Search results
Create the page "It security" on this wiki! See also the search results found.
- ...ivilization that can resolve the conflict of civilizations, and how should it be discussed? 4-1-2. Is it possible to envisage the evolution or development of ethics?10 KB (1,552 words) - 17:04, 24 February 2016
- ...range of audiences over large numbers of geographically dispersed people. It is evident that the satellite will play a complementary, but essential, rol - Security related issues of satellite communications9 KB (1,218 words) - 16:06, 1 October 2020
- indexes so that it can be assessed easily. Revised and expanded version of the The 2012 International Conference of Information Security and Internet Engineering7 KB (909 words) - 16:30, 10 September 2020
- ...ple. It is time to ask: can the Web be reimagined for the public good? Can it be made more human-centric, and if so, how? ...rity & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and trust for Web access; false news; data for the public good; and crime o6 KB (910 words) - 12:04, 31 January 2020
- *Models to Support IT Management *Cyber Security and Privacy5 KB (663 words) - 11:49, 18 February 2020
- * Trust, Data Privacy, and Security with Semantic Technologies ...ces. Each submission will be reviewed by several PC members who will judge it based on its innovativeness, appropriateness, and impact of results in term6 KB (872 words) - 14:00, 22 February 2020
- • Information and data governance, information assurance, security, compliance • Role of mutual impact of society on/by IT (with focus on ontologies and databases)6 KB (872 words) - 23:11, 24 February 2020
- ...st is a metropolitan region south of Brisbane on Australia’s east coast. It's famed for its long sandy beaches, surfing spots and elaborate system of i * Trust, privacy, and security on the Semantic Web5 KB (663 words) - 14:34, 5 December 2018
- |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability5 KB (575 words) - 10:16, 1 August 2019
- indexes so that it can be assessed easily. Revised and expanded version of the The 2013 International Conference of Information Security and Internet Engineering7 KB (903 words) - 16:27, 10 September 2020
- |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".6 KB (801 words) - 11:04, 14 April 2020
- |Homepage=https://www.caise19.it/ ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness.3 KB (375 words) - 15:06, 24 September 2020
- ...nformation, IS effectiveness requires going beyond the syntactic nature of IT and delve into the human functions involved in the semantic, pragmatic and Information security3 KB (441 words) - 14:52, 1 October 2020
- ...huyLoi University and held from 07 to 09 November 2016 in Ha Noi, Vietnam. It continues to offer an opportunity for researchers and innovators to discuss ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.3 KB (422 words) - 12:09, 24 April 2016
- * Semantics for IT Safety & Security * Safety & Security10 KB (1,347 words) - 15:01, 26 September 2016
- * Trust, security, and privacy ...research approach and results during the poster session of the conference. It is great for discussing your research in free form with all attendants of t6 KB (898 words) - 14:42, 24 September 2016
- ...posal, its appeal to a viable fraction of the Web community as well as how it fits in with the conference. Topics of interest include, but are not restri * Web Security and Trust Management2 KB (230 words) - 00:37, 28 May 2016
- * Information and data governance, information assurance, security, compliance * Role of mutual impact of society on/by IT (with focus on ontologies and databases)6 KB (877 words) - 23:06, 24 February 2020
- |Field=information security, hacking, it security386 bytes (48 words) - 16:18, 8 July 2016
- ...rnational Conference on Semantic Technology for Intelligence, Defense, and Security ...chnology and ontology relevant to the fields of Intelligence, Defense, and Security. We are especially interested in papers on the following topics:4 KB (506 words) - 11:39, 8 October 2020
- knowledge management and databases. Since 1992, it has successfully brought - Security and Privacy12 KB (1,565 words) - 04:15, 5 August 2023
- - Security and Data Protection ...t your research paper at http://worldconedu.org/paper-submission/ or email it to papers-2016@worldconedu.org6 KB (777 words) - 23:29, 29 July 2016
- Modern society is a networked society permeated by information technology (IT), which defines ECIS 2015's Conference Theme. Networks - perceived as a gro * Methods, Tools and Human Factors in IS/IT Management3 KB (434 words) - 10:28, 26 July 2016
