Search results
Create the page "Network security" on this wiki! See also the search results found.
- ...and operation of Next Generation Internet networks. It is organized by the Network of Excellence (NoE) Euro-FGI (http://www.eurongi.org) that was initiated by * Network co-operation3 KB (382 words) - 23:12, 14 October 2008
- ...ield of computer and data communication networks. We invite submissions on network architecture, design, implementation, operations, analysis, measurement, pe * Analysis and design of network architectures and algorithms3 KB (352 words) - 23:12, 14 October 2008
- - Network Security - Trust, Security, and Privacy3 KB (465 words) - 23:13, 14 October 2008
- * Computer Networks and Security * Network Reliability and QoS2 KB (283 words) - 23:13, 14 October 2008
- | Title = Fifth Annual Conference on Wireless On demand Network Systems and Services effort as well as with little dependency on existing network infrastructures.3 KB (413 words) - 23:13, 14 October 2008
- architectural boundaries of large-scale network services. We solicit * Security and resilience of networked systems4 KB (528 words) - 23:13, 14 October 2008
- sub-areas of research: adaptation of system operations to the network the 90's that had an inward focus on network signaling & control today's5 KB (651 words) - 23:13, 14 October 2008
- - Wireless network security and privacy - Security Techniques and systems3 KB (343 words) - 10:31, 14 August 2023
- *Security and privacy in Web search and mining *Discovery-driven Web and social network mining2 KB (237 words) - 12:23, 11 September 2020
- | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.4 KB (457 words) - 23:13, 14 October 2008
- ...nhanced business information systems, e-education specialists, Information security, and other Web related technologies. The aim of NWeSP'08 is to serve as a f Web Services Security3 KB (494 words) - 23:16, 14 October 2008
- ...os, audio recordings) in bibliometrics (publication patterns), in homeland security (terrorist networks). * Social network analysis3 KB (453 words) - 23:14, 14 October 2008
- networks, including user behavior models, security and trust, P2P, the Network Society"7 KB (813 words) - 23:14, 14 October 2008
- * Networking and network services * Security, privacy, and trust6 KB (869 words) - 23:14, 14 October 2008
- * Security of WiMAX in NGN * Network architecture infrastructure integration of WiMAX in NGN1 KB (181 words) - 23:14, 14 October 2008
- ...ant research dialog, or pushes the architectural boundaries of large-scale network services. We solicit papers describing original and previously unpublished * Security, robustness, and fault-tolerance in networked environments8 KB (1,093 words) - 23:15, 14 October 2008
- ...itionally offered predominantly passive experiences, continual advances in network and computer technologies are providing tools for implementing greater inte * QoS and Security Support for Entertainment8 KB (1,011 words) - 23:15, 14 October 2008
- | Title = IEEE 3rd International Workshop on Distributed Autonomous Network Management Systems 3rd International Workshop on Distributed Autonomous Network6 KB (663 words) - 23:15, 14 October 2008
- * Security, privacy and trust management in collaborative networks, systems, and appli * Workflow management for collaborative network/system8 KB (1,093 words) - 23:15, 14 October 2008
- | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)5 KB (628 words) - 23:15, 14 October 2008
- 3-08 Network routing and communication algorithms 4. Security and Privacy5 KB (623 words) - 23:15, 14 October 2008
- ...ng difficult social and policy issues such as those related to privacy and security The third generation of social networking technologies has hit the Web. This network serve increasingly8 KB (1,003 words) - 23:15, 14 October 2008
- | Title = 4th IEEE Workshop on Secure Network Protocols 4th workshop on Secure Network Protocols (NPSec 2008)4 KB (493 words) - 23:15, 14 October 2008
- * Giuseppe Persiano: Security of networks of low capability devices Network information management is a growing area of research at the attention4 KB (563 words) - 23:15, 14 October 2008
- * Measurement-based network management such as traffic engineering * Network applications such as WWW, multimedia streaming, and gaming3 KB (313 words) - 23:15, 14 October 2008
- ...lumes, mainly because of converged type of traffic resulted from converged network operation under converged services and applications. Moreover, wireless acc * New Teletraffic and Network Traffic Challenges and Paradigms5 KB (598 words) - 10:18, 29 May 2016
- ...act may both be mobile. Their implementation requires advances in wireless network technologies and devices, development of infrastructures supporting cogniti * Ad hoc and sensor network support for ubiquitous computing5 KB (599 words) - 23:15, 14 October 2008
- | Title = 18th International workshop on Network and Operating Systems Support for Digital Audio and Video In-network stream processing3 KB (322 words) - 23:15, 14 October 2008
- |Title=6th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability509 bytes (65 words) - 14:00, 6 November 2020
- |Title=7th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability509 bytes (62 words) - 14:01, 6 November 2020
- |Title=9th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability496 bytes (63 words) - 14:05, 6 November 2020
- |Title=15th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability506 bytes (61 words) - 14:16, 6 November 2020
- |Title=8th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability475 bytes (60 words) - 14:03, 6 November 2020
- |Title=14th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability485 bytes (60 words) - 14:15, 6 November 2020
- |Title=12th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability497 bytes (60 words) - 14:11, 6 November 2020
- |Title=13th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability516 bytes (64 words) - 14:12, 6 November 2020
- |Title=10th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability491 bytes (60 words) - 14:07, 6 November 2020
- |Title=11th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability507 bytes (62 words) - 14:09, 6 November 2020
- | Title = First ACM Conference on Wireless Network Security | Field = Computer security and reliability2 KB (197 words) - 23:15, 14 October 2008
- - Information forensics and security - Sensor network2 KB (253 words) - 23:16, 14 October 2008
- Hyper Network Communication Network Security and Information Assurance4 KB (438 words) - 23:17, 14 October 2008
- ...industry, and government to present and discuss recent advances in sensor network research and applications. The conference covers both theoretical and exper Network health monitoring4 KB (570 words) - 23:17, 14 October 2008
- ...rch domains that increasingly play a key role in connecting systems across network centric environments to allow distributed computing and information sharing * OSS and security, security implication of OSS, security concerns in using OSS5 KB (697 words) - 23:18, 14 October 2008
- ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha The international conference on Advances in Social Network Analysis and Mining (ASONAM 2009) will primarily provide an interdisciplina3 KB (404 words) - 23:18, 14 October 2008
- o Privacy and security issues. o Impact of recommendation models on the evolution of the social network.5 KB (592 words) - 23:18, 14 October 2008
- intelligence, domain constraints and network intelligence in data blog mining, security mining, taxation mining, scientific data4 KB (510 words) - 23:19, 14 October 2008
- |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability4 KB (487 words) - 10:42, 21 August 2020
- | Title = Second ACM Conference on Wireless Network Security | Field = Computer security and reliability2 KB (291 words) - 23:19, 14 October 2008
- | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability5 KB (673 words) - 23:19, 14 October 2008
- | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability6 KB (697 words) - 23:19, 14 October 2008