Search results

Jump to: navigation, search
  • |Title=Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments |Field=Computer security and reliability
    3 KB (498 words) - 02:52, 22 December 2012
  • - Simulation issues of large-scale VCS and integration of traffic-network simulators - Security, encryption and privacy for vehicular systems
    5 KB (624 words) - 21:14, 4 March 2010
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc * Cloud Security
    4 KB (405 words) - 20:45, 3 November 2010
  • - Security for enabling eCommerce - Trust & Security Issues in e-Commerce
    4 KB (601 words) - 00:22, 28 March 2010
  • |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress
    2 KB (217 words) - 16:50, 19 November 2020
  • |Superevent=2010 secau Security Congress '''INFORMING SECURITY'''
    2 KB (215 words) - 06:52, 13 April 2010
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • - Security of Communication Networks - Network-based Applications (VoIP, streaming)
    5 KB (667 words) - 12:08, 19 May 2010
  • ...eral disciplines and applications (military, industrial, medical, homeland security, etc.) with the aim of collecting and distributing observations of our worl › Sensor/Sensor Network Ontology Engineering
    5 KB (639 words) - 16:17, 20 May 2010
  • 5. WEB SECURITY * › Web Security and Privacy
    5 KB (627 words) - 12:33, 16 June 2010
  • |Field=Network Virtual Environment - Trust and security issues in P2P systems
    6 KB (858 words) - 09:18, 19 August 2010
  • |Title=The Third International Workshop on Systems and Network Telemetry and Analytics (SNTA2020) |Field=systems and network telemetry, Machine learning, data science, High-performance computing, Dist
    4 KB (584 words) - 17:42, 13 March 2020
  • |Title=Usenix Network and Distributed System Security Symposium |Field=Security
    147 bytes (20 words) - 00:56, 28 February 2020
  • *Network and system architectures and protocols *Security and privacy
    3 KB (412 words) - 09:52, 27 February 2020
  • |Title=Usenix Network and Distributed System Security Symposium
    684 bytes (84 words) - 11:33, 10 March 2020
  • * › Database Security and Transaction Support * › Advanced Applications of Neural Network
    19 KB (2,462 words) - 19:10, 26 August 2010
  • * Foundations of Privacy, Trust and Reputation in Network * Network Models for Distributed Computing
    4 KB (602 words) - 06:44, 26 August 2020
  • |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium
    3 KB (343 words) - 16:31, 6 May 2020
  • NEURAL NETWORK MODELS * Neural network approaches to optimization
    5 KB (574 words) - 15:58, 6 March 2020
  • * Security in distributed computing, cryptographic protocols * System-on-chip and network-on-chip architectures
    3 KB (344 words) - 11:30, 21 April 2020
  • Network algorithms • Network architectures
    4 KB (579 words) - 15:24, 13 October 2010
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • ...s a publication vehicle for complete coverage of all topics of interest to network professionals and brings to its readers the latest and most important findi • Network Architectures and Protocols • Network Coding
    3 KB (318 words) - 16:46, 5 July 2020
  • ...practical aspects of health informatics and bioinformatics and a chance to network with others working and researching in this or related areas. Security, Ethics and Privacy
    5 KB (693 words) - 10:44, 14 November 2010
  • * Scale-free network structure of Cyber Physical Systems * System-on-Chip and Network-on-Chip Design
    12 KB (1,378 words) - 21:13, 28 November 2010
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 12:34, 14 October 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (556 words) - 12:33, 14 October 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (552 words) - 08:13, 10 December 2010
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 10:24, 6 July 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 12:33, 14 October 2020
  • |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (217 words) - 16:57, 27 December 2015
  • ...ecial Issue on Smart Protocols and Algorithms of the International Journal Network Protocols and Algorithms (ISSN 1943-3581) ...ng capacity let us include more complex algorithms that can be used by the network device to enhance the communication procedure.
    6 KB (833 words) - 15:16, 24 September 2020
  • |Field=Computer security and reliability `SysSec <http://syssec-project.eu>`_ is a Network of Excellence in the
    5 KB (701 words) - 05:52, 14 April 2011
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev
    3 KB (462 words) - 11:51, 22 March 2020
  • |Title=10th IEEE International Symposium on Network Computing and Applications The IEEE International Symposium on Network Computing and Applications is seeking articles concerning fundamental resea
    3 KB (322 words) - 05:59, 8 March 2011
  • A rational network can be defined as a network in which rational (self interested) participants have no reason to deviate from the actual network intended purposes (critical or not). To this
    7 KB (1,019 words) - 18:29, 8 April 2011
  • * Network Optimization * Security
    3 KB (283 words) - 11:37, 1 July 2011
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc Service and Systems Design and QoS Network Security
    5 KB (677 words) - 11:59, 1 July 2011
  • ...Applications, Society, e-Communities, e-Business, Web Intelligence and Web Security. Web Security and Privacy
    5 KB (612 words) - 12:07, 1 July 2011
  • *Network Interfaces *Network Management
    13 KB (1,774 words) - 18:35, 31 August 2011
  • * What does a network of truly interconnected documents look like? How could interoperability acr ...semantic technologies for HealthCare, Medical Informatics and Computer Security. Projects with high relevance to social networking, low-tech environments
    8 KB (1,106 words) - 15:50, 20 July 2011
  • - Security related issues of satellite communications - Infrastructure and network management
    9 KB (1,218 words) - 16:06, 1 October 2020
  • Network models (mobility models, traffic models, network topology) Security and emergency applications
    6 KB (809 words) - 16:26, 28 September 2011
  • Don't miss out on the opportunity to network with international researchers and practitioners and discuss the latest res *Privacy and Security
    5 KB (669 words) - 14:40, 20 December 2011
  • Information Security Network Management
    8 KB (1,085 words) - 16:28, 6 February 2012
  • - SOFTNETWORKING: Advances in Software Defined Networking and Network Communications modeling; Communications security; Computer
    6 KB (725 words) - 19:58, 22 November 2020
  • Neural network Head of 'Decision Support and Control Systems' Network Research Centre and Director of Postgraduate Admissions,
    11 KB (1,490 words) - 11:59, 27 January 2012
  • |Field=Computer security and reliability * Cyber Security
    2 KB (304 words) - 10:54, 5 March 2012
  • Energy-aware network equipments and applications Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability
    10 KB (1,297 words) - 17:49, 24 February 2012

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)