Search results
Create the page "Network security" on this wiki! See also the search results found.
- |Title=Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments |Field=Computer security and reliability3 KB (498 words) - 02:52, 22 December 2012
- - Simulation issues of large-scale VCS and integration of traffic-network simulators - Security, encryption and privacy for vehicular systems5 KB (624 words) - 21:14, 4 March 2010
- ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc * Cloud Security4 KB (405 words) - 20:45, 3 November 2010
- - Security for enabling eCommerce - Trust & Security Issues in e-Commerce4 KB (601 words) - 00:22, 28 March 2010
- |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress2 KB (217 words) - 16:50, 19 November 2020
- |Superevent=2010 secau Security Congress '''INFORMING SECURITY'''2 KB (215 words) - 06:52, 13 April 2010
- |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy4 KB (490 words) - 14:42, 6 November 2020
- - Security of Communication Networks - Network-based Applications (VoIP, streaming)5 KB (667 words) - 12:08, 19 May 2010
- ...eral disciplines and applications (military, industrial, medical, homeland security, etc.) with the aim of collecting and distributing observations of our worl › Sensor/Sensor Network Ontology Engineering5 KB (639 words) - 16:17, 20 May 2010
- 5. WEB SECURITY * › Web Security and Privacy5 KB (627 words) - 12:33, 16 June 2010
- |Field=Network Virtual Environment - Trust and security issues in P2P systems6 KB (858 words) - 09:18, 19 August 2010
- |Title=The Third International Workshop on Systems and Network Telemetry and Analytics (SNTA2020) |Field=systems and network telemetry, Machine learning, data science, High-performance computing, Dist4 KB (584 words) - 17:42, 13 March 2020
- |Title=Usenix Network and Distributed System Security Symposium |Field=Security147 bytes (20 words) - 00:56, 28 February 2020
- *Network and system architectures and protocols *Security and privacy3 KB (412 words) - 09:52, 27 February 2020
- |Title=Usenix Network and Distributed System Security Symposium684 bytes (84 words) - 11:33, 10 March 2020
- * › Database Security and Transaction Support * › Advanced Applications of Neural Network19 KB (2,462 words) - 19:10, 26 August 2010
- * Foundations of Privacy, Trust and Reputation in Network * Network Models for Distributed Computing4 KB (602 words) - 06:44, 26 August 2020
- |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium3 KB (343 words) - 16:31, 6 May 2020
- NEURAL NETWORK MODELS * Neural network approaches to optimization5 KB (574 words) - 15:58, 6 March 2020
- * Security in distributed computing, cryptographic protocols * System-on-chip and network-on-chip architectures3 KB (344 words) - 11:30, 21 April 2020
- • Network algorithms • Network architectures4 KB (579 words) - 15:24, 13 October 2010
- |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)5 KB (609 words) - 17:01, 5 July 2020
- ...s a publication vehicle for complete coverage of all topics of interest to network professionals and brings to its readers the latest and most important findi • Network Architectures and Protocols • Network Coding3 KB (318 words) - 16:46, 5 July 2020
- ...practical aspects of health informatics and bioinformatics and a chance to network with others working and researching in this or related areas. Security, Ethics and Privacy5 KB (693 words) - 10:44, 14 November 2010
- * Scale-free network structure of Cyber Physical Systems * System-on-Chip and Network-on-Chip Design12 KB (1,378 words) - 21:13, 28 November 2010
- Security in network, systems, and applications<br> Security in network, systems, and applications<br>4 KB (554 words) - 12:34, 14 October 2020
- Security in network, systems, and applications<br> Security in network, systems, and applications<br>4 KB (556 words) - 12:33, 14 October 2020
- Security in network, systems, and applications<br> Security in network, systems, and applications<br>4 KB (552 words) - 08:13, 10 December 2010
- Security in network, systems, and applications<br> Security in network, systems, and applications<br>4 KB (554 words) - 10:24, 6 July 2020
- Security in network, systems, and applications<br> Security in network, systems, and applications<br>4 KB (554 words) - 12:33, 14 October 2020
- |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability2 KB (217 words) - 16:57, 27 December 2015
- ...ecial Issue on Smart Protocols and Algorithms of the International Journal Network Protocols and Algorithms (ISSN 1943-3581) ...ng capacity let us include more complex algorithms that can be used by the network device to enhance the communication procedure.6 KB (833 words) - 15:16, 24 September 2020
- |Field=Computer security and reliability `SysSec <http://syssec-project.eu>`_ is a Network of Excellence in the5 KB (701 words) - 05:52, 14 April 2011
- |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability5 KB (597 words) - 10:45, 21 August 2020
- ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev3 KB (462 words) - 11:51, 22 March 2020
- |Title=10th IEEE International Symposium on Network Computing and Applications The IEEE International Symposium on Network Computing and Applications is seeking articles concerning fundamental resea3 KB (322 words) - 05:59, 8 March 2011
- A rational network can be defined as a network in which rational (self interested) participants have no reason to deviate from the actual network intended purposes (critical or not). To this7 KB (1,019 words) - 18:29, 8 April 2011
- * Network Optimization * Security3 KB (283 words) - 11:37, 1 July 2011
- ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc Service and Systems Design and QoS Network Security5 KB (677 words) - 11:59, 1 July 2011
- ...Applications, Society, e-Communities, e-Business, Web Intelligence and Web Security. Web Security and Privacy5 KB (612 words) - 12:07, 1 July 2011
- *Network Interfaces *Network Management13 KB (1,774 words) - 18:35, 31 August 2011
- * What does a network of truly interconnected documents look like? How could interoperability acr ...semantic technologies for HealthCare, Medical Informatics and Computer Security. Projects with high relevance to social networking, low-tech environments8 KB (1,106 words) - 15:50, 20 July 2011
- - Security related issues of satellite communications - Infrastructure and network management9 KB (1,218 words) - 16:06, 1 October 2020
- Network models (mobility models, traffic models, network topology) Security and emergency applications6 KB (809 words) - 16:26, 28 September 2011
- Don't miss out on the opportunity to network with international researchers and practitioners and discuss the latest res *Privacy and Security5 KB (669 words) - 14:40, 20 December 2011
- Information Security Network Management8 KB (1,085 words) - 16:28, 6 February 2012
- - SOFTNETWORKING: Advances in Software Defined Networking and Network Communications modeling; Communications security; Computer6 KB (725 words) - 19:58, 22 November 2020
- Neural network Head of 'Decision Support and Control Systems' Network Research Centre and Director of Postgraduate Admissions,11 KB (1,490 words) - 11:59, 27 January 2012
- |Field=Computer security and reliability * Cyber Security2 KB (304 words) - 10:54, 5 March 2012
- Energy-aware network equipments and applications Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability10 KB (1,297 words) - 17:49, 24 February 2012