Search results
Create the page "Computer Security" on this wiki! See also the search results found.
Page title matches
- |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security5 KB (667 words) - 14:27, 13 September 2009
- 55 bytes (5 words) - 05:20, 14 September 2009
- ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)2 KB (298 words) - 16:47, 5 July 2020
- |Acronym=JIP SI: Computer Security Technologies 2017 ...2017 : Journal of Information Processing, Special issue of âComputer Security Technologies against Sophisticated Cyber Attacksâ513 bytes (62 words) - 14:44, 6 November 2020
- |Acronym=COMNET SI SDN/NFV Security/Performance 2017 ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV4 KB (515 words) - 11:28, 6 November 2020
Page text matches
- ...puting has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the w ...ting with classic Web Services. Finally, features like Quality of Service, security and dependability need to be taken seriously into account, and this investi7 KB (957 words) - 15:15, 11 August 2008
- |Title=Annual Computer Security Applications Conference297 bytes (35 words) - 16:50, 16 February 2021
- ** Privacy, safety and security ** Privacy, safety, and security6 KB (777 words) - 22:54, 14 August 2008
- === Computer sciences=== ==== Computer communications (networks)====6 KB (714 words) - 12:19, 11 December 2020
- | title = Transactions on Information and System Security | Field = Computer security and reliability272 bytes (32 words) - 16:33, 18 August 2008
- |Field=computer science *Network Security5 KB (571 words) - 09:22, 19 July 2019
- |Title=1st International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability522 bytes (65 words) - 13:51, 6 November 2020
- |Title=2nd International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability535 bytes (66 words) - 14:23, 6 November 2020
- |Title=3rd International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability482 bytes (60 words) - 13:55, 6 November 2020
- |Title=4th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability470 bytes (56 words) - 13:57, 6 November 2020
- |Title=5th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability474 bytes (60 words) - 13:58, 6 November 2020
- | Title= Conference on Computer and Communications Security 1997 | Field = Computer security and reliability334 bytes (35 words) - 20:56, 4 October 2016
- |Field=Computer and Communications Security272 bytes (33 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security256 bytes (30 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security251 bytes (30 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security264 bytes (32 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security264 bytes (32 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security278 bytes (33 words) - 17:56, 4 October 2016
- |Title=International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability322 bytes (46 words) - 08:58, 13 February 2021
- | Title = Conference on Computer and Communications Security | Field = Computer security and reliability141 bytes (16 words) - 00:24, 22 August 2008
- * IEEE, IEEE Computer Society * Trust, security and privacy issues in pervasive systems12 KB (1,560 words) - 15:03, 27 August 2008
- |Field=Computer science ...ocus on the frontier topics in the theoretical and applied engineering and computer science subjects. The WCE conferences serve as good platforms for our membe3 KB (454 words) - 12:34, 8 October 2020
- This is the twelfth IEEE Computer Society symposium dealing with the inter-operability, security, trusted and dependable systems, fault5 KB (715 words) - 17:43, 11 September 2008
- - privacy and security Keith S. Decker, Dept. of Computer and Information Sciences,10 KB (1,371 words) - 16:14, 12 November 2020
- |Field=Computer networking * Security issues of data management in wireless networks5 KB (611 words) - 15:43, 16 September 2008
- ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are18 KB (2,408 words) - 02:37, 16 December 2008
- ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.) The DB 2009 Proceedings will be published by IEEE Computer Society Press and on-line via IEEE XPlore Digital Library. IEEE will index11 KB (1,446 words) - 18:26, 13 October 2008
- |Field=Computer science ** Testing, assuring and certifying F/OSS quality and security10 KB (1,349 words) - 16:42, 24 September 2008
- Software Security Human-Computer Interaction2 KB (293 words) - 10:35, 24 June 2011
- |Field=Computer networking ...May 26-29, 2009. The conference covers theory, design and application of computer networks and distributed computing systems. Aside from the regular presenta34 KB (4,565 words) - 22:20, 10 January 2018
- |Field=Computer networking ...March 25-28, 2008. The conference covers theory,design and application of computer networks and distributed computing systems. Aside from the regular presenta8 KB (1,037 words) - 22:20, 10 January 2018
- |Field=Computer networking ..., May 21-23, 2007. The conference covers theory, design and application of computer networks and distributed computing systems. Aside from the regular presenta9 KB (1,189 words) - 22:20, 10 January 2018
- |Field=Computer networking the TCDP of the IEEE Computer Society, the International Conference26 KB (3,456 words) - 22:20, 10 January 2018
- |Field=Computer networking ...- March 30, 2005. The conference covers theory, design and application of computer networks and distributed computing systems. Aside from the regular presenta10 KB (1,263 words) - 22:20, 10 January 2018
- |Field=Computer networking ...will include sessions on all aspects of theory, design and application of computer networks and distributed computing systems. Aside the regular presentation,12 KB (1,537 words) - 22:19, 10 January 2018
- |Field=Computer networking * Security and Privacy8 KB (1,040 words) - 22:20, 10 January 2018
- * General computer systems issues in operating systems, architecture, memory hierarchy, compil ...issues such as workload modeling, performance metrics, power consumption, security, usability, and experience with real systems and failures5 KB (777 words) - 05:50, 14 October 2008
- - Wireless security and dependability ...fp/servlet/event.showcfp?eventid=3852&copyownerid=2 WikiCFP][[Category:Computer networking]]4 KB (495 words) - 09:22, 22 August 2023
- ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusio9 KB (1,216 words) - 17:32, 14 October 2008
- | Field = Computer networking communication networks, computer networks, social networks, biological6 KB (722 words) - 17:32, 14 October 2008
- ...multimedia databases, digital and video libraries, compression and coding, security over the network. ...e, OCR and document analysis, mobile robots and visual navigation, network security, remote sensing and environment control, video surveillance and intelligent2 KB (268 words) - 17:47, 14 October 2008
- | Field = Computer networking o Security aspects in cross-layer designs3 KB (424 words) - 17:47, 14 October 2008
- ===Design, Human Computer Interaction=== * Security and privacy8 KB (989 words) - 20:13, 22 February 2009
- | Title = The seventh ACS/IEEE International Conference on Computer Systems and Applications | Field = Computer science4 KB (503 words) - 11:36, 18 October 2008
- | Field = Computer architecture ...vanced technologies and radically new solutions relevant to development of computer systems and aims to foster communication among scientists and engineers to4 KB (591 words) - 17:48, 14 October 2008
- | Field = Computer networking * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques3 KB (431 words) - 17:48, 14 October 2008
- | Field = Computer networking • Wireless network security and privacy6 KB (731 words) - 10:33, 14 August 2023
- | Field = Computer networking * Wireless privacy and security3 KB (456 words) - 18:10, 14 October 2008
- |Field=Computer networking * Security, privacy, and trustworthiness of mobile and wireless systems7 KB (974 words) - 12:28, 3 August 2023
- |Field=Informatics, Computer Science, COP * Computer Science Security.3 KB (317 words) - 18:42, 7 October 2011
- * Trust, reputation, security, and privacy in MBC ...sent the work. Papers should not exceed 15 pages in LNCS (Lecture Notes in Computer Science) format: http://www.springer.de/comp/lncs/authors.html5 KB (647 words) - 22:05, 14 October 2008
- ...d functionalities, provenance has only recently attracted the attention of computer scientists. Provenance poses many fundamental challenges, such as performan ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from3 KB (416 words) - 17:48, 14 October 2008
- ...nd panel sessions. The INTERNET 2009 Proceedings will be published by IEEE Computer Society and posted on Xplore IEEE system. A best paper award will be grante Internet security enforcement and validation11 KB (1,385 words) - 17:48, 14 October 2008
- | Title = IEEE International Conference on Intelligence and Security Informatics | Field = Computer security and reliability438 bytes (45 words) - 21:41, 16 October 2008
- * Computer-assisted legal drafting and document management ...legal norm-governed systems (e.g. e-commerce rules, organization rules and security regulations)7 KB (998 words) - 17:48, 14 October 2008
- | Title = The First International Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability7 KB (960 words) - 17:48, 14 October 2008
- | Field = Computer networking * Trust, security and privacy19 KB (2,503 words) - 13:25, 28 October 2020
- |Field=Computer science * Security and privacy in vehicular networks3 KB (378 words) - 14:22, 24 August 2016
- * Security, Privacy, Safety and Legal Issues Computer Science (LNCS, EI indexed). At least one author of each accepted7 KB (942 words) - 20:05, 14 October 2008
- | Title = The 3rd International Symposium on Security and Multimodality in Pervasive Environments | Field = Computer science3 KB (393 words) - 21:18, 14 October 2008
- | Field = Computer security and reliability3 KB (467 words) - 21:39, 16 October 2008
- - Security and privacy in SPSs - SPS exploiting emerging computer architectures (multi-core, cell)3 KB (490 words) - 20:05, 14 October 2008
