd European Symposium on Research in Computer Security (ESORICS information that they manage (as witnessed, for example, by lawsuits
    7 KB (887 words) - 15:22, 15 July 2017
  • Large Scale Information Systems (ODBASE'17) provides a forum on the use of systems, information retrieval, knowledge discovery, and computational
    6 KB (798 words) - 23:16, 24 February 2020
  • * Geographical Information Systems/ Global Navigation Satellite Systems * Intelligent Information & Database Systems
    10 KB (1,396 words) - 13:30, 28 July 2017
  • |Title=IJAIT 2017 : International Journal of Advanced Information Technology ...ai Li, IT Technical Analyst, AustraliaBhupendra Gupta, Indian Institute of Information Technology, IndiaC. Gomathy, Sathyabama University, IndiaChin-Chih Chang, C
    3 KB (403 words) - 09:15, 12 July 2017
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • ...IJCSEIT 2017 : International Journal of Computer Science, Engineering and Information Technology INTERNATIONAL JOURNAL OF COMPUTER SCIENCE, ENGINEERING AND INFORMATION
    5 KB (679 words) - 13:28, 28 July 2017
  • - Wireless network security and privacy (e.g. access networks, exchanged and shared medical data) ...-Health data exchange and distributions (e.g. HL7 norms, electronic health information exchange-HIE, Health Record-HER)
    4 KB (509 words) - 11:36, 8 August 2017
  • *Semantics for Safety, Security & Privacy *Semantic Information Management
    6 KB (759 words) - 15:52, 5 December 2018
  • -Managing personal information disclosure in semantic environments -Shinsaku Kiyomoto, Information Security Laboratory, KDDI Research Inc.,
    7 KB (901 words) - 11:13, 16 July 2017
  • - Information and Service Economy - Services Security and Reliability
    7 KB (1,009 words) - 13:39, 3 September 2017
  • |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)
    4 KB (562 words) - 12:05, 3 September 2017
  • contributions to all major fields of the Computer Science and Information * Geographical Information Systems/ Global Navigation Satellite Systems
    5 KB (651 words) - 11:34, 8 August 2017
  • |Title=CODASPY 2018 : Conference on Data and Application Security and Privacy 8th ACM Conference on Data and Application Security and Privacy will be held on
    6 KB (807 words) - 13:40, 3 September 2017
  • |Title=9th International Conference on Information Visualization Theory and Applications ...ization. The conference will be structured along several topics related to Information Visualization.
    5 KB (615 words) - 10:58, 15 May 2020
  • science and services, Web Information Systems and Applications, Computer Network Geographic Information System
    5 KB (673 words) - 09:53, 3 September 2017
  • - Security and privacy, cryptographic protocols names, affiliations and e-mails, an abstract, information about the contact
    7 KB (1,009 words) - 15:54, 3 September 2019
  • |Title=SoICT 2017 : The Eighth International Symposium on Information and Communication Technology Security, Computer Vision. Following the past successful symposium SoICT 2016,
    4 KB (559 words) - 11:58, 8 August 2017
  • drawn much attention from computer science and information technology as well as Institute of Information Scientists and Engineers), is to provide an
    3 KB (436 words) - 10:46, 27 May 2020
  • * Mobile communication security issues and requirements * Privacy and Security in Mobile Computing and Wireless Systems
    6 KB (751 words) - 13:28, 28 July 2017
  • |Title=FoIKS 2018 : 10th International Symposium on Foundations of Information and Knowledge Systems 10th Int’l. Symposium on Foundations of Information and Knowledge Systems
    9 KB (1,118 words) - 13:41, 3 September 2017
  • |Field=security California Institute for Telecommunications and Information Technology, USA
    4 KB (472 words) - 14:34, 10 December 2020
  • |Title=SPDF-Mobile 2017 : Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security
    4 KB (536 words) - 09:59, 21 August 2017
  • * Information access in wireless networks * Cryptography, security and privacy of mobile & wireless networks
    6 KB (820 words) - 13:30, 28 July 2017
  • Physical layer security As more information becomes available, it will be published at the RTUWO'17
    3 KB (415 words) - 13:30, 28 July 2017
  • - Service Security and Privacy - Location-based Information Systems
    6 KB (873 words) - 13:30, 28 July 2017
