Search results
Create the page "Internet protection" on this wiki! See also the search results found.
- |Title=The Fourth International Conference on Internet and Web Applications and Services he Fourth International Conference on Internet and Web Applications and Services) continues a series of co-located events18 KB (2,408 words) - 02:37, 16 December 2008
- ...self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-x operations to the maximum extent possible without human in ...that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interact9 KB (1,216 words) - 17:32, 14 October 2008
- Most of critical activities in the areas of communications (telephone, Internet), energy & fluids (electricity, gas, water), transportation (railways, airl ...ing. Considering system and feature dependability becomes crucial for data protection and recoverability when implementing mission critical applications and serv15 KB (2,175 words) - 21:03, 19 March 2013
- ...r, PVR, Interconnects, Game Systems, Interactive and Directed Programming, Internet Integration, Next-Generation DVD, Displays Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability, Application Control, H3 KB (354 words) - 20:06, 14 October 2008
- However, for reasons such as: password protection, FORM based interfaces published as special issue of International Journal on WWW/Internet7 KB (875 words) - 23:10, 14 October 2008
- infrastructure protection and operation, emergency and crisis intervention, healthcare servic Internet to reduce cost of deployment and maintenance and to enhance reachability an5 KB (549 words) - 17:15, 5 July 2020
- SIGNAL-IMAGE TECHNOLOGY & INTERNET- BASED SYSTEMS (SITIS'08) - Digital Rights Management and Intellectual Property Protection4 KB (587 words) - 23:30, 14 October 2008
- ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob5 KB (694 words) - 23:11, 14 October 2008
- Internet Security & Applications Virus, worms, Trojon Protection5 KB (628 words) - 23:15, 14 October 2008
- ...entation (rather than theory). A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security tec The proceedings are published by the Internet Society.5 KB (673 words) - 23:19, 14 October 2008
- ...esearch can be used to enable innovation and defeat the "dark side" of the Internet. The theme of PST 2008 is �??PST - Enabling Innovation.�?? Like in the * Critical Infrastructure Protection6 KB (736 words) - 23:20, 14 October 2008
- - Multimedia security and content protection - Multimedia analysis and social media on the Internet3 KB (425 words) - 23:20, 14 October 2008
- Mobile learning became a fact, due to the technical accessibility and Internet communications. Many online classes, learning systems, university curricula ...dditionally, they require new monitoring and management paradigms, as self-protection, self-diagnosing, self-maintenance become core design features.6 KB (765 words) - 23:26, 14 October 2008
- * Critical infrastructure protection. * Internet dependability and quality of service.4 KB (528 words) - 23:27, 14 October 2008
- ...n, process automation, CAD/CAM/CAT/CIM and LANs, industrial application of internet technologies, multimedia, wireless communications, data privacy and securit ...and FACTS, Power market, Power distribution network and automation, Power protection, SCADA, EMS, WAMS and substation automation, Green power.4 KB (504 words) - 23:33, 14 October 2008
- International Conference on Internet and Web Applications and Services, as web personalization and protection of users privacy in service8 KB (1,075 words) - 23:52, 14 October 2008
- ...es and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software d Internet security; Security in wireless; Sensor/cellular network security; Ad hoc ne13 KB (1,617 words) - 19:03, 24 November 2008
- o Internet broadcasting * Optical network protection and restoration (single layer and multilayer)14 KB (1,518 words) - 13:01, 18 January 2009
- * Content protection and DRM for UCS * Journal of Internet Technology, MoE, Taiwan6 KB (793 words) - 15:12, 1 October 2020
- - Denial of Service Protection - Internet and Router Security8 KB (967 words) - 17:07, 27 February 2009