- + Security and information assurance Biography: Dr. Divyakant Agrawal is a Professor of Computer7 KB (907 words) - 21:51, 14 October 2008
- | Field = Computer networking • Security, Survivability and Fault Tolerance2 KB (244 words) - 20:05, 14 October 2008
- | Field = Computer networking ...seeks papers describing significant research contributions to the field of computer and data communication networks. We invite submissions on various aspects o3 KB (353 words) - 20:31, 14 October 2008
- | Field = Computer networking * › Security Aspects of Mobile Software9 KB (1,219 words) - 20:05, 14 October 2008
- • Computer Vision • Ethical, Social, Privacy, Security and moral Issues in an e-societ5 KB (530 words) - 10:27, 24 June 2011
- Human-Computer Interface & Visualization Computer-aided Design/manufacturing3 KB (332 words) - 20:06, 14 October 2008
- |Field=Computer security and reliability ...(railways, airlines, road), life related (health, emergency response, and security), manufacturing (chips, computers, cars) or financial (credit cards, on-lin15 KB (2,175 words) - 21:03, 19 March 2013
- Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability USER INTERFACE and HUMAN COMPUTER INTERACTION3 KB (354 words) - 20:06, 14 October 2008
- - Data Security Issues - IS Security Issues6 KB (780 words) - 20:06, 14 October 2008
- The Faculty of computer and information science organizes this important conference.this conferenc * Computer Networks2 KB (193 words) - 20:06, 14 October 2008
- Computer Vision Intelligent Networks and Security3 KB (359 words) - 20:06, 14 October 2008
- | Field = Computer networking o Security and Privacy2 KB (303 words) - 20:06, 14 October 2008
- | Field = Computer networking ...mic experts to present and discuss communications quality, reliability and security issues as they relate to real world issues. The output from the workshops a4 KB (505 words) - 22:15, 14 October 2008
- | Field = Computer networking * Security6 KB (686 words) - 20:06, 14 October 2008
- Homeland Security Human-Computer Interaction6 KB (708 words) - 22:49, 14 October 2008
- | Title = The 11th European Conference on Computer Supported Co-operative Work | Field = Human-computer interaction2 KB (261 words) - 22:45, 14 October 2008
- | Field = Human-computer interaction * Security and privacy in pervasive healthcare6 KB (732 words) - 22:45, 14 October 2008
- | Field = Human-computer interaction the International Computer Sciences, and Social Informatics and Telecommunications Engineering (ICST)6 KB (674 words) - 22:45, 14 October 2008
- | Field = Human-computer interaction - Privacy and security issues6 KB (890 words) - 22:53, 14 October 2008
- | Field = Human-computer interaction ...ionals, educators and students of various HCI-related disciplines, such as Computer Science, Psychology, Ergonomics and Graphic Design, among others.3 KB (502 words) - 22:53, 14 October 2008
- | Title = 18th annual international conference on computer science and software engineering - Security and Privacy: cryptography; access control; security in9 KB (1,193 words) - 22:53, 14 October 2008
- | Field = Human-computer interaction computer science education) to present original research on software3 KB (355 words) - 22:53, 14 October 2008
- | Field = Human-computer interaction �?� Multi-resolution and other efficient computer graphics, visualization algorithms for cooperative visualization4 KB (468 words) - 22:54, 14 October 2008
- | Title = Human Computer Interaction 2008 | Field = Human-computer interaction3 KB (322 words) - 22:41, 4 February 2009
- 5. Human-Computer Interaction Database Security and Transaction Support9 KB (1,240 words) - 22:56, 14 October 2008
- ...08), this year's conference expands its scope to encompass all aspects of Computer Science focused game research, along with game-oriented education research, ...ame studies/game design, e) graphics and interfaces and f ) networking and security. Papers that fall outside these topic areas are strongly encouraged and sho9 KB (1,275 words) - 14:46, 27 December 2015
- ...bringing together researchers from the fields of modal logics, theoretical computer science and multi-agent systems as well as researchers who are interested i * security, privacy and trust issues in multi-agent systems5 KB (670 words) - 23:04, 14 October 2008
- | Title = European Conference on Intelligence and Security Informatics | Field = Computer security and reliability592 bytes (64 words) - 23:04, 14 October 2008
- ...ntelligence. Because of its ubiquity, logic has acquired a central role in Computer Science education. - Foundations of security5 KB (799 words) - 21:49, 26 February 2020
- ...nformation systems, natural language processing, soft computing, and human-computer interaction. ** Representing and reasoning about trust, privacy, and security6 KB (854 words) - 12:05, 28 May 2016
- Notes in Computer Science�?? (LNCS). share research results in Computer Science and Informatics as well as13 KB (1,775 words) - 23:04, 14 October 2008
- - Computer vision - AI and Human-computer interaction6 KB (827 words) - 23:04, 14 October 2008
- * Cryptography and Network Security * Voice-over-IP and Security2 KB (167 words) - 23:05, 14 October 2008
- | Acronym = Computer Journal 2008 the Computer Journal4 KB (536 words) - 17:55, 10 February 2021
- * models of concurrency, security, and mobility * type and category theory in computer science8 KB (1,085 words) - 18:01, 12 February 2009
- b. Security/accreditation c. Cyber Security16 KB (2,200 words) - 20:51, 18 February 2021
- | Title = 5th IFIP International Conference on Theoretical Computer Science 5th IFIP International Conference on Theoretical Computer Science5 KB (698 words) - 23:08, 14 October 2008
- data; security; semi-structured data; spatial data; temporal data; LaTeX2e style llncs for Lecture Notes in Computer Science, which is5 KB (660 words) - 14:52, 2 March 2012
- * Network and IT security issues in developing countries Abdelfettah Belghith, National School of Computer Sciences (ENSI), Tunisia;9 KB (1,127 words) - 17:19, 26 April 2011
- ...tes to attend sessions in any conference participating in the Australasian Computer Science Week. * Privacy and Security in Databases.2 KB (308 words) - 23:08, 14 October 2008
- primary and international forum for applied computer scientists, computer engineering, and other computer related professionals to gather, interact, present,7 KB (1,006 words) - 23:08, 14 October 2008
- non-functional system properties (e.g. availability, reliability, security, performance, by using the Springer Lecture Notes in Computer Science (LNCS) style7 KB (791 words) - 23:09, 14 October 2008
- Security, Personalization Department of Computer Science, University of California-Santa Cruz,3 KB (437 words) - 23:20, 14 October 2008
- ...will be included in a separate workshop proceedings published by the IEEE Computer Society Press. * Mining and link analysis in networked settings: web, social and computer networks, and online communities5 KB (634 words) - 15:36, 14 December 2008
- * Security techniques * Concurrent engineering and computer integrated manufacturing29 KB (4,077 words) - 18:04, 18 August 2023
- * Privacy and security issues ...ns of the conference. The conference proceedings will be published by IEEE Computer Society. The extended version of the best papers would also be invited for3 KB (452 words) - 23:09, 14 October 2008
- ...t/event.showcfp?eventid=2563&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]589 bytes (67 words) - 23:09, 14 October 2008
- - Human-Computer Interaction - Security and Access Control4 KB (595 words) - 23:09, 14 October 2008
- * mobile database security Institute of Computer Science IV, University of Bonn7 KB (875 words) - 23:09, 14 October 2008
- * Flexible techniques for security and intrusion detection in Information Systems and Databases ...ers, formatted following the formatting instructions available on the IEEE Computer Society web site; the LaTeX style files can be dowloaded here as well. Pape7 KB (917 words) - 23:09, 14 October 2008
- Information systems and database systems have always been a central topic of computer science. Additionally the * Data and Information Privacy and Security4 KB (457 words) - 16:14, 16 December 2020
- * Security, reliability and availability in distributed storage systems, .../servlet/event.showcfp?eventid=2250&copyownerid=598 WikiCFP][[Category:Computer networking]]5 KB (644 words) - 23:10, 14 October 2008
- - security and privacy All accepted papers, between 5 and 11 pages long, will be published by IEEE Computer Society.4 KB (539 words) - 23:10, 14 October 2008
- Sponsored by: Database Society, Chinese Computer Federation; Natural Science Foundation of China - Database security10 KB (1,376 words) - 23:10, 14 October 2008
- ...nce proceedings, as in previous years, by Springer in the Lecture Notes in Computer Science (LNCS) series. * Data security, privacy and trust4 KB (593 words) - 23:10, 14 October 2008
- · Security control in grid workflow systems ...Indexed). Selected papers will be invited to a special issue in Journal of Computer and System Sciences.7 KB (886 words) - 23:10, 14 October 2008
- * Data analysis for network traffic estimation and security ...fp/servlet/event.showcfp?eventid=1749&copyownerid=2 WikiCFP][[Category:Computer networking]]3 KB (332 words) - 23:10, 14 October 2008
- * Privacy and security in Auto ID systems ...fp/servlet/event.showcfp?eventid=1118&copyownerid=2 WikiCFP][[Category:Computer networking]]4 KB (471 words) - 23:10, 14 October 2008
- reliability, integrity, privacy, and security issues are still being policy. Furthermore, the complexity of security increases as7 KB (908 words) - 23:10, 14 October 2008
- ...WSES 07 will appear in the International Journal of Future Generations of Computer Systems (FGCS). Selected papers of WSES 06 have appeared in a special issue * Security control in managing workflow4 KB (560 words) - 23:10, 14 October 2008
- | Field = Computer networking and military operations. Such networking is essential for safety, security and economic vitality in5 KB (549 words) - 17:15, 5 July 2020
