Search results
Create the page ""Security in network" on this wiki! See also the search results found.
- |Title=19th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN) ...academia, industry, and government to present and discuss recent advances in both theoretical and experimental research. Its scope includes signal and i3 KB (412 words) - 09:52, 27 February 2020
- * Combinatorics in Computer Science * Foundations of Privacy, Trust and Reputation in Network4 KB (602 words) - 06:44, 26 August 2020
- |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium3 KB (343 words) - 16:31, 6 May 2020
- ...Joint Conference on Neural Networks (IJCNN) covers a wide range of topics in the field of neural networks, from biological neural networks to artificial NEURAL NETWORK MODELS5 KB (574 words) - 15:58, 6 March 2020
- * Security in distributed computing, cryptographic protocols * System-on-chip and network-on-chip architectures3 KB (344 words) - 11:30, 21 April 2020
- |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)5 KB (609 words) - 17:01, 5 July 2020
- ...essionals and brings to its readers the latest and most important findings in computer networks. • Network Architectures and Protocols • Network Coding3 KB (318 words) - 16:46, 5 July 2020
- ...shed papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. Security in network, systems, and applications<br>4 KB (554 words) - 12:34, 14 October 2020
- ...shed papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. Security in network, systems, and applications<br>4 KB (556 words) - 12:33, 14 October 2020
- ...shed papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. Security in network, systems, and applications<br>4 KB (554 words) - 10:24, 6 July 2020
- ...shed papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. Security in network, systems, and applications<br>4 KB (554 words) - 12:33, 14 October 2020
- |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability2 KB (217 words) - 16:57, 27 December 2015
- In conjunction with IEEE ICC 2012 ...ecial Issue on Smart Protocols and Algorithms of the International Journal Network Protocols and Algorithms (ISSN 1943-3581)6 KB (833 words) - 15:16, 24 September 2020
- |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability5 KB (597 words) - 10:45, 21 August 2020
- ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...lection, archiving, maintenance, handling and analysis of digital evidence in order to prevent damage to data integrity. Such issues combined with the co3 KB (462 words) - 11:51, 22 March 2020
- ...cademic and industrial researchers, practitioners, and students interested in future techniques relating to the satellite communications, networking, tec ...fense personal services such as tracking, visualization and virtualization in a highly secure communication environment.9 KB (1,218 words) - 16:06, 1 October 2020
- - SOFTNETWORKING: Advances in Software Defined Networking and Network ICN 2021 is scheduled to be April 18 - 22, 2021 in Porto, Portugal under6 KB (725 words) - 19:58, 22 November 2020
- AICT 2021 is scheduled to be May 30 - June 03, 2021 in Valencia, Spain under the DataSys 2021 umbrella. - regular papers [in the proceedings, digital library]13 KB (1,580 words) - 19:35, 18 February 2021
- |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security4 KB (581 words) - 18:48, 24 February 2020
- We encourage submissions of high-quality research papers on all topics in the general areas of databases, information retrieval, and knowledge manage ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modelling)5 KB (653 words) - 13:04, 3 August 2023
- |Title=19th International Conference on Applied Cryptography and Network Security |Field=computer security870 bytes (109 words) - 19:16, 22 January 2021
- ...’19) provides a forum on the use of ontologies, rules and data semantics in novel applications. Of particular relevance to ODBASE are papers that bridg ...ctor-specific or international standards for interoperable data governance in AI applications.6 KB (872 words) - 23:11, 24 February 2020
- |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability5 KB (575 words) - 10:16, 1 August 2019
- |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability2 KB (264 words) - 15:32, 7 January 2021
- ...nal Semantic Technology Conference (JIST) is to bring together researchers in Semantic Technology research community and other areas of semantic related ** Relation extraction, prediction in knowledge graph5 KB (711 words) - 19:02, 7 March 2020
- ...ill be invited to submit extended versions of their papers for publication in special issues of some prestigious international journals such as Fundamena ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.3 KB (422 words) - 12:09, 24 April 2016
- |Title=Computational Intelligence in Information Systems The main goals of Computational Intelligence in Information Systems (CIIS) are to understand better these technologies and3 KB (309 words) - 17:11, 18 February 2021
- ...ide great value to organisations as they encounter subtle technical issues in any stage of implementation. The expertise gained by SEMANTiCS attendees ha * Data Science (Data Mining, Machine Learning, Network Analytics)10 KB (1,347 words) - 15:01, 26 September 2016