- * IT Implementation, Adoption and Use * Security and Privacy of Information and IS2 KB (263 words) - 10:32, 26 July 2016
- ...Computing based on Semantics (“meaning”, "context", “intention”). It addresses all types of resources including data, document, tool, device, pr Use of Semantics in IT Applications5 KB (580 words) - 20:22, 28 January 2017
- ...ablished itself as the world's premier research conference in data mining. It provides an international forum for presentation of original research resul - Security, privacy and social impact of data mining3 KB (407 words) - 10:17, 27 July 2016
- - Internet security - Globalisation and developmental IT5 KB (641 words) - 22:32, 29 July 2016
- ...brating the achievements of artificial intelligence research and practice. It is a highly referenced conference that will provide authors with useful cri ...pers on AI techniques in the context of novel application domains, such as security, sustainability, health care, transportation, and commerce. A special theme10 KB (1,466 words) - 15:17, 7 March 2021
- * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main4 KB (528 words) - 11:25, 26 June 2020
- * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main4 KB (490 words) - 11:42, 26 June 2020
- ...ry, it grew as well renowned event of the scientific community. Every year it joins international researchers for scientific discussions on the developme * security and privacy9 KB (1,190 words) - 10:12, 5 June 2019
- ...tors, practitioners, researchers and scientists in the development arenas. It aims to provide discussions and simulations in the communication technology Communication Security, Trust, Protocols and Applications5 KB (588 words) - 18:00, 21 January 2017
- - Smart city IT connectivity management - Smart city system security and privacy4 KB (565 words) - 09:46, 7 February 2017
- Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin ...(seventh edition) will be held at Luton, UK during August 16-18, 2017 and it offers the opportunity for institutes, research centers, engineers, scienti5 KB (631 words) - 15:09, 10 April 2017
- * Trust, security, and privacy ...research approach and results during the poster session of the conference. It is great for discussing your research in free form with all attendants of t7 KB (988 words) - 09:50, 14 August 2019
- ...ry, it grew as well renowned event of the scientific community. Every year it joins international researchers for scientific discussions on the developme *security and privacy10 KB (1,309 words) - 10:29, 5 June 2019
- ...S is a series of peer-reviewed International Computer Science conferences. It is a forum for researchers and practitioners to present their state-of-the- *Web Security, Integrity, Privacy, and Trust18 KB (2,394 words) - 16:28, 29 January 2018
- * IT policy and business management * Security and Information Assurance10 KB (1,396 words) - 13:30, 28 July 2017
- ...Kumar Das, Calcutta Institute of Engineering and Management, IndiaBai Li, IT Technical Analyst, AustraliaBhupendra Gupta, Indian Institute of Informatio3 KB (403 words) - 09:15, 12 July 2017
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 13:28, 28 July 2017
- * IT policy and business management * Security and Information Assurance5 KB (679 words) - 13:28, 28 July 2017
- *Semantics for Safety, Security & Privacy *Semantics for IT Safety & Security6 KB (759 words) - 15:52, 5 December 2018
- IT-driven collaborations. The conference is nevertheless not about the union o Emerging Enterprise Technologies are profoundly changing the way we think of IT7 KB (1,009 words) - 13:39, 3 September 2017
- Research, Development, and Application. And it will be held in Shanghai, China, Security Applications of Big Data3 KB (461 words) - 13:22, 3 September 2017
- |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)4 KB (562 words) - 12:05, 3 September 2017
- * Security and Information Assurance & IT) [http://airccse.org/cscp.html] series (Confirmed).5 KB (651 words) - 11:34, 8 August 2017
- * Internet, Web and Security Visualization ...cientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, auth5 KB (615 words) - 10:58, 15 May 2020
- It is one of the leading international conferences for presenting novel and Network and Data Security5 KB (673 words) - 09:53, 3 September 2017
- - Security and privacy, cryptographic protocols in a journal or conference with published proceedings. It should not be7 KB (1,009 words) - 15:54, 3 September 2019
- presentation of recent original work and it is an opportunity for students and Databases; Security and Cryptography; Operating Systems; Networks, Distributed3 KB (438 words) - 11:45, 8 August 2017