- Web 2.0 Security, Mobile Internet Internet Security & Applications5 KB (578 words) - 10:21, 20 November 2020
- • Internet Security & Applications • Virus, worms, Trojon Protection3 KB (339 words) - 11:32, 2 August 2009
- Web 2.0 Security, Mobile Internet Internet Security & Applications5 KB (599 words) - 10:21, 20 November 2020
- ...es and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software d Internet security; Security in wireless; Sensor/cellular network security; Ad hoc ne6 KB (746 words) - 11:35, 2 August 2009
- |Title=The Fifth International Conference on Internet Monitoring and Protectio ICIMP 2010: The Fifth International Conference on Internet Monitoring and Protection14 KB (1,651 words) - 15:56, 15 February 2017
- ...ate of available security technology. The proceedings are published by the Internet Society (ISOC). Symposium website: -Intellectual property protection: protocols, implementations, metering, watermarking, digital rights managem6 KB (766 words) - 10:54, 26 April 2010
- - Web 2.0 Security, Mobile Internet - Internet Security & Applications5 KB (667 words) - 14:27, 13 September 2009
- |Title=The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI C The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), Technical Co-Sponsored5 KB (607 words) - 18:01, 3 December 2009
- - Enterprise management and consumer protection - Real-time Internet E-Services7 KB (982 words) - 19:13, 3 January 2010
- ...e systems and services. The ongoing rapid growth of online data due to the Internet and the widespread use of large databases have created an important need fo › Privacy protection and ethics3 KB (451 words) - 19:25, 16 February 2010
- * Software Protection * Internet Security2 KB (217 words) - 16:50, 19 November 2020
- ...n tracks, covering different aspects of Web Information Systems, including Internet Technology, Web Interfaces and Applications, Society, e-Communities, e-Busi 1. INTERNET TECHNOLOGY5 KB (627 words) - 12:33, 16 June 2010
- ...fax services] demonstrate that everyday more and more people are utilizing internet faxing services because the offer very effective, efficiency user friendlin The benefits of [http://www.faxfromcomputer.org/ internet fax] over traditional fax machine is a lot and it provides with flexible us4 KB (626 words) - 14:16, 29 July 2010
- ...he advances of online services effectively [http://www.faxfromcomputer.org internet fax] has also gone wireless so now that it is accessible just about from an ...r cost effectiveness, ease of use and it is even safe for the environment. Internet faxing has in time become the next step in smart business and most of the l4 KB (623 words) - 14:06, 1 September 2010
- ...with good safety, simplicity and reliability. With the changes of wireless internet services effectively electronic fax has also gone wireless making it access ...yday more and more people are switching to [http://www.faxfromcomputer.org internet fax service] because the offer cost effectiveness, ease of use and even eco3 KB (600 words) - 10:49, 8 September 2010
- • Intellectual property protection • Intrusion detection • Network and Internet security • Network forensics5 KB (609 words) - 17:01, 5 July 2020
- * Software Protection * Internet Security2 KB (217 words) - 16:57, 27 December 2015
- - Security and Data Protection - Increasing Affordability and Access to the Internet6 KB (784 words) - 03:09, 22 November 2011
- Computer occupational diseases and INTERNET harmful information filtering Applications in environment protection, healthcare, creature conservation, mobile, avionics, aerospace, control, e10 KB (1,297 words) - 17:49, 24 February 2012
- ...Telecommunications in Smart Cities; IoT virtual networks; Device-to-device Internet; Mobile clouds; Smart and sustainable cities; Public data centers; Traffic ...ion; Signal separation and Interference rejection; Critical infrastructure protection13 KB (1,580 words) - 19:35, 18 February 2021
- ...ssing of personal data in AI, which is increasingly a requirement for data protection regulation. They can be used to assess the value of datasets and the contri ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2019 (OnTheMove'19)" that co-locates three conferences: ODBASE'19,6 KB (872 words) - 23:11, 24 February 2020