- | Field = Computer networking Security issues3 KB (364 words) - 23:11, 14 October 2008
- | Field = Computer networking * Network Security and Cooperation3 KB (339 words) - 23:11, 14 October 2008
- | Field = Computer networking Quality of service, authentication and security, multimedia protocols, web architectures and protocols, network measurement7 KB (981 words) - 03:18, 6 January 2009
- * Security and privacy ...fp/servlet/event.showcfp?eventid=3261&copyownerid=2 WikiCFP][[Category:Computer networking]]2 KB (243 words) - 23:11, 14 October 2008
- | Field = Computer networking 9. Information Security Technologies2 KB (200 words) - 23:11, 14 October 2008
- | Field = Computer networking * Network Security4 KB (465 words) - 23:11, 14 October 2008
- | Field = Computer networking * Network Security & Reliability4 KB (559 words) - 23:11, 14 October 2008
- |Field=Computer networking 11. Communication and Information Systems Security Symposium3 KB (431 words) - 09:18, 4 August 2023
- ...orks and sensor networks are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enab Network Security and Privacy7 KB (990 words) - 23:11, 14 October 2008
- | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability4 KB (587 words) - 23:30, 14 October 2008
- | Field = Computer networking - Computer and Communications Network Security3 KB (375 words) - 23:37, 14 October 2008
- | Field = Computer networking ...t bringing together researchers and scientists from several disciplines in computer science and engineering where bio-inspired methods are investigated.5 KB (694 words) - 23:11, 14 October 2008
- | Field = Computer networking + Security for CE Communications5 KB (584 words) - 09:43, 4 September 2023
- | Title = New Technologies, Mobility and Security | Field = Computer networking2 KB (209 words) - 23:12, 14 October 2008
- | Field = Computer networking 7. Security Signal Processing4 KB (496 words) - 23:12, 14 October 2008
- - Security and privacy of mobile/wireless systems Note: A special issue With Elsevier, Computer Networks is planned for4 KB (596 words) - 23:12, 14 October 2008
- Security/privacy in wireless systems ...fp/servlet/event.showcfp?eventid=2439&copyownerid=2 WikiCFP][[Category:Computer networking]]2 KB (244 words) - 23:12, 14 October 2008
- 1 .2 Computer Communication and Networks 5 .54 Network Security2 KB (250 words) - 23:12, 14 October 2008
- | Title = Fourth International Conference on Security and Privacy for Communication Networks | Field = Computer security and reliability615 bytes (67 words) - 23:12, 14 October 2008
- | Field = Computer networking o Security and privacy9 KB (1,117 words) - 23:12, 14 October 2008
- | Field = Computer networking * Security architectures and mechanisms3 KB (382 words) - 23:12, 14 October 2008
- | Field = Computer networking ...seeks papers describing significant research contributions to the field of computer and data communication networks. We invite submissions on network architect3 KB (352 words) - 23:12, 14 October 2008
- - Network Security - Trust, Security, and Privacy3 KB (465 words) - 23:13, 14 October 2008
- | Field = Computer networking ...rage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad Hoc, hybrids,5 KB (667 words) - 23:13, 14 October 2008
- | Field = Computer networking ...rch results and to exchange new ideas and practical experience in data and computer communications, optical fiber communications, microwaves, antennas and prop2 KB (260 words) - 23:13, 14 October 2008
- | Title = International Conference on Computer and Communication Engineering | Field = Computer networking2 KB (283 words) - 23:13, 14 October 2008
- | Field = Computer networking * Security3 KB (413 words) - 23:13, 14 October 2008
- | Field = Computer networking * Security and resilience of networked systems4 KB (528 words) - 23:13, 14 October 2008
- | Field = Computer networking application-level reliability & performance, security, QoS assurance,5 KB (651 words) - 23:13, 14 October 2008
- | Field = Computer networking - Wireless network security and privacy3 KB (343 words) - 10:31, 14 August 2023
- * Self-Protection, Security, and Trust ...references, using 10 fonts, and number each page. You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page:3 KB (415 words) - 23:13, 14 October 2008
- | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.4 KB (457 words) - 23:13, 14 October 2008
- | Homepage = conferences.computer.org/icws/2008 http://conferences.computer.org/icws/20088 KB (1,158 words) - 23:14, 14 October 2008
- | Title = The 2nd International Workshop on Web and Pervasive Security ...t/event.showcfp?eventid=1628&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]582 bytes (69 words) - 23:14, 14 October 2008
- | Field = Computer architecture ...ew ground or present insightful results based on practical experience with computer systems. The USENIX conference has a broad scope, and specific topics of in6 KB (869 words) - 23:14, 14 October 2008
- * Security of WiMAX in NGN .../servlet/event.showcfp?eventid=2244&copyownerid=590 WikiCFP][[Category:Computer networking]]1 KB (181 words) - 23:14, 14 October 2008
- * Security ...fp/servlet/event.showcfp?eventid=3273&copyownerid=2 WikiCFP][[Category:Computer networking]]3 KB (308 words) - 23:15, 14 October 2008
- | Field = Computer networking * Security, robustness, and fault-tolerance in networked environments8 KB (1,093 words) - 23:15, 14 October 2008
- |Field=Computer Science, Artificial Intelligence,Multi Agent Systems * Values in multi-agent systems, including privacy, safety, security and transparency6 KB (659 words) - 17:41, 11 February 2021
- ...phics, artificial intelligence, games, animation, multimedia design, human-computer interaction, educational media and software engineering. Even though high-t * QoS and Security Support for Entertainment8 KB (1,011 words) - 23:15, 14 October 2008
- | Field = Computer networking * Security and Robustness in P2P Information Search5 KB (554 words) - 23:15, 14 October 2008
- | Field = Computer networking distributed teams of humans, computer applications, and/or autonomous robots to achieve higher productivity and8 KB (1,093 words) - 23:15, 14 October 2008
- | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)5 KB (628 words) - 23:15, 14 October 2008
- | Field = Computer networking 1-07 Computer networks5 KB (623 words) - 23:15, 14 October 2008
- | Field = Computer networking ...ng difficult social and policy issues such as those related to privacy and security8 KB (1,003 words) - 23:15, 14 October 2008
- | Field = Computer networking NPSec 2008 particularly welcomes new ideas on security in the context of4 KB (493 words) - 23:15, 14 October 2008
- | Field = Computer networking * Giuseppe Persiano: Security of networks of low capability devices4 KB (563 words) - 23:15, 14 October 2008
- * Network Security .../servlet/event.showcfp?eventid=2391&copyownerid=548 WikiCFP][[Category:Computer networking]]5 KB (598 words) - 10:18, 29 May 2016
- | Field = Computer networking * Security, privacy and social issues of mobile and ubiquitous systems5 KB (599 words) - 23:15, 14 October 2008
- Multimedia security ...fp/servlet/event.showcfp?eventid=1731&copyownerid=2 WikiCFP][[Category:Computer networking]]3 KB (322 words) - 23:15, 14 October 2008
- |Title=6th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability509 bytes (65 words) - 14:00, 6 November 2020
- |Title=7th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability509 bytes (62 words) - 14:01, 6 November 2020
- |Title=9th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability496 bytes (63 words) - 14:05, 6 November 2020
- |Title=15th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability506 bytes (61 words) - 14:16, 6 November 2020
- |Title=8th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability475 bytes (60 words) - 14:03, 6 November 2020
- |Title=14th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability485 bytes (60 words) - 14:15, 6 November 2020
- |Title=12th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability497 bytes (60 words) - 14:11, 6 November 2020
- |Title=13th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability516 bytes (64 words) - 14:12, 6 November 2020
- |Title=10th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability491 bytes (60 words) - 14:07, 6 November 2020
- |Title=11th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability507 bytes (62 words) - 14:09, 6 November 2020
- | Title = First ACM Conference on Wireless Network Security | Field = Computer security and reliability2 KB (197 words) - 23:15, 14 October 2008
- | Field = Computer networking ...fp/servlet/event.showcfp?eventid=1201&copyownerid=2 WikiCFP][[Category:Computer networking]]625 bytes (69 words) - 23:15, 14 October 2008
- M. Computer Vision & VR N. Multimedia & Human-computer Interaction2 KB (226 words) - 23:17, 14 October 2008
- | Title = Fifth International Conference on Computer Vision, Image and Signal Processing | Field = Computer graphics4 KB (438 words) - 23:17, 14 October 2008
- |Title=The First International Workshop on the Critical Computer Based Systems The construction of dependable and complex computer-based systems demands the interaction and involvement of industry and acade5 KB (660 words) - 16:46, 27 December 2015
- ...d papers will be included in the conference proceedings and published IEEE Computer Society and referenced in IEEE explore and major indexes. The proceedings w * OSS and security, security implication of OSS, security concerns in using OSS5 KB (697 words) - 23:18, 14 October 2008
- |Homepage=conferences.computer.org/icebe/2008 (ICEBE 2008) http://conferences.computer.org/icebe/5 KB (594 words) - 16:29, 25 March 2020
- (e.g., QoS, security, fault tolerance, messaging, Please follow the IEEE Computer Society Press Proceedings Author4 KB (504 words) - 23:18, 14 October 2008
- # security technology and systems * Computer-Supported Cooperative Work6 KB (733 words) - 12:48, 27 October 2016
- | Title = The Second IEEE International Workshop on Security in Software Engineering | Field = Computer security and reliability5 KB (615 words) - 09:55, 29 May 2016