- ...ciety. Big Data can make important contributions to the technical progress in our societal key sectors and help shape business. What is needed are innova ...ralized supply with renewable energies or the optimization of traffic flow in large cities.3 KB (412 words) - 08:53, 24 September 2016
- ...submit extended versions of their papers for consideration for publication in a special issue of the Springer Journal on Data Semantics (JoDS). ...of research and practical experience papers concerning scalability issues in ontology management, information integration, and information extraction, a9 KB (1,131 words) - 23:18, 24 February 2020
- ...inal research papers, state-of-the-art reviews are invited for publication in all areas of Electrical, Electronics and Instrumentation Engineering. ...veying works and industrial experiences that describe significant advances in the following areas, but are not limited to:2 KB (197 words) - 16:16, 10 November 2016
- ...’20) provides a forum on the use of ontologies, rules and data semantics in novel applications. Of particular relevance to ODBASE are papers that bridg ...ctor-specific or international standards for interoperable data governance in AI applications.6 KB (877 words) - 23:06, 24 February 2020
- Management (CIKM 2014) will be held from Nov 3-7, 2014 in Shanghai, China. CIKM is a top-tier ACM conference in the areas of information retrieval,12 KB (1,565 words) - 04:15, 5 August 2023
- |Title=The Eleventh International Conference on Advances in Information Mining and Management |Field=data mining, network, mechanisms&methods10 KB (1,305 words) - 00:29, 12 December 2020
- |Title=SMGSSP 2017: Smart Micro-Grid Systems Security and Privacy |Field=privacy, security, smart micro-grids, cyber-physical systems2 KB (246 words) - 09:12, 3 September 2017
- ...etical foundations to novel models and algorithms for data mining problems in science, business, medicine, and engineering. Visionary papers on new and e Papers submitted to the Research Track are solicited in all areas of data mining, knowledge discovery, and large-scale data analyti2 KB (282 words) - 10:48, 8 February 2020
- ...etical foundations to novel models and algorithms for data mining problems in science, business, medicine, and engineering. Visionary papers on new and e Papers submitted to the Research Track are solicited in all areas of data mining, knowledge discovery, and large-scale data analyti2 KB (270 words) - 10:49, 8 February 2020
- ...The conference addresses a wide scientific community and experts involved in the development of business computing applications.'' * security and privacy9 KB (1,190 words) - 10:12, 5 June 2019
- ...The impact ranges from incremental applications to dramatical breakthrough in the society. Users rely heavily on broadcast technology, social media, mobi ...of research that will prepare them to apply new technologies to their work in teaching, research and educational development amid this rapidly evolving l5 KB (588 words) - 18:00, 21 January 2017
- service problems. Coping with emerging challenges in engineering diverse technologies and solutions in smart sensing/devices/materials, IoT, networking,4 KB (565 words) - 09:46, 7 February 2017
- Enabling Technologies in Robotics Sensors (http://www.dirf.org/intech/sensors-for-robotics/) Architectures and solutions for security and dependable services in the Internet of things and Internet of everything (http://www.dirf.org/inte5 KB (631 words) - 15:09, 10 April 2017
- ...ffer a collaborative platform to address the emerging issues and solutions in digital information science and technology. ...ranging from real/live streams and simulations to analytics data analysis, in support of mining of knowledge. The conference will feature original resear4 KB (528 words) - 18:46, 29 August 2017
- ...The conference addresses a wide scientific community and experts involved in the development of business computing applications. *smart machines, artifical intelligence, and cognitive computing in business systems and applications10 KB (1,309 words) - 10:29, 5 June 2019
- ...elligent Web, to examine performance characteristics of various approaches in Web-based intelligent information technology, and to cross-fertilize their ...esent their contributions to the state of the art research and development in Web technology and applications18 KB (2,394 words) - 16:28, 29 January 2018
- ontologies, rules and data semantics in novel applications. Of particular application of semantic methods and technologies in corporate environments6 KB (798 words) - 23:16, 24 February 2020
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 13:28, 28 July 2017
- in conjunction with the 13th IEEE WiMob 2017 ...kshop on e-Health Pervasive Wireless Applications and Services e-HPWAS'17 (in conjunction with the prestigious 13h IEEE WiMob conference) targets providi4 KB (509 words) - 11:36, 8 August 2017
- As in the previous years, SEMANTiCS’17 proceedings will be published by in data science and its intersection with Linked Data to present their6 KB (759 words) - 15:52, 5 December 2018
- of the important applications in Cloud Computing. The academia, the industry and how to efficiently process large amount of sensor data in real-time using Cloud4 KB (532 words) - 13:28, 28 July 2017
- through the global network. Further, the conference considers as essential the link to Services Science, acknowledging the service-orientation in most current7 KB (1,009 words) - 13:39, 3 September 2017