- - Multilingualism and cultural diversity in the digital age: preservation and protection vs assimilation and absorption - Internet regulation5 KB (702 words) - 10:02, 5 March 2013
- * Denial of Service Protection * Insider Threat protection2 KB (264 words) - 15:32, 7 January 2021
- ...ssing of personal data in AI, which is increasingly a requirement for data protection regulation. They can be used to assess the value of datasets and the contri ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2020 (OnTheMove'20)" that co-locates three conferences: ODBASE'20,6 KB (877 words) - 23:06, 24 February 2020
- - Security and Data Protection - Increasing Affordability and Access to the Internet6 KB (790 words) - 13:45, 24 July 2016
- - Security and Data Protection - Increasing Affordability and Access to the Internet6 KB (777 words) - 23:29, 29 July 2016
- Schneier’s article “The Internet is a surveillance state” summarised the state of Internet privacy as “Welcome to an Internet without privacy,7 KB (901 words) - 11:13, 16 July 2017
- * Multimedia analysis and Internet * Multimedia security and content protection3 KB (384 words) - 13:28, 28 July 2017
- software is being developed for a variety of applications - web, Internet, * Software Security for Web and Internet Applications4 KB (562 words) - 12:05, 3 September 2017
- * Internet Security & Applications * Virus, worms, Trojon Protection4 KB (628 words) - 13:34, 28 July 2017
- Data Protection Internet and Network Forensics2 KB (308 words) - 11:50, 3 September 2017
- Technologies, Smart Houses, Internet of Things (IoT) and similar environments Access control, privacy protection, and secure communication in multimodal4 KB (592 words) - 13:34, 28 July 2017
- |Field=internet of things protection4 KB (442 words) - 10:00, 21 August 2017
- * Internet Scale System Design * Data Integrity, Security, Protection, Privacy5 KB (654 words) - 09:58, 21 August 2017
- With the continuous proliferation of diverse Internet-based computing paradigms, further fueled up by the new development of IoT (Internet of Things)4 KB (532 words) - 13:24, 28 July 2017
- |Title=IEEE IINTEC 2017 : International Conference on Internet of Things, Embedded Systems and Communications The International Conference on Internet of Things, Embedded Systems and6 KB (743 words) - 11:45, 8 August 2017
- |Title=SCN-CyberIoT 2017 : Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal all provided with Internet connection, all potentially dealing with sensitive4 KB (547 words) - 09:58, 21 August 2017
- |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer5 KB (571 words) - 11:53, 3 September 2017
- TECHNOLOGY & INTERNET BASED SYSTEMS the Web and the Internet of Things (IoT) technologies that connect unlimited6 KB (876 words) - 09:59, 21 August 2017
- ...Cloud Computing (Cloud Services and Applications); Mobile Cloud Computing; Internet of Things (IoT); Machine to Machine Communications (M2M); Autonomic Network * Privacy and Personal Data Protection (PDP); Models of PDP, Registration and Regulation; Policy and Practices for3 KB (314 words) - 11:52, 27 March 2020
- New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to businesses by making possible the provision - Enterprise management and consumer protection5 KB (690 words) - 12:02, 26 March 2020
- ...on; Future mobile networks: 4G, 5G, and LTE spectra; Mobile Cloud systems; Internet of Things (IOT); Sensing and sensor networks; Energy-aware networks; Conten ...ies; NGN device instrumentation; NGN policy-based control; Next Generation Internet14 KB (1,770 words) - 14:56, 19 April 2020
- * security and privacy protection mechanisms for safety-related and safety-critical systems * safety-related applications of smart systems and IoT (Internet of Things, Smart Anything Everywhere)3 KB (419 words) - 10:51, 19 June 2020
- * Security and privacy protection mechanisms for safety applications; * Safety-related applications of smart systems and IoT (Internet of Things, Smart Anything Everywhere);4 KB (475 words) - 10:23, 19 June 2020