- Computer Huamn Interaction Computer Graphics and Multimedia3 KB (427 words) - 17:01, 29 May 2016
- ...from cognate areas such as formal methods, systems engineering, human and computer interaction, economics and management and social sciences are very welcome * quality goals (e.g., security),4 KB (503 words) - 23:18, 14 October 2008
- | Title = Symposium on Requirements Engineering for Information Security ...t/event.showcfp?eventid=1752&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]583 bytes (64 words) - 23:18, 14 October 2008
- ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha IEEE Computer Society3 KB (404 words) - 23:18, 14 October 2008
- ...ieval, data and text mining, statistics, computational intelligence, human-computer interaction and intelligent software agents. - Human-computer interaction aspects of personalization4 KB (570 words) - 23:19, 14 October 2008
- blog mining, security mining, taxation mining, scientific data IEEE Computer Society Press Proceedings Author Guidelines at4 KB (510 words) - 23:19, 14 October 2008
- ...ense. Debates over the need for privacy protection vs. service to national security and business interests were held in newspapers, magazines, research article It is clear that privacy is a domain dependent concept: homeland security, healthcare, business secrecy, entertainment, web 2.0, and ubiquitous compu5 KB (721 words) - 23:19, 14 October 2008
- ...e = Sixth International Conference on Cryptography, Coding and Information Security | Field = Computer security and reliability3 KB (448 words) - 23:19, 14 October 2008
- |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability4 KB (487 words) - 10:42, 21 August 2020
- | Title = Second ACM Conference on Wireless Network Security | Field = Computer security and reliability2 KB (291 words) - 23:19, 14 October 2008
- * Security and survivability [[Category:Computer security and reliability]]2 KB (322 words) - 00:35, 15 October 2008
- | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability5 KB (673 words) - 23:19, 14 October 2008
- | Title = Ubiquitous Computing Security Systems | Field = Computer security and reliability3 KB (328 words) - 06:40, 22 December 2012
- | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability6 KB (697 words) - 23:19, 14 October 2008
- | Field = Computer security and reliability631 bytes (73 words) - 17:05, 24 February 2016
- | Title = The First ACM Computer Security Architecture Workshop | Field = Computer security and reliability5 KB (619 words) - 23:19, 14 October 2008
- | Field = Computer security and reliability580 bytes (67 words) - 17:01, 27 December 2015
- | Field = Computer security and reliability570 bytes (64 words) - 23:19, 14 October 2008
- | Title = International Workshop on Security and Privacy in Enterprise Computing | Field = Computer security and reliability574 bytes (65 words) - 23:19, 14 October 2008
- | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability6 KB (736 words) - 23:20, 14 October 2008
- | Title = 3rd International Workshop on Security | Field = Computer security and reliability524 bytes (59 words) - 10:04, 29 May 2016
- | Title = Information Security South Africa (ISSA) Conference 2008 | Field = Computer security and reliability4 KB (465 words) - 23:20, 14 October 2008
- | Title = New Security Paradigms Workshop | Field = Computer security and reliability8 KB (1,072 words) - 23:20, 14 October 2008
- | Title = 13th European Symposium on Research in Computer Security | Field = Computer security and reliability556 bytes (64 words) - 23:20, 14 October 2008
- | Field = Computer security and reliability ...t/event.showcfp?eventid=2738&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]621 bytes (70 words) - 23:20, 14 October 2008
- | Title = International Symposium on Electronic Commerce and Security | Field = Computer science657 bytes (71 words) - 23:20, 14 October 2008
- | Title = The Sixth International Workshop on Security In Information Systems | Field = Computer security and reliability590 bytes (68 words) - 23:20, 14 October 2008
- | Title = The 11th Information Security Conference | Field = Computer security and reliability528 bytes (59 words) - 23:20, 14 October 2008
- | Title = 3rd IEEE International Workshop on Security, Trust, and Privacy for Software Applications | Homepage = conferences.computer.org/compsac/2008/workshops/STPSA2008.html656 bytes (73 words) - 23:20, 14 October 2008
- | Title = Special Session on Systems and Information Security | Field = Computer security and reliability541 bytes (61 words) - 23:20, 14 October 2008
- | Title = 2008 Workshop on Security and High Performance Computing Systems | Field = Computer security and reliability574 bytes (65 words) - 23:20, 14 October 2008
- services. The major emphasis of the workshop this year is security of wireless applications. What are the real security threats towards5 KB (663 words) - 23:20, 14 October 2008
- | Field = Computer security and reliability # Building security into products3 KB (337 words) - 23:20, 14 October 2008
- | Title = IEEE 21st Computer Security Foundations Symposium | Field = Computer science597 bytes (69 words) - 23:20, 14 October 2008
- | Title = Workshop in Information Security Theory and Practices 2008: Smart Devices, Convergence and Next Generation N | Field = Computer security and reliability606 bytes (68 words) - 23:20, 14 October 2008
- | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability4 KB (565 words) - 23:20, 14 October 2008
- | Title = 23rd International Information Security Conference | Field = Computer security and reliability5 KB (637 words) - 23:20, 14 October 2008
- | Title = IEEE International Conference on Intelligence and Security Informatics | Field = Computer security and reliability436 bytes (45 words) - 21:41, 16 October 2008
- | Field = Computer security and reliability554 bytes (65 words) - 23:20, 14 October 2008
- | Field = Computer security and reliability2 KB (276 words) - 23:20, 14 October 2008
- | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability2 KB (262 words) - 23:20, 14 October 2008
- |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability6 KB (689 words) - 10:39, 21 August 2020
- ...who need to become acquaintedwith new theories and technologies related to security and privacy challenges in collaborative environments. ...Worksharing, (CollaborateCom-2007), which is jointly sponsored by the IEEE Computer Society, Create-Net and the International Communication Sciences and Techno1 KB (185 words) - 23:20, 14 October 2008
- | Acronym = Security in RFID 2008 | Title = Security in RFID and its Industrial Applications617 bytes (71 words) - 23:20, 14 October 2008
- | Title = The 3rd International Symposium on Ubiquitous Application and Security Service | Field = Computer security and reliability574 bytes (65 words) - 23:20, 14 October 2008
- | Title = SPIE Defense and Security Symposium | Field = Computer security and reliability1 KB (167 words) - 23:20, 14 October 2008
- |Field=Computer and Communications Security278 bytes (33 words) - 17:56, 4 October 2016
- |Title=ACM SIGSAC Conference on Computer and Communications Security |Field=Computer and Communications Security538 bytes (66 words) - 10:02, 25 February 2021
- |Field=Computer and Communications Security279 bytes (33 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security270 bytes (33 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security276 bytes (33 words) - 17:58, 4 October 2016
- | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability4 KB (502 words) - 23:20, 14 October 2008
- IEEE societies (the Computer Society, the Signal Processing Society, the Circuits and - Multimedia security and content protection3 KB (425 words) - 23:20, 14 October 2008
- - Personalization, Privacy and Security in Mobile Computing - Security and Privacy of Mobile/Wireless Systems10 KB (1,262 words) - 23:20, 14 October 2008
- * Multimedia security including digital watermark and encryption ...d e-mail address. The Conference Proceedings will be published by the IEEE Computer Society Press. A number of the papers presented at the conference will be s5 KB (595 words) - 23:20, 14 October 2008
- ...ost comprehensive conference focused on the various aspects of advances in Computer Science. -Security issues on UMC4 KB (573 words) - 23:20, 14 October 2008
- ...cluding the Circuits and Systems Society, the Com-munications Society, the Computer Society, and the Signal Processing Society. The conference will feature wor *Multimedia security and content protection2 KB (296 words) - 23:20, 14 October 2008
- | Title = Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML08)6 KB (837 words) - 23:21, 14 October 2008
- · Forensic Studies and Security Issues [[Category:Computer graphics]]3 KB (364 words) - 23:21, 14 October 2008
- | Field = Computer security and reliability545 bytes (61 words) - 23:22, 14 October 2008
- | Field = Computer security and reliability612 bytes (70 words) - 23:22, 14 October 2008
- | Field = Computer security and reliability409 bytes (42 words) - 21:40, 16 October 2008
- * Functional Programming and Security [[Category:Computer science]]5 KB (636 words) - 23:22, 14 October 2008
- | Field = Computer science | Homepage = conferences.computer.org/scc/200818 KB (2,352 words) - 23:23, 14 October 2008
- | Field = Computer science This Conference is to bring together computer scientists, applied mathematicians, engineers in different disciplines and3 KB (357 words) - 23:23, 14 October 2008
- | Title = IEEE 8th International Conference on Computer and Information Technology | Field = Computer science3 KB (415 words) - 23:23, 14 October 2008
- |Title=23rd Annual IEEE Symposium on Logic in Computer Science ...ess calculi, programming language semantics, proof theory, reasoning about security, rewriting, specifications, type systems and type theory, and verification.2 KB (285 words) - 15:11, 7 November 2016
- | Field = Computer networking Information Security and Cryptography3 KB (412 words) - 19:34, 12 November 2020
- | Field = Computer graphics ...ring the past decade. They come in diverse forms: business support, public security, entertainment, welfare and many more. Video streaming, video conferencing,4 KB (567 words) - 23:24, 14 October 2008
