Search results

Jump to: navigation, search

Page title matches

Page text matches

  • ** Privacy, safety and security ** Privacy, safety, and security
    6 KB (777 words) - 22:54, 14 August 2008
  • *Network Security *Internet Applications
    5 KB (571 words) - 09:22, 19 July 2019
  • The 2011 International Conference of Information Security and Internet Engineering
    3 KB (454 words) - 12:34, 8 October 2020
  • Distributed computing and communication infrastructures: Internet QoS inter-operability, security, trusted and dependable systems, fault
    5 KB (715 words) - 17:43, 11 September 2008
  • |Title=The Fourth International Conference on Internet and Web Applications and Services he Fourth International Conference on Internet and Web Applications and Services) continues a series of co-located events
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...databases; Automated prediction of relationships; Linked data streams and Internet of things; Preferred repairs; Parallel-correctness and transferability; Gua
    11 KB (1,371 words) - 12:28, 18 May 2020
  • ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.) ** Data integration resources on the Internet
    11 KB (1,446 words) - 18:26, 13 October 2008
  • Software Security Internet and Information Systems Development
    2 KB (293 words) - 10:35, 24 June 2011
  • * Internet Technology and IP-based Applications * Security, Privacy and Trust
    34 KB (4,565 words) - 22:20, 10 January 2018
  • * Internet Technology and IP-based Applications * Security, Privacy and Trust
    8 KB (1,037 words) - 22:20, 10 January 2018
  • * Internet Technology and IP-based Applications * Security, Privacy and Trust
    9 KB (1,189 words) - 22:20, 10 January 2018
  • * Internet Technology and IP-based Applications * Security, Privacy and Trust
    26 KB (3,456 words) - 22:20, 10 January 2018
  • * Security and Privacy * Novel Applications of Internet
    10 KB (1,263 words) - 22:20, 10 January 2018
  • * Security and Privacy * Novel Applications of Internet
    12 KB (1,537 words) - 22:19, 10 January 2018
  • * Security and Privacy * Novel Applications of Internet
    8 KB (1,040 words) - 22:20, 10 January 2018
  • * Storage systems issues related to long term preservation, archival storage, internet-scale storage, and replication and consistency ...issues such as workload modeling, performance metrics, power consumption, security, usability, and experience with real systems and failures
    5 KB (777 words) - 05:50, 14 October 2008
  • ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusio
    9 KB (1,216 words) - 17:32, 14 October 2008
  • Internet pattern recognition ...multimedia databases, digital and video libraries, compression and coding, security over the network.
    2 KB (268 words) - 17:47, 14 October 2008
  • * Mobile Internet * Wireless privacy and security
    3 KB (456 words) - 18:10, 14 October 2008
  • * Security, privacy, and trustworthiness of mobile and wireless systems ...and protocols for cognitive wireless networks and their integration in the Internet
    7 KB (974 words) - 12:28, 3 August 2023
  • | Acronym = INTERNET 2009 | Title = The First International Conference on Evolving Internet
    11 KB (1,385 words) - 17:48, 14 October 2008
  • | Title = The First International Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability
    7 KB (960 words) - 17:48, 14 October 2008
  • * Web services and internet computing * Trust, security and privacy
    19 KB (2,503 words) - 13:25, 28 October 2020
  • + Security and information assurance VP of Data Solutions and Advertising Systems at the Internet
    7 KB (907 words) - 21:51, 14 October 2008
  • Internet Computing, Web applications and Web services Privacy, Trust, and Security is Distributed Systems
    2 KB (208 words) - 20:05, 14 October 2008
  • • E-learning, Multimedia conferencing, internet phones, and mail • Ethical, Social, Privacy, Security and moral Issues in an e-societ
    5 KB (530 words) - 10:27, 24 June 2011
  • |Field=Computer security and reliability ...(railways, airlines, road), life related (health, emergency response, and security), manufacturing (chips, computers, cars) or financial (credit cards, on-lin
    15 KB (2,175 words) - 21:03, 19 March 2013
  • ...r, PVR, Interconnects, Game Systems, Interactive and Directed Programming, Internet Integration, Next-Generation DVD, Displays Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability, Application Control, H
    3 KB (354 words) - 20:06, 14 October 2008
  • ...d to publish extended versions of their papers in the IADIS Journal on WWW/Internet (ISSN: 1645-7641) and other selected Journals. - Internet Cultures and new interpretations of �??Space�??