- ...G and mmWave; Cognitive femtocell networks; ID/locator split in the future Internet; Mobility an named data networking (NDN); Smart sensing networks; Wearable/ ...s; Replication in mobile environments; Middleware for mobile environments; Internet and mobility; Software architecture for mobile applications7 KB (918 words) - 13:51, 5 June 2020
- |Title=The Fifteenth International Conference on Internet Monitoring and Protection |Field=internet monitoring, internet protection17 KB (2,088 words) - 12:49, 14 June 2020
- * Security and privacy protection mechanisms for safety applications * Safety-related applications of smart systems and IoT (Internet of Things, Smart Anything Everywhere)4 KB (457 words) - 11:48, 17 June 2020
- ...X (everything, things, people, etc.); Internet, Virtualization and Cloud; Internet and Big Data; Sensing and sensor networks; Energy-aware networks; Content-o Architectures and protocols for wired and wireless sensor networks; Internet of Things architectures and implementations; Design of sensor networks; Ins13 KB (1,636 words) - 11:51, 10 July 2020
- |Acronym=INTERNET 2020 |Title=The Twelfth International Conference on Evolving Internet13 KB (1,550 words) - 02:20, 10 July 2020
- ...ty devices; Physical vibration virtual keyboard; Tactile and haptic mobile Internet; Commodity WiFi devices; Macro-Femto interference avoidance; Mobile apps an ...dvanced mobile Internet; Internet of X (everything, things, people, etc.); Internet, Virtualization and Cloud; Big Data and mobile networks; Sensing and sensor11 KB (1,335 words) - 02:28, 10 July 2020
- |Field="Digital society trends","Internet and web technologies", "Mobility and multimedia systems","Networking and te ...Knowledge transfer; Organizational culture; Business process outsourcing; Internet of Things and research for information systems; Crowd wisdom in IS; Mining18 KB (2,036 words) - 02:36, 10 July 2020
- Security in SDN, SDX, NFV; Security in 4G/5G networks; Security and Internet of X (everything, things, people, etc.); Security for Virtualization and Cl ...ems; Security in mobile applications, Web-based, Cloud-based services, and Internet of Things (IoT)-based systems; Designing secure and green-oriented industri15 KB (1,886 words) - 16:16, 25 August 2020
- * Commercial Policy, Protection, Promotion, Trade Negotiations * E- Business and Internet Computing9 KB (896 words) - 16:31, 6 August 2020
- communications; Intra-vehicle communications; Vehicle-to-Internet and embedded systems; Internet of Things (IoT) impact on embedded10 KB (1,210 words) - 20:17, 22 November 2020
- Deep learning and Internet of Things; Deep learning and Big data; Data and cloud technologies; Big data and Internet of Things; High9 KB (1,239 words) - 14:37, 29 December 2020
- ...on; Future mobile networks: 4G, 5G, and LTE spectra; Mobile Cloud systems; Internet of Things (IOT); Sensing and sensor networks; Energy-aware networks; Conten ...ies; NGN device instrumentation; NGN policy-based control; Next Generation Internet13 KB (1,574 words) - 12:11, 24 November 2020
- |Title=The Sixteenth International Conference on Internet Monitoring and Protection ...MP 2021, The Sixteenth International Conference on Internet Monitoring and Protection17 KB (2,035 words) - 14:45, 18 February 2021
- ...G and mmWave; Cognitive femtocell networks; ID/locator split in the future Internet; Mobility an named data networking (NDN); Smart sensing networks; Wearable/ ...s; Replication in mobile environments; Middleware for mobile environments; Internet and mobility; Software architecture for mobile applications7 KB (868 words) - 15:11, 18 February 2021
- ...erization-driven scheduling; Data analytics and visualization; HPC in IoT (Internet of Things) systems; Observational data and simulations; Complex scientific ...ualization, and cloud networks; Delay/disruption tolerant networks; Future Internet broadband services; Software Defined Networks (SDN); Fast networks / Infini11 KB (1,325 words) - 15:01, 18 February 2021
- (M2M) and Internet of Things (IoT); Mobile Cloud: WiFi signal-based vibration virtual keyboard; Tactile and haptic mobile Internet;12 KB (1,454 words) - 19:21, 30 November 2020
- |Acronym=INTERNET 2021 |Title=The Thirteenth International Conference on Evolving Internet13 KB (1,607 words) - 19:32, 30 November 2020