- | Field = Computer graphics ...g in a wide range of areas, as diverse as medicine, robotics, defense, and security. As a rule, the processed data are discrete; therefore, the "discrete appro6 KB (814 words) - 23:25, 14 October 2008
- ..., computer vision, image analysis, signal processing, statistics, computer security, etc. The purpose of this conference is to provide a scientific forum for r * computer vision3 KB (325 words) - 23:50, 14 October 2008
- | Field = Computer graphics ...ntification techniques playing a key role in human-computer interfaces for security and restricted-access systems.4 KB (550 words) - 23:25, 14 October 2008
- ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design Security and protection systems11 KB (1,492 words) - 23:26, 14 October 2008
- | Field = Computer security and reliability Current computer technology trends present to the hardware and software designer novel oppor5 KB (598 words) - 01:12, 31 May 2012
- ...isciplinary conference for research that spans the boundaries of hardware, computer has captured some of the major computer systems innovations of the past two decades (e.g., RISC and VLIW3 KB (406 words) - 17:39, 30 September 2016
- * Security and Trust in Distributed Systems ...tion will be published in the Conference Proceedings published by the IEEE Computer Society.6 KB (761 words) - 03:28, 6 January 2009
- | Field = Computer architecture The IEEE Computer Society Technical Committee on Scalable Computing5 KB (577 words) - 23:27, 14 October 2008
- | Field = Computer architecture ...areas of innovative computing systems that extend the current frontiers of computer science and engineering and that will provide advanced systems for current3 KB (376 words) - 23:27, 14 October 2008
- | Title = The 35th Annual International Symposium on Computer Architecture | Field = Computer architecture2 KB (259 words) - 10:14, 29 May 2016
- | Field = Computer architecture ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors.4 KB (528 words) - 23:27, 14 October 2008
- | Field = Computer architecture The goal of this workshop is to bring together researchers, computer architects, and engineers working on a broad spectrum of topics pertaining4 KB (575 words) - 23:27, 14 October 2008
- | Title = 8th International Symposium on Computer Networks ISCN'08 is organized by The Department of Computer Engineering at Bogaziçi University, Istanbul, Turkey3 KB (413 words) - 23:28, 14 October 2008
- ...energy, Waste management, Waste treatment and recycling, Water network and security, Sensor technologies, Intelligent Micro-grids Signal Processing: Image processing, Computer vision, Bio-image processing, Audio/video processing, Data processing, Esti4 KB (561 words) - 23:29, 14 October 2008
- * Robots in security applications ...queries, please contact the program chair, Dr. Gal Kaminka, MAVERICK Group Computer Science Department, Bar Ilan University.3 KB (423 words) - 23:29, 14 October 2008
- |Field=Computer Science, Embedded systems, Embedded Network Sensor Systems, Sensor Systems Security and privacy6 KB (771 words) - 16:09, 16 September 2019
- 10) Networked embedded systems and security .../servlet/event.showcfp?eventid=2303&copyownerid=421 WikiCFP][[Category:Computer architecture]]11 KB (1,352 words) - 00:33, 15 October 2008
- o Language features to enhance reliability and security o Interaction between embedded computer architecture, operating5 KB (673 words) - 23:30, 14 October 2008
- service, security and dependability. Rich interfaces have been o security4 KB (537 words) - 23:30, 14 October 2008
- ...g, information systems, natural language processing, multimedia, and human-computer interaction. ...proceedings of ASWC 2008 will be published in Springer's Lecture Notes in Computer Science series. Paper submission and reviewing will be electronic via the c4 KB (573 words) - 23:31, 14 October 2008
- | Homepage = conferences.computer.org/compsac/2008/workshops/ESAS2008.html ...cooperation and goal seeking through sharing policy and ontology, safety & security in systems, other QoS issues, and so on.10 KB (1,391 words) - 23:31, 14 October 2008
- Security in distributed systems Autonomic access control and security issues5 KB (702 words) - 23:31, 14 October 2008
- - Ontologies and computer supported collaborative work - Ontologies and security4 KB (523 words) - 23:31, 14 October 2008
- Sponsored by IEEE Computer Society Technical Committee on Services Computing (http://tab.computer.org/tcsc)6 KB (750 words) - 23:31, 14 October 2008
- This is the eleventh IEEE Computer Society symposium dealing with the rapidly expanding field of object/compon ...ms, protocols, peer-to-peer computing, sensor networks, inter-operability, security, trusted and dependable systems, fault tolerance, virtual subnets for ORC.3 KB (377 words) - 23:31, 14 October 2008
- ...semantics, program verification, static analysis, testing, language-based security. ...The proceedings will be published in the Springer-Verlag Lecture Notes in Computer Science series. Final papers will be in the format specified by Springer-Ve6 KB (824 words) - 23:32, 14 October 2008
- Sponsored by IEEE Computer Society TC-uARCH and ACM SIGMICRO in cooperation with ACM SIGPLAN ...he conference covers optimization for parallelism, performance, power, and security, where that optimization occurs in the mapping from an input (including API3 KB (342 words) - 23:32, 14 October 2008
- |Title=35th Annual ACM/IEEE Symposium on Logic in Computer Science |Field=Theoretical Computer Science5 KB (656 words) - 11:29, 27 August 2020
- |Title=International Conference on Computer Aided Verification * Formal models and methods for security2 KB (291 words) - 11:09, 20 November 2020
- |Title=26th International Symposium on High-Performance Computer Architecture ...d. Authors are invited to submit papers on all aspects of high-performance computer architecture.3 KB (327 words) - 13:11, 11 May 2020
- | Field = Computer architecture �?� Optimization techniques for security and reliability2 KB (201 words) - 23:32, 14 October 2008
- ...more. Application disciplines covered include advanced telecommunication; computer systems; military, government & aerospace; environment, energy, and other i * Symposium on Simulation of Systems Security (SSSS)6 KB (735 words) - 23:32, 14 October 2008
- ...ternet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation. Computer and Control Systems (Chairs: Farhat Fnaiech, Tunisia; Sandrine Moreau, Fran4 KB (504 words) - 23:33, 14 October 2008
- | Field = Computer science SLAECE 2009 Proceedings will be published by IEEE Computer Society Press and on-line via IEEE XPlore Digital Library together with ICI8 KB (1,075 words) - 23:52, 14 October 2008
- ...izations ?e-culture ?e-Science ?e-Business ?e-Learning ?e-Government ?Grid Security ?Sensor networks and Grid applications ...wing SCI-indexed international journals after extension: Future Generation Computer System (FGCS), Concurrency and Computation: Practice and Experience (CCPE),3 KB (367 words) - 23:35, 14 October 2008
- |Title=Current Trends in Theory and Practice of Computer Science Current Trends in Theory and Practice of Computer Science6 KB (682 words) - 10:18, 14 April 2020
- | Title = Ninth International Conference on Deontic Logic in Computer Science ...these general themes, DEON2008 will encourage a special focus on the topic Security and Trust.5 KB (587 words) - 23:37, 14 October 2008
- fields in computer communications and distributed systems such as sensor - Security4 KB (483 words) - 23:37, 14 October 2008
- | Title = IEEE 28th Conference on Computer Communications | Field = Computer networking3 KB (380 words) - 19:34, 17 November 2008
- | Field = Computer networking Recent advances in electronic and computer technologies have paved the way for the proliferation of ubiquitous computi3 KB (386 words) - 23:39, 14 October 2008
- Human-computer interface Security & biometrics3 KB (360 words) - 23:39, 14 October 2008
- * Microarchitecture support for reliability, dependability, and security .../servlet/event.showcfp?eventid=2838&copyownerid=619 WikiCFP][[Category:Computer architecture]]3 KB (326 words) - 17:43, 8 November 2008
- ...the HotOS tradition, participants will present and discuss new ideas about computer systems research and how technological advances and new applications are sh ...perating systems, storage, networking, languages and language engineering, security, dependability, and manageability. We are also interested in contributions6 KB (781 words) - 23:39, 14 October 2008
- engineering domain on advanced (parallel) computer architectures. In # Security challenges and solutions for interoperability/interoperation of7 KB (959 words) - 23:40, 14 October 2008
- brings together researchers in computer science and * Computer Assisted Surgery7 KB (876 words) - 23:40, 14 October 2008
- | Field = Computer security and reliability * Integrated system reliability, availability, security, safety, and timing analysis and evaluation methods6 KB (748 words) - 14:43, 27 December 2015
- | Field = Computer security and reliability414 bytes (43 words) - 21:46, 16 October 2008
- | Field = Computer security and reliability554 bytes (63 words) - 23:40, 14 October 2008
- | Field = Computer security and reliability572 bytes (66 words) - 23:40, 14 October 2008
- | Field = Computer security and reliability453 bytes (48 words) - 15:33, 17 October 2008
- * Security in e-Learning o Human Computer Interaction (HCI)2 KB (324 words) - 23:41, 14 October 2008
- | Title = Fourth International Workshop on the Value of Security through Collaboration ...ties of the ecosystem where the nodes operate may be guaranteed. Thus, the security property of the ecosystem may be driven by self-organizing mechanisms. Depe3 KB (420 words) - 23:42, 14 October 2008
- ward data management. The use of a mobile wireless infrastructure can lead to security and reliability problems. Mobile devices often have usability This theme involves the application of computer science theories of dependability to provide guarantees for required qualit6 KB (771 words) - 23:42, 14 October 2008
- ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network - Multimedia content recognition, indexing, search - Human Computer Interaction2 KB (303 words) - 23:42, 14 October 2008
- and related fields, computer scientists, students and IT professionals. - Privacy, security and trust6 KB (763 words) - 23:42, 14 October 2008
- | Title = 32nd Annual IEEE International Computer Software and Applications Conference | Homepage = conferences.computer.org/compsac/20082 KB (249 words) - 23:44, 14 October 2008
- |Field=Computer and Communications Security275 bytes (33 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security273 bytes (33 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security254 bytes (31 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security256 bytes (31 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security273 bytes (33 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security258 bytes (32 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security277 bytes (33 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security274 bytes (33 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security258 bytes (32 words) - 17:56, 4 October 2016
- |Field=Computer and Communications Security262 bytes (31 words) - 17:57, 4 October 2016
- I research solutions to problems in computer security, currently in the employ of IBM T.J. Watson Research Center.234 bytes (40 words) - 00:10, 17 October 2008
- |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols13 KB (1,617 words) - 19:03, 24 November 2008
- |Field=Computer networking **Publisher: IEEE Computer Society Press5 KB (670 words) - 15:15, 16 February 2009
- |Field=Computer networking ** Publisher: IEEE Computer Society Press7 KB (883 words) - 17:35, 7 January 2021
- ...of this forum is to promote new research and applications in the filed of Computer science and Engineering and interdisciplinary fields. ...Networks, HCI, Agents, Data Semantics, Medical, Healthcare, Entertainment, Security.3 KB (440 words) - 12:20, 12 December 2008
- |Field=Computer Engineering |Type=Computer dependability, Critical Infrastructure Security1 KB (186 words) - 17:22, 5 February 2009
- ...cience at New Mexico Tech includes courses in both theoretical and applied computer science. These courses cover current concepts and major applications of the ...broaden their knowledge in major computer science areas. Graduates of the computer science bachelor's program will be well prepared for industry employment or2 KB (331 words) - 05:33, 5 January 2009
- |Homepage=conferences.computer.org/compsac/2009/workshops/RTSOAA2009.html * http://conferences.computer.org/compsac/2009/workshops/RTSOAA2009.html7 KB (922 words) - 00:58, 9 January 2009
- |Title=4th International Conference on Interactive Mobile and Computer Aided Learning |Field=Computer-supported learning11 KB (1,366 words) - 16:44, 14 January 2009
- ...WANN is included in the ranking of the best conferences established by the Computer Science Conference Ranking based on the "Estimated Impact of Conference (EI - Computer GRID6 KB (812 words) - 12:55, 18 January 2009
- Security, Trust, Privacy, and other Socio-technical Issues in Pervasive Computing ICPCA2009 extends its interests in pervasive computer with special tracks on collaborative work, health care, e-learning, etc. In4 KB (597 words) - 13:46, 23 January 2009
- | Field = Computer networking ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance.5 KB (526 words) - 01:02, 2 February 2009
- | Field = Computer networking Fast Track on Computer Communications Journal5 KB (650 words) - 13:43, 23 January 2009
- | Title = 3rd International Conference on Network and System Security | Field = Computer networking12 KB (1,669 words) - 12:58, 18 January 2009
- | Field = Computer networking o Security5 KB (567 words) - 12:58, 18 January 2009
- Trust, Privacy & Security in Digital Business (TrustBus'09) Security patterns have arrived to a stage where there are a significant6 KB (740 words) - 12:58, 18 January 2009
- The natural focus of the conference is on computer science issues, but * Security, Privacy, Encryption, and Digital Rights, including9 KB (1,221 words) - 12:58, 18 January 2009
- | Field = Computer science part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009)5 KB (633 words) - 12:58, 18 January 2009
- | Title = 2nd ACM International Conference on Security of Information and Networks | Field = Computer networking16 KB (2,178 words) - 12:59, 18 January 2009
- - Safety and security for mobile MAS deployment Notes in Computer Science series by Springer-Verlag.8 KB (977 words) - 12:59, 18 January 2009
- ...o raises a host of ethical issues, such as those pertaining to information security, privacy, data mining, and intellectual property. Therefore, as e-business ...nd management, information technology, philosophy, communication sciences, computer science, and consumer studies. In providing a broad overview of the various6 KB (856 words) - 13:00, 18 January 2009
- with Special Issue of Journal of Computer and System Sciences (http://www.elsevier.com/locate/jcss), Elsevier (http:/ ...e workshop will be invited for submission to a special issue of Journal on Computer and System Sciences (http://www.elsevier.com/locate/jcss), Elsevier (http:/7 KB (1,030 words) - 13:00, 18 January 2009
- part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...mpetencies, human and psychological aspects, feelings are all of interest. Computer Science and IT related disciplines work more and more together with various6 KB (860 words) - 13:00, 18 January 2009
- Security and Access Control Information Content Security4 KB (529 words) - 13:00, 18 January 2009
- - Data warehouse privacy, security, and reliability - Security, privacy and social impact of data mining7 KB (1,006 words) - 13:00, 18 January 2009
- brings together researchers from all areas of computer science that - time-dependent security policies6 KB (872 words) - 13:00, 18 January 2009
- | Title = The 1st International Workshop on Security, Reliability and Quality in Cloud Computing computing brings on security, reliability and quality? In other words, what new issues raised5 KB (624 words) - 13:00, 18 January 2009
- Many aspects contribute to the functioning of e-transactions systems such as security aspects (authentication, confidentiality, ..), architecture (such as Cap, 3 Trust, privacy and security issues in e-commerce6 KB (772 words) - 13:00, 18 January 2009
- | Title = The 11th ACM workshop on Multimedia and Security The 11th ACM workshop on Multimedia and Security will be held in Princeton, New Jersey, USA on September 7th and 8th of 20093 KB (303 words) - 17:06, 24 February 2016
- ...es such as as Services Computing, which has been formally promoted by IEEE Computer Society since 2003. From a technology perspective, Services Computing has b * Security Systems & Services9 KB (1,183 words) - 13:41, 23 January 2009
- components of computer tools (i.e. algorithms, architectures and languages). - AI in Computer Security4 KB (582 words) - 14:47, 2 December 2010
- | Field = Computer networking o Security in Power Line Communications14 KB (1,518 words) - 13:01, 18 January 2009
- Security in wireless networks ...servlet/event.showcfp?eventid=4391&copyownerid=2799 WikiCFP][[Category:Computer networking]]3 KB (320 words) - 16:40, 27 December 2015
- | Field = Computer networking on networking (wired and wireless), high-performance computer architecture,10 KB (1,206 words) - 13:01, 18 January 2009
- part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...of their papers to selected journals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from4 KB (564 words) - 13:01, 18 January 2009
- part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...of their papers to selected journals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from4 KB (588 words) - 13:01, 18 January 2009
- - Computer and Network Architecture - Computer Graphics10 KB (1,321 words) - 13:01, 18 January 2009
- • Decision Support Systems and Computer Aided Diagnosis • Security, Ethics and Privacy4 KB (528 words) - 13:01, 18 January 2009
- |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments |Field=Computer networking6 KB (793 words) - 15:12, 1 October 2020
- | Field = Computer networking * Privacy, security, ethics, culture, and anonymity issues6 KB (767 words) - 13:01, 18 January 2009
- previous years, by Springer in the Lecture Notes in Computer Science papers in a special BNCOD section of The Computer Journal4 KB (568 words) - 13:01, 18 January 2009
- - Safety and security for mobile MAS deployment Notes in Computer Science series by Springer-Verlag.7 KB (917 words) - 13:02, 18 January 2009
- ...hysical or social sciences alone. These systems also transcend traditional computer-controlled - Security, privacy, trust and safety of cyber physical & social computing3 KB (446 words) - 13:02, 18 January 2009
- | Title = Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use | Field = Computer security and reliability11 KB (1,539 words) - 13:02, 18 January 2009
- * Security and privacy All accepted papers, between 5 and 11 pages long, will be published by IEEE Computer Society.4 KB (532 words) - 15:04, 27 December 2015
- | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)6 KB (852 words) - 13:02, 18 January 2009
- Security in Knowledge-based Multimedia Systems Knowledge-based Human-Computer Interaction6 KB (693 words) - 13:03, 18 January 2009
- | Field = Computer networking ...ssues can expose the network infrastructure to stability, performance, and security problems.5 KB (431 words) - 13:03, 18 January 2009
- Security, privacy and trust published in the conference proceedings (by the IEEE Computer Society4 KB (599 words) - 13:27, 28 January 2009
- ...ps and conferences as part of the 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing. - Speech and language processing/advanced computer vision7 KB (976 words) - 23:35, 28 January 2009
- |Title=European Symposium On Research In Computer Security599 bytes (75 words) - 10:59, 11 March 2020