  • 2017. More information about ICTCE 2017, please visit: http://www.ictce.org/ Ruidong Li (National Institute of Information and Communications Technology
    4 KB (524 words) - 13:30, 28 July 2017
  • * Computer Science / Information Technology Education * Cryptography and Information security
    3 KB (347 words) - 10:20, 20 November 2020
  • increasingly process information digitally. This has led to the study of informatics to solve privacy, security, healthcare, education, poverty, and
    4 KB (570 words) - 13:30, 28 July 2017
  • * Computer Science / Information Technology Education * Cryptography and Information security
    3 KB (346 words) - 17:32, 18 February 2021
  • - Database and Information Retrieval - IT Architecture and Security
    1 KB (136 words) - 11:52, 8 August 2017
  • |Title=SKIMA 2017 : 11th International Conference on Software, Knowledge, Information Management & Applications Management, Software Engineering and Information Systems to share their ideas,
    4 KB (497 words) - 11:58, 8 August 2017
  • |Title=ICTS 2017 : The 11th International Conference on Information & Communication Technology and System The 11th International Conference on Information & Communication Technology and
    6 KB (814 words) - 09:03, 3 September 2017
  • Security and privacy in heterogeneous IoT Information Technology,Wah Cantt,
    4 KB (483 words) - 10:00, 21 August 2017
  • |Field=security Wireless Networks, Data Communication Technologies, and Network Security. The
    4 KB (486 words) - 11:57, 8 August 2017
  • |Title=IJNSA 2017 : International Journal of Network Security & Its Applications -- UGC, ERA Indexed |Field=security
    4 KB (628 words) - 13:34, 28 July 2017
  • |Field=security Wireless Networks, Data communication Technologies, and Network Security. The
    4 KB (546 words) - 11:35, 8 August 2017
  • |Title=ICISS 2017 : International Conference on Information Systems Security |Field=security
    5 KB (626 words) - 12:02, 3 September 2017
  • |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
    5 KB (722 words) - 10:00, 21 August 2017
  • |Title=DMCS 2017 : DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17) |Field=security
    4 KB (626 words) - 09:30, 3 September 2017
  • |Title=ICNS - Ei 2017 : 2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus |Field=security
    2 KB (308 words) - 11:50, 3 September 2017
  • |Field=security robustness, security, privacy, and ergonomics of EEG-based biometric systems and
    3 KB (450 words) - 15:32, 9 October 2020
  • |Title=ASPMI 2018 : Advances in Security and Privacy of Multimodal Interfaces |Field=security
    4 KB (592 words) - 13:34, 28 July 2017
  • and network security. • Information broadcasting in Social Networks
    4 KB (442 words) - 10:00, 21 August 2017
  • |Field=security information on how to propose a special session.
    3 KB (449 words) - 12:30, 3 September 2017
  • Strategic Information System: Cloud Computing; Knowledge Management; System Embedded Systems and Communication: Computer Networks; Network and Security;
    4 KB (495 words) - 13:34, 28 July 2017
  • ...ICINS 2017 : 2017 5th International Conference on Information and Network Security (ICINS 2017)--Ei Compendex and Scopus |Field=network security
    1 KB (130 words) - 13:34, 28 July 2017
  • assist researchers in extracting useful information from the rapidly growing mining,Pre-processing techniques, Visualization, Security and information hiding
    5 KB (689 words) - 13:34, 28 July 2017
  • Constraint Modelling and ProcessingKnowledge and information processingData and Information Integration & ModellingKnowledge ModellingData and Information
    3 KB (398 words) - 13:34, 28 July 2017
  • |Title=ICAITA 2017 : 6th International Conference on Advanced Information Technologies and Applications 6th International Conference on Advanced Information Technologies and
    5 KB (589 words) - 11:46, 8 August 2017
  • |Title=ACM International Conference on Ubiquitous Information Management and Communication |Field=information management
    4 KB (580 words) - 20:58, 12 November 2020
  • wellness, safety and security, energy and environment, communication and Although Information and Communication Technologies (ICTs) play a critical and
    5 KB (696 words) - 11:36, 8 August 2017
  • information inference associated with identification, embedded signal processing Architectures, Wireless Information Networks, Data Manipulation, Signal
    5 KB (632 words) - 12:30, 3 September 2017