- ...ile environments; Adaptive mechanisms in Internet of Things (IoT) and IoD (Internet of Drones); Adaptation in data-centric control; Self-Society; Adaptation in ...ent; Self-configuration, self-healing, self-management; Self-defense, self-protection, self-diagnosis; Self-adaptation of overlay networks; Self-adaptation in ad8 KB (931 words) - 15:28, 29 December 2020
- Interoperability in IoT; Software defined radio (SDR); Internet transmission signal processing; Audio transmission over Internet; Audio19 KB (2,346 words) - 10:51, 9 December 2020
- Internet imaging and multimedia; Multimodal content analysis; Multimedia multimedia services; Internet telephony and hypermedia technologies and10 KB (1,212 words) - 14:36, 29 December 2020
- ...nd parallel learning algorithms; Image and video coding; Deep learning and Internet of Things; Deep learning and Big data; Data preparation, feature selection, ...ta quality and provenance, Big data persistence and preservation; Big data protection, integrity, privacy, and pseudonymisation mechanisms; Big data software (li9 KB (1,229 words) - 03:37, 3 December 2021
- ...on Security, Artificial Intelligence and Modeling for the next generation Internet of Things ...on Security, Artificial Intelligence and Modeling for the next generation Internet of Things (SAM IoT) 20206 KB (804 words) - 11:42, 28 January 2021
- ...on; Future mobile networks: 4G, 5G, and LTE spectra; Mobile Cloud systems; Internet of Things (IOT); Sensing and sensor networks; Energy-aware networks; Conten ...ies; NGN device instrumentation; NGN policy-based control; Next Generation Internet13 KB (1,653 words) - 14:44, 10 February 2021
- * • Denial of Service Protection * • Data Protection2 KB (197 words) - 17:40, 11 February 2021
- ...on; Future mobile networks: 4G, 5G, and LTE spectra; Mobile Cloud systems; Internet of Things (IOT); Sensing and sensor networks; Energy-aware networks; Conten ...ies; NGN device instrumentation; NGN policy-based control; Next Generation Internet14 KB (1,718 words) - 11:30, 3 March 2021
- |Title=2nd International Conference on Internet and e-Business Consumer protection in eCommerce2 KB (302 words) - 08:59, 11 March 2021
- * Cryptography and security for the Internet of Things (RFID, sensor networks, smart devices, smart meters, etc.) * Hardware IP protection and anti-counterfeiting3 KB (288 words) - 17:03, 7 April 2021
- ...rastructures (e.g., Big Data infrastructures Cloud,Map-Reduce, MPI, Data protection, Design of experiments, Interpretable models, Large-scale optimization, Sca * Emerging Applications (e.g., AI in Education, Internet of Things, Cyber Security, Intelligent Transportation)37 KB (5,185 words) - 11:25, 3 August 2023
- ...eless technologies; Interoperability in IoT; Software defined radio (SDR); Internet broadcasting; Mobile broadcasting and mobile TV; Cooperative communications ...ces; Digital audio transmission signal processing; Audio transmission over Internet; Audio Multiplexing Transmission Systems; Stereo audio transmission signal;19 KB (2,317 words) - 02:40, 26 November 2021
- ...hicle-to-roadside communications; Intra-vehicle communications; Vehicle-to-Internet communications; Driver-less transportation; Safeness in transportation syst ...systems; Real-time embedded systems; Virtualization and embedded systems; Internet of Things (IoT) impact on embedded systems; Embedded systems and embedded c10 KB (1,228 words) - 02:46, 26 November 2021
- ...; Multimedia extraction and annotation; Content search/browsing/retrieval; Internet imaging and multimedia; Multimodal content analysis; Multimedia abstraction ...transport; Multimedia service protocols; Mobility of multimedia services; Internet telephony and hypermedia technologies and systems; Media enabled eCommerce10 KB (1,221 words) - 03:35, 3 December 2021
- Internet of Vehicles and Smart Communication Theory and Application of Internet of things3 KB (376 words) - 08:30, 15 November 2022
- Internet of Vehicles and Smart Communication Theory and Application of Internet of things3 KB (350 words) - 12:45, 3 January 2023
- Big Data Protection, Integrity and Privacy, Computational Intelligence in Internet of Everything,4 KB (526 words) - 09:06, 23 August 2023