- ...Service composition, Functional and Non Functional Requirements (NFR: QoS, security), and management and diagnosis, who investigate concepts, methods, techniq * NFR (quality, security, robustness, adaptability) management in choreographed and/or7 KB (960 words) - 16:33, 27 February 2009
- ...ages will be charged. The Conference Proceedings will be published by IEEE Computer Society. Most papers in the past proceedings have been indexed by EI. All a B-09 Web-page Security Monitoring4 KB (459 words) - 16:33, 27 February 2009
- Technical-sponsored by IEEE and IEEE Computer Society Information Security4 KB (512 words) - 16:33, 27 February 2009
- * security in distributed computing, cryptographic protocols [[Category:Computer networking]]7 KB (890 words) - 15:05, 27 December 2015
- ...temas, Wireless communications, Technologies and applications, Information security o Computer vision8 KB (977 words) - 16:33, 27 February 2009
- ...s in Internet connection speeds, modular web applications, and advances in computer graphics will play the key role in the evolution of the World Wide Web. - Web Security4 KB (630 words) - 16:33, 27 February 2009
- FACS 2009 will be published in Science of Computer Programming. Process Architectures), FAST (Formal Aspects in Security and Trust),8 KB (1,079 words) - 17:05, 27 February 2009
- 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.7 KB (897 words) - 17:05, 27 February 2009
- The proceedings will be published in the Lecture Notes in Computer for publication in a Special Issue of Science of Computer7 KB (1,094 words) - 11:42, 29 September 2016
- * Security and trustworthy in multi-tenancy service hosting environment ....5 x 11 inch pages, as per IEEE 8.5 x 11 manuscript guidelines (http://www.computer.org/cspress/instruct.htm). You can download the paper template in word form6 KB (855 words) - 17:06, 27 February 2009
- | Field = Computer networking • Network security5 KB (654 words) - 17:06, 27 February 2009
- ...s an interdisciplinary scope, encompassing research from computer science, computer engineering and telecommunication/communication engineering with focus on h - Security issues and technologies5 KB (646 words) - 17:06, 27 February 2009
- ...ear in conference proceedings published by the Springer's Lecture Notes in Computer Science (LNCS) and the IEEE, respectively. (All accepted papers at WISM’0 Information Security5 KB (604 words) - 17:06, 27 February 2009
- ...ponsored by IEEE Technical Committee on Scalable Computing (TCSC) and IEEE Computer Society. · Computer networks8 KB (1,050 words) - 18:04, 5 January 2017
- | Homepage = conferences.computer.org/compsac/2009/workshops/ME2009.html The 33rd Annual IEEE International Computer Software and Applicaiton Conference6 KB (800 words) - 22:11, 27 February 2009
- | Title = The 29th IEEE Conference on Computer Communications | Field = Computer networking4 KB (559 words) - 17:06, 27 February 2009
- * Security and privacy in P2P systems the IEEE Computer Society digital library. A CD containing full papers will be5 KB (623 words) - 17:06, 27 February 2009
- | Field = Computer networking VoIP, NGN and IMS Security4 KB (621 words) - 17:06, 27 February 2009
- | Title = 6th Swedish National Computer Networking Workshop (SNCNW 2009) 6th Swedish National Computer Networking Workshop (SNCNW 2009)3 KB (456 words) - 17:06, 27 February 2009
- ...ed papers will be published by Springer as proceedings in Lecture Notes in Computer Science (LNCS) . The space limit for full papers is 18 pages LNCS style. De * Security and Integrity4 KB (534 words) - 17:07, 27 February 2009
- | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability8 KB (967 words) - 17:07, 27 February 2009
- | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability4 KB (506 words) - 17:07, 27 February 2009
- | Title = Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) | Field = Computer security and reliability4 KB (600 words) - 17:07, 27 February 2009
- | Title = 5th IEEE International Workshop on Wireless and Sensor Networks Security Wireless and Sensor Networks Security (WSNS'09)4 KB (485 words) - 17:07, 27 February 2009
- * Cryptography, Security and trust ...hardcopy proceedings, which are planned to appear in the Lecture Notes in Computer Science (LNCS) Series of Springer Verlag after August 20096 KB (750 words) - 16:50, 27 December 2015
- SBBD is the official database event of the Brazilian Computer Society (SBC). It has been the largest venue in Latin America for presentat * Authorization, Privacy and Security9 KB (1,249 words) - 08:42, 7 October 2011
- Computer System, Information Security and Networks • Security and Privacy in E-Commerce3 KB (319 words) - 17:07, 27 February 2009
- This session covers: Computer Assisted Learning and Simulation Trainers, Customizing of ERP Systems using ...and distributed systems; High-speed networks; Network simulation software; Computer and telecommunication systems; Telecommunication devices and systems; Intel38 KB (4,832 words) - 17:07, 27 February 2009
- IEEE Computer Society Task Force on Information Assurance by the special interest group Security - Intrusion Detection and8 KB (1,020 words) - 17:07, 27 February 2009
- | Field = Computer networking It has evolved from a small number of interconnected computer networks to a11 KB (1,440 words) - 17:08, 27 February 2009
- | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability12 KB (1,690 words) - 17:08, 27 February 2009
- | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability3 KB (480 words) - 17:08, 27 February 2009
- | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability6 KB (828 words) - 17:08, 27 February 2009
- the IEEE Computer Society and the Technical Committee on Computer Architecture4 KB (589 words) - 17:08, 27 February 2009
- * Information assurance and security Springer-Verlag volume in the Lecture Notes in Computer Science Series.8 KB (1,144 words) - 20:59, 27 February 2009
- |Title=IEEE Computer Security Foundations Symposium (was CSFW) |Homepage=https://www.ieee-security.org/TC/CSF2020/223 bytes (28 words) - 17:08, 27 February 2020
- |Title=IEEE Symposium on Security and Privacy |Homepage=https://www.ieee-security.org/TC/SP2018/586 bytes (78 words) - 14:41, 6 November 2020
- |Title=IEEE Symposium on Security and Privacy |Homepage=http://www.ieee-security.org/TC/SP2019/index.html519 bytes (70 words) - 14:37, 6 November 2020
- * Computer games and gamification * Project, risk and security management4 KB (571 words) - 12:58, 9 March 2020
- |Title=European Symposium on Research in Computer Security626 bytes (80 words) - 11:06, 11 March 2020
- |Title=23rd European Symposium on Research in Computer Security,629 bytes (73 words) - 11:16, 11 March 2020
- |Title=35th Annual Computer Security Applications Conference (ACSAC) |Has coordinator=Applied Computer Security Associates676 bytes (83 words) - 15:29, 7 January 2021
- |Title=34th Annual Computer Security Applications Conference (ACSAC) |Has coordinator=Applied Computer Security Associates540 bytes (63 words) - 15:30, 7 January 2021
- |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security5 KB (578 words) - 10:21, 20 November 2020
- |Title=International Conference on Computer Supported Education |Field=Computer science education5 KB (661 words) - 15:49, 8 December 2009
- |Title=5th European Conference on Computer Network Defence |Field=Computer security and reliability4 KB (530 words) - 15:02, 27 December 2015
- |Title=International Workshop on Wireless Multimedia Computing and Security Services - Security, privacy, and cryptographic protocols for WMC3 KB (477 words) - 16:54, 8 August 2009
- ...ST 2009 papers will be in the ADAPTIVE 2009 Proceedings, published by IEEE Computer Society Press, and posted on-line via IEEE XPlore Digital Library. IEEE wil ...tion Retrieval, HCI) interested in topics like trust, provenance, privacy, security, reputation and spam, in order to address current challenges of their adapt5 KB (642 words) - 20:34, 9 June 2009
- -Trust and security issues in P2P systems -Security and cheat-prevention mechanisms for P2P games5 KB (738 words) - 16:48, 10 August 2009
- | Title = The 2nd International Conference on Computer Modeling and Simulation (ICCMS 2010) ...lation. ICCMS 2010 will bring together leading engineers and scientists in Computer Modeling and Simulation from around the world. Topics of interest for submi4 KB (435 words) - 11:32, 2 August 2009
- | Title = The 2nd International Conference on Computer and Electrical Engineering (ICCEE 2009) | Field = Computer science3 KB (412 words) - 19:29, 2 August 2009
- | Title = International journal of Network Security & Its Applications (IJNSA) International journal of Network Security & Its Applications (IJNSA)3 KB (339 words) - 11:32, 2 August 2009
- Network Security [[Category:Computer networking]]2 KB (230 words) - 11:32, 2 August 2009
- * Design aspects for robust design, human factors, safety, security and usability Computer (CS) § Communications (ComSoc)6 KB (706 words) - 11:33, 2 August 2009
- ...(SAC) has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the w ...ware reuse, dynamic software adaptation, efficiency on multicore hardware, security, and safety.5 KB (743 words) - 17:02, 27 December 2015
- * Human-Computer Interaction including GIS Interfaces ...l track organised by the University of Washington Conference on Safety and Security Education & Research (SASER):4 KB (528 words) - 11:33, 2 August 2009
- | Field = Computer networking ...y,ISSN 2072-1471 (Print) is Published in 4 issues per year by Internatonal Computer Science Publisher.2 KB (258 words) - 11:33, 2 August 2009
- Ambient Systems Security and Privacy ...r the conference will be published in the proceedings of Communications in Computer and Information Science series, Springer. Selected papers will be invited f6 KB (751 words) - 16:59, 27 December 2015
- - Personalization, security and privacy www.computer.org/portal/pages/intelligent/mc/author.html).4 KB (525 words) - 11:34, 2 August 2009
- †Principal; Professor, Department of Computer Science & Engineering, *Assistant Professor, Department of Inf Web Security and Privacy4 KB (564 words) - 12:01, 6 November 2020