  • - Big Data Search and Information Retrieval Techniques - Big Data Privacy and Security
    4 KB (583 words) - 10:01, 3 September 2017
  • 2. Security and Intelligence 3. Information Security
    4 KB (507 words) - 09:52, 3 September 2017
  • in the areas of communications, computers, control, electronics, information (20) Information Security and Cryptography
    1 KB (157 words) - 13:19, 28 July 2017
  • Cluj-Napoca, Faculty of Electronics, Telecommunications and Information Industrial Electronics, Information Security, Information Theory,
    4 KB (554 words) - 13:19, 28 July 2017
  • ** [[has local chair::Laurent Flory]], Chief Information Officer, Université de Lyon, France * Security and Privacy on the Web
    12 KB (1,422 words) - 10:18, 5 October 2023
  • questions of peace, security and human security abound. In this period of great intersection of security and sustainability, as well as of the continued legacy
    7 KB (1,000 words) - 12:07, 3 September 2017
  • Computer Security SEC Information Access and Retrieval IAR
    5 KB (660 words) - 13:50, 8 April 2020
  • |Title=MIRA 2017 : IEEE-SITIS2017: Multimedia Information Retrieval and Applications Track Multimedia Information Retrieval and Applications (MIRA)
    5 KB (623 words) - 11:57, 8 August 2017
  • |Title=ICCIS 2017 : 2017 2nd International Conference on Communication and Information Systems (ICCIS 2017)--SCOPUS, EI Compendex |Field=information technology
    2 KB (212 words) - 13:19, 28 July 2017
  • * Cryptography, Security and Privacy of Mobile & Wireless Networks * Information Access in Wireless Networks
    5 KB (616 words) - 13:19, 28 July 2017
  • ...=MIPR 2018 : he First (2018) IEEE International Conference on Multimedia Information Processing and Retrieval (MIPR'18) Multimedia Information Processing and Retrieval (MIPR'18)
    5 KB (654 words) - 09:58, 21 August 2017
  • on Semantic Web and Information Systems (IJSWIS), for fast-track publication in - Machine learning and information extraction on the Semantic Web
    7 KB (903 words) - 13:23, 28 July 2017
  • |Title=DIPEWC 2017 : The Second International Conference on Digital Information Processing, Electronics, and Wireless Communications ...epage=http://sdiwc.net/conferences/2nd-international-conference-on-digital-information-processing-electronics-and-wireless-communications/
    2 KB (242 words) - 11:35, 8 August 2017
  • Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile and network infrastructures; Crowd sourcing; Reliability, Security, Privacy and
    4 KB (508 words) - 13:23, 28 July 2017
  • Enterprise Information Systems Homeland Security
    3 KB (324 words) - 13:34, 5 December 2017
  • |Title=International Conference on Ubiquitous Information Management and Communication |Field=information management
    3 KB (346 words) - 19:16, 26 November 2020
  • ...017 : 7th International Conference on Mathematical Aspects of Computer and Information Sciences |Field=information security
    5 KB (670 words) - 13:24, 28 July 2017
  • |Acronym=Technologies for Security of EHR 2017 |Title=Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Cha
    5 KB (650 words) - 13:24, 28 July 2017
  • ...Appr 2018 : Special Section on Formal Approaches at IEICE Transactions on Information and Systems The IEICE Transactions on Information and Systems announces a
    4 KB (593 words) - 13:24, 28 July 2017
  • |Title=ICEIS 2018 : 20th International Conference on Enterprise Information Systems 20th International Conference on Enterprise Information Systems ICEIS
    6 KB (818 words) - 13:40, 3 September 2017
  • |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security
    4 KB (565 words) - 17:27, 18 February 2021
  • ...e=WICS 2017 : 4th International Workshop on Information and Communication Security |Field=security
    3 KB (347 words) - 19:48, 22 November 2017
  • |Field=security Communications Systems, Embedded Systems and Information Security , to attract a
    6 KB (743 words) - 11:45, 8 August 2017
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security
    5 KB (611 words) - 11:47, 8 August 2017
  • |Title=ICISSP 2018 : 4th International Conference on Information Systems Security and Privacy |Field=security
    3 KB (380 words) - 12:30, 3 September 2017
  • |Field=security * Search Engines and Information Retrieval
    7 KB (946 words) - 13:28, 28 July 2017
  • |Field=security challenges brought by the absence of infrastructures and security threats at