    6 KB (780 words) - 20:06, 14 October 2008
  • o Security and Privacy o Network and Internet Support for Distributed Applications
    2 KB (303 words) - 20:06, 14 October 2008
  • ...mic experts to present and discuss communications quality, reliability and security issues as they relate to real world issues. The output from the workshops a * Current and Next-generation Internet
    4 KB (505 words) - 22:15, 14 October 2008
  • Internet integration of wireless networks. * Internet integration
    6 KB (686 words) - 20:06, 14 October 2008
  • Homeland Security Systems Safety and Security
    6 KB (708 words) - 22:49, 14 October 2008
  • -Protocol and log visualization (security, trust) -Software visualization on the internet
    3 KB (355 words) - 22:53, 14 October 2008
  • �?� Internet computing, web environment for collaborative working �?� Security for CDVE
    4 KB (468 words) - 22:54, 14 October 2008
  • ...Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce and Human Factors. 4. Software Agents and Internet Computing
    9 KB (1,240 words) - 22:56, 14 October 2008
  • B10. Security and Intrusion Detection B11. Web Data and the Internet
    2 KB (295 words) - 12:03, 18 October 2008
  • * Cryptography and Network Security * Internet Technology and Applications
    2 KB (167 words) - 23:05, 14 October 2008
  • * models of concurrency, security, and mobility * parallel, distributed, and internet-based (grid) computing
    8 KB (1,085 words) - 18:01, 12 February 2009
  • Data Privacy and Security Internet and Web-Based Database Systems
    7 KB (1,006 words) - 23:08, 14 October 2008
  • ...stributed Applications), and IS'08 (International Symposium on Information Security).
    8 KB (1,081 words) - 08:21, 22 December 2011
  • - Security and Access Control - Information Content Security
    4 KB (595 words) - 23:09, 14 October 2008
  • * Internet services scalability, including locally and geographically * Security, reliability and availability in distributed storage systems,
    5 KB (644 words) - 23:10, 14 October 2008
  • Integration of Security and Privacy Privacy and Anonymity on the Internet
    2 KB (193 words) - 23:10, 14 October 2008
  • and military operations. Such networking is essential for safety, security and economic vitality in Internet to reduce cost of deployment and maintenance and to enhance reachability an
    5 KB (549 words) - 17:15, 5 July 2020
  • Quality of service, authentication and security, multimedia protocols, web architectures and protocols, network measurement Next Generation Internet
    7 KB (981 words) - 03:18, 6 January 2009
  • 1. NGN(Next Generation Network), NGI(Next Generation Internet) and Future Internet Technologies 9. Information Security Technologies
    2 KB (200 words) - 23:11, 14 October 2008
  • * Internet architecture and protocols * Network Security
    4 KB (465 words) - 23:11, 14 October 2008
  • * Optical Internet * Network Security & Reliability
    4 KB (559 words) - 23:11, 14 October 2008
  • | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability
    4 KB (587 words) - 23:30, 14 October 2008
  • ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob
    5 KB (694 words) - 23:11, 14 October 2008
  • Security/privacy in wireless systems Wireless / Mobile Internet
    2 KB (244 words) - 23:12, 14 October 2008
  • 1 .10 Internet and Intranet 5 .54 Network Security
    2 KB (250 words) - 23:12, 14 October 2008
  • ...Generation Internet Networks - 4th EURO-NGI Conference on Next Generation Internet Networks ...2008 focuses on the design, engineering, and operation of Next Generation Internet networks. It is organized by the Network of Excellence (NoE) Euro-FGI (http
    3 KB (382 words) - 23:12, 14 October 2008
  • Internet integration of wireless networks. * Internet integration
    3 KB (413 words) - 23:13, 14 October 2008
  • Internet routing, peer-to-peer and overlay networks, sensor networks, * Security and resilience of networked systems
    4 KB (528 words) - 23:13, 14 October 2008
  • ...t, particularly with properties such as reliability, availability, safety, security, and real time. The major areas of interest include, but are not limited to, dependability, security and/or real-time aspects within the following topics:
    2 KB (255 words) - 23:14, 14 October 2008
  • in the Services Computing discipline, Web services are Internet-based * Security Challenges for Web Services
    8 KB (1,158 words) - 23:14, 14 October 2008
  • ...on of large-scale networked and distributed systems. Systems as diverse as Internet routing, peer-to-peer and overlay networks, sensor networks, Web-based syst * Security, robustness, and fault-tolerance in networked environments
    8 KB (1,093 words) - 23:15, 14 October 