- * Trust Integration and Security in Grid and P2P Systems ...references, using 10 fonts, and number each page. You can confirm the IEEE Computer Society Proceedings Author Guidelines at one of the following web pages:7 KB (912 words) - 17:36, 5 November 2020
- |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY |Field=Computer science5 KB (599 words) - 10:21, 20 November 2020
- * Network self-healing, security and self-defence to 2 columns, 10pt fonts, using the IEEE Computer Society 8.5" x 11" authors4 KB (479 words) - 11:35, 2 August 2009
- | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)6 KB (746 words) - 11:35, 2 August 2009
- ...ned, dynamic and distributed nature of the sensory systems involved, their security weaknesses, and so on. Novel mechanisms and designs are required which inte - Trust, security, privacy, and data provenance issues in QoI and QoS5 KB (734 words) - 11:35, 2 August 2009
- published by the IEEE Computer Society Press. One author from each accepted 8.5x11 inch two-column format (http://www2.computer.org/portal/web/cscps).8 KB (1,112 words) - 11:35, 2 August 2009
- * Security issues and solutions for mobile multimedia retrieval. ...pear in the conference proceedings to be published by ACM and the Austrian Computer Society (OCG) books@ocg.at series.5 KB (674 words) - 11:35, 2 August 2009
- |Field=computer networking - Security8 KB (1,119 words) - 09:57, 27 February 2020
- ? Security and privacy ? Wireless & Mobile network Security5 KB (571 words) - 11:35, 2 August 2009
- | Field = Computer networking ...onse time, resource consumption, throughput, availability, reliability and security.9 KB (1,206 words) - 11:40, 2 August 2009
- ...guistics (LTC 2009), a meeting organized by the Faculty of Mathematics and Computer Science of Adam Mickiewicz University, Poznań, Poland in cooperation with ...of our everyday technological environment. Since the very beginning of the Computer and Information Age these fields have influenced and stimulated each other14 KB (1,872 words) - 19:26, 2 August 2009
- | Field = Computer networking ...ons and Technologies - Applications, Protocols, Algorithms, Simulators and Security3 KB (339 words) - 11:36, 2 August 2009
- |Field=Computer networking Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )14 KB (1,651 words) - 15:56, 15 February 2017
- 5. Human-Computer Interaction * Database Security and Transaction Support5 KB (552 words) - 17:06, 12 August 2009
- |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability6 KB (766 words) - 10:54, 26 April 2010
- |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security5 KB (667 words) - 14:27, 13 September 2009
- QSIC 2010 will include the main conference and co-located workshops. IEEE Computer Society Press will publish the conference proceedings consisting of careful ...benchmarking, review, inspection and walkthrough, reliability, safety and security4 KB (583 words) - 12:17, 25 November 2009
- |Field=Computer and society - Human Computer Interaction4 KB (507 words) - 22:37, 18 November 2009
- a platform for researchers and practitioners from computer * Agent-enabled human-computer interaction and interface design4 KB (449 words) - 11:04, 26 November 2009
- * Application security * Blended Internet security methods5 KB (607 words) - 18:01, 3 December 2009
- |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust4 KB (484 words) - 14:20, 14 December 2009
- |Title=7th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS |Field=Computer security and reliability7 KB (982 words) - 19:13, 3 January 2010
- ...ometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications in the above themes. Computer and network security3 KB (382 words) - 18:27, 20 January 2010
- |Title=3rd International Conference on Security of Information and Networks |Field=Computer security10 KB (1,270 words) - 17:12, 20 April 2010
- Sponsored by ICST (Institute for Computer Sciences, Social-Informatics ...ale computing and networking, optimization, pervasive computing, robotics, security, software engineering, and systems engineering.3 KB (338 words) - 16:53, 27 December 2015
- |Title=International Conference on Security and Cryptography |Field=Computer security and reliability4 KB (409 words) - 15:40, 5 February 2010
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (429 words) - 08:55, 1 August 2019
- |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability9 KB (1,092 words) - 09:35, 1 August 2019
- ...well as Data Mining, Multi-agent Systems, Information Retrieval and Human Computer Interaction. Topics of interest include, but are not limited to: * Web Security, Integrity, Privacy and Trust6 KB (765 words) - 14:01, 11 April 2010
- ...ng, Multi-agent Systems, Information Retrieval, Machine learning and Human Computer Interaction. * Web Security, Integrity, Privacy and Trust in processing web-logs4 KB (600 words) - 19:11, 18 February 2010
- |Title=Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments |Field=Computer security and reliability3 KB (498 words) - 02:52, 22 December 2012
- |Field=Computer communications http://conferences.computer.org/WiMob2010/5 KB (624 words) - 21:14, 4 March 2010
- |Field=Computer science ...ocus on the frontier topics in the theoretical and applied engineering and computer science subjects. The WCE conferences serve as good platforms for our membe4 KB (559 words) - 08:31, 9 March 2010
- |Field=Computer science education |Superevent=2010 secau Security Congress2 KB (215 words) - 06:52, 13 April 2010
- |Title=3rd Australian Security and Intelligence Conference |Field=Computer security and reliability2 KB (181 words) - 07:03, 13 April 2010
- |Field=Computer security and reliability |Superevent=2010 secau Security Congress2 KB (200 words) - 16:55, 27 December 2015
- |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy4 KB (490 words) - 14:42, 6 November 2020
- - Security of Communication Networks ...ttp://www.cloudbus.org/cdn/idcs10. Each submitted paper should follow IEEE Computer Society 8.5x11-inch Conference Proceedings format (Available in the worksh5 KB (667 words) - 12:08, 19 May 2010
- |Title=Workshop on Aspects of Human-Computer Interaction for the Social Web |Field=Human-computer interaction4 KB (657 words) - 19:43, 12 June 2010
- |Title=3rd International Conference on Computer Supported Education (CSEDU 2011) Conference Name: 3rd International Conference on Computer Supported Education (CSEDU 2011)5 KB (532 words) - 12:25, 16 June 2010
- * Security and Privacy * Human-Computer Interaction8 KB (1,066 words) - 19:39, 8 July 2010
- ...virtual environment (DVE) or collaborative virtual environment (CVE), is a computer-generated virtual world where multiple users can assume virtual representat ...pages, to the workshop. Submitted papers should be in accordance with IEEE Computer Society guidelines, and will be refereed by reviewers in terms of relevance6 KB (858 words) - 09:18, 19 August 2010
- With new technology of online communications and computer dependent service providers, even conventional faxing has gone the distance ...These fax services also far overpower the traditional providers in ways of security, ease of accessibility and functionality.4 KB (626 words) - 14:16, 29 July 2010
- |Title=ACM Conference on Computer and Communications Security |Field=Computer security and reliability469 bytes (56 words) - 15:30, 14 January 2021
- |Title=IEEE Computer Security Foundations Symposium (was CSFW)114 bytes (16 words) - 22:22, 26 February 2020
- |Title=European Symposium On Research In Computer Security |Field=Security147 bytes (20 words) - 13:59, 11 March 2020
- |Title=Annual Computer Security Applications Conference |Field=Security140 bytes (18 words) - 00:51, 28 February 2020
- *Security and privacy *Computer vision for resource-constrained and mobile platforms3 KB (412 words) - 09:52, 27 February 2020
- 5. HUMAN-COMPUTER INTERACTION * › Database Security and Transaction Support19 KB (2,462 words) - 19:10, 26 August 2010
- ...happen to be new to these service providers and might be worried about the security of using these online services then, the following benefits are sure to get ...se benefits is the 24/7 customer service and 800 numbers provided by these computer fax providers. Also there is limited amount to the number of faxes that you3 KB (610 words) - 16:33, 27 August 2010
- ...ocus on the frontier topics in the theoretical and applied engineering and computer science subjects. The WCE conferences serve as good platforms for our membe The 2011 International Conference of Computer Science and Engineering3 KB (458 words) - 08:06, 31 August 2010
- |Title=IEEE Winter Conference on Applications of Computer Vision * Human-Computer Interaction2 KB (164 words) - 20:17, 12 May 2020
- |Field=Theoretical computer science Papers presenting original research on all aspects of theoretical computer science are sought. Typical but not exclusive topics of interest are:<br>4 KB (602 words) - 06:44, 26 August 2020
- |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium3 KB (343 words) - 16:31, 6 May 2020
- * Communications and computer networks * Security applications5 KB (574 words) - 15:58, 6 March 2020
- ...rmation Society (i-Society 2011) is Technically Co-Sponsored by IEEE UK/RI Computer Chapter. The i-Society is a global knowledge-enriched collaborative effort - Human Computer Interaction6 KB (732 words) - 05:52, 5 December 2010
- ...blic of Ireland Section, the Chester and North Wales Branch of the British Computer Society (BCS), the Wales North Branch of the Institution of Engineering and • Security4 KB (579 words) - 15:24, 13 October 2010
- ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)2 KB (298 words) - 16:47, 5 July 2020
- |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)5 KB (609 words) - 17:01, 5 July 2020
- |Acronym=CALL FOR PAPER Journal: International Journal of Computer Networks (IJCN) |Title=CALL FOR PAPER Journal: International Journal of Computer Networks (IJCN)3 KB (318 words) - 16:46, 5 July 2020
- Decision Support Systems and Computer Aided Diagnosis Security, Ethics and Privacy5 KB (693 words) - 10:44, 14 November 2010