    4 KB (500 words) - 09:56, 21 August 2017
  • Big Data Security, Privacy and Trust For more information about international conferences, please visit our
    2 KB (233 words) - 13:21, 3 September 2017
  • ...yberIoT 2017 : Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal |Field=security
    4 KB (547 words) - 09:58, 21 August 2017
  • ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security
    8 KB (1,170 words) - 13:40, 3 September 2017
  • Smart Cities, Green Information and Communication Technologies, Sustainability, - Security and Privacy
    6 KB (825 words) - 13:22, 3 September 2017
  • by numerous physical, financial and information flows, and, as with all systems, pressures ranging from border security and safety to the need to reduce energy
    2 KB (326 words) - 09:58, 21 August 2017
  • |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer
    5 KB (571 words) - 11:53, 3 September 2017
  • ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security Data intelligence and data security are two closely related views, while data
    4 KB (484 words) - 10:00, 21 August 2017
  • |Title=IEEE ITNEC 2017: 2017 IEEE 2nd Information Technology,Networking,Electronic and Automation Control Conference Topic 1: Information Technology and Computer Science
    2 KB (269 words) - 11:57, 3 September 2017
  • Information Security & Computer Forensics More information about ICICC 2018, please visit: http://icicc.org/
    2 KB (246 words) - 12:11, 3 September 2017
  • architectures, protocols, and methodologies for both information management on interconnected world, information can be exchanged easily, tasks can be
    6 KB (876 words) - 09:59, 21 August 2017
  • |Title=International Conference on Computer Science and Information Technology INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (COMIT
    4 KB (478 words) - 08:48, 16 May 2020
  • Recent years have witnessed the rapid growth of scholarly information due to advancements in information and communication technologies. Scholarly big data
    4 KB (566 words) - 10:00, 21 August 2017
  • - Security, compliance, and nonfunctional properties More information
    7 KB (1,046 words) - 10:36, 26 November 2017
  • - Access control and security - Management of Incomplete information
    3 KB (355 words) - 10:36, 26 November 2017
  • |Field=Information Systems ...lated to the temporal and spatial dimensions of the web as a repository of information
    8 KB (1,023 words) - 19:05, 7 March 2020
  • * Database security, privacy, access control * Information extraction
    4 KB (419 words) - 10:40, 23 February 2020
  • ...nce. The ever increasing need to distribute, exchange, and integrate data, information, and knowledge has added further importance to this subject. Advances in th ...to extensively discuss requirements, problems, and solutions in database, information, and knowledge systems. DEXA 2018 will be held in Regensburg, Germany, from
    4 KB (548 words) - 08:05, 13 September 2019
  • ...ions, and workshops. It will cover issues in data management, database and information systems research, since they are the technological cornerstones of the emer Privacy and Security in Data Management.
    6 KB (826 words) - 09:45, 19 February 2021
  • ...ts benefits, and encounter its limitations. Every year, SEMANTiCS attracts information managers, IT-architects, software engineers and researchers from a wide spe ...ar as well as informal settings. SEMANTiCS addresses problems common among information managers, software engineers, IT-architects and various specialist departme
    11 KB (1,487 words) - 13:45, 13 May 2019
  • |Title=27th ACM International Conference on Information and Knowledge Management THEME: FROM BIG DATA AND BIG INFORMATION TO BIG KNOWLEDGE
    4 KB (546 words) - 14:37, 3 August 2023
  • ...ins: Aeronautic & Aerospace, Transport constructors & operators, Defense & security, Electronics & robotics, Energy & environment, Health care & welfare servic * Systems types: Embedded systems, Transportation systems, Software systems, Information systems, Systems of systems, artificial eco-systems.
    3 KB (440 words) - 16:01, 14 February 2018
  • ...ins: Aeronautic & Aerospace, Transport constructors & operators, Defense & security, Electronics & robotics, Energy & environment, Health care & welfare servic * Systems types: Embedded systems, Transportation systems, Software systems, Information systems, Systems of systems, artificial eco-systems.
    3 KB (368 words) - 16:10, 14 February 2018
  • ...ation in the Life Sciences 2018 (DILS2018) will be held by TIB – Leibniz Information Centre for Science and Technology in Hannover (Germany) at Leibnizhaus on N ...esearch Center Leibniz Universität Hannover (L3S in Hannover), ZB MED – Information Centre for Life Sciences (ZB MED in Cologne/Bonn) and MHH - Hannover Medica
    5 KB (751 words) - 11:13, 21 April 2020
  • ...to extensively discuss requirements, problems, and solutions in database, information, and knowledge systems. DEXA 2019 will be held in Linz, Austria from 26 to DEXA 2019 invites research submissions on all topics related to database, information, and knowledge systems including, but not limited to the points in the list
    4 KB (510 words) - 09:37, 21 April 2020
  • ...chine learning, in fields like medicine, biology, industry, manufacturing, security, education, virtual environments, games, are especially encouraged. * machine learning and information retrieval
    3 KB (425 words) - 20:41, 7 September 2019
  • * privacy and security issues * multimedia databases and information systems
    4 KB (436 words) - 11:49, 21 April 2020
  • |Title=26th ACM Conference on Computer and Communications Security |Field=Information Security
    723 bytes (85 words) - 10:47, 10 March 2020
  • |Title=25th Conference on Computer and Communications Security |Field=Information Security
    794 bytes (105 words) - 21:35, 10 March 2020
  • * Privacy, trust and security in databases * Text databases and information retrieval
    2 KB (281 words) - 09:35, 25 March 2020
  • |Field=Information Security
    1 KB (161 words) - 11:10, 22 May 2019
  • |Title=The 22nd International Conference on Business Information Systems |Field=Business Information Systems
    7 KB (917 words) - 18:07, 17 March 2020
  • |Title=40th International Conference on Information Systems |Field=Information Systems
    2 KB (215 words) - 10:18, 12 June 2019
  • |Title=International Conference on Information and Communications Security |Field=Security
    144 bytes (18 words) - 23:02, 3 April 2020
  • |Title=Information Security Practice and Experience Conference |Field=Security
    111 bytes (13 words) - 00:14, 31 March 2020
  • |Title=IFIP Information Security & Privacy Conference |Field=Security
    105 bytes (13 words) - 00:16, 31 March 2020
  • |Title=International Conference on Information Security and Cryptology
    124 bytes (16 words) - 01:07, 18 March 2020
  • |Title=Information Security Conference |Field=Security
    119 bytes (16 words) - 18:06, 25 March 2020
  • ...Systems Association (IFSA) held jointly with the 38th North American Fuzzy Information Processing Society (NAFIPS) Annual Conference''' Fuzzy information processing
    4 KB (401 words) - 07:52, 29 July 2020
  • |Title=11th International Conference on Information Resources Management * Information Security, Privacy, and Risk Management
    1 KB (188 words) - 07:35, 17 April 2020
  • * Information Visualization * Usable Security
    2 KB (200 words) - 08:47, 17 April 2020
  • * Security and privacy in mobile systems ...uthors are instructed to not include their names, affiliations and contact information on the manuscript they submit for review. Authors should also anonymize the
    5 KB (759 words) - 15:21, 18 June 2020
  • |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
    11 KB (1,549 words) - 11:34, 17 April 2020
  • |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (152 words) - 10:13, 17 April 2020
  • * information theoretical foundation for artificial intelligence * privacy and security
    2 KB (192 words) - 08:38, 14 April 2020
  • |Title=34th International Conference on Information Technologies === Information Technologies ===
    3 KB (314 words) - 11:52, 27 March 2020
  • |Title=15th International Conference on Availability, Reliability, and Security The International Conference on Availability, Reliability, and Security (ARES) 2020
    3 KB (313 words) - 17:14, 4 November 2020
  • * Language-Based Security in Data Management * Managing Uncertain and Imprecise Information
    2 KB (255 words) - 10:39, 17 April 2020
  • * Data Privacy and Security * Information Integration and Data Quality
    3 KB (396 words) - 09:53, 19 February 2021
  • |Title=23rd Information Security Conference
    431 bytes (57 words) - 18:06, 25 March 2020
  • |Title=17th International Conference on Trust, Privacy and Security in Digital Business ...lack of trust in electronic procedures and the extent to which information security and user privacy can be ensured.
    5 KB (690 words) - 12:02, 26 March 2020
  • |Title=16th International Conference on Information Security Practice and Experience
    1 KB (163 words) - 13:46, 30 March 2020
  • * Security and privacy in mobile systems ...uthors are instructed to not include their names, affiliations and contact information on the manuscript they submit for review. Authors should also anonymize the
    5 KB (732 words) - 15:22, 18 June 2020
  • |Title=22nd International Conference on Information and Communications Security
    2 KB (192 words) - 12:22, 3 April 2020
  • |Title=21st International Conference on Information and Communications Security
    1 KB (196 words) - 06:33, 6 April 2020
  • |Title=20th International Conference on Information and Communications Security
    2 KB (208 words) - 07:02, 6 April 2020
  • ...URWARE 2021]], The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
    2 KB (238 words) - 17:26, 14 January 2021
  • |Title=22nd Information Security Conference
    1 KB (196 words) - 11:22, 8 April 2020
  • |Title=21st Information Security Conference
    1 KB (180 words) - 12:46, 8 April 2020
  • |Title=20th Information Security Conference
    1 KB (198 words) - 13:36, 8 April 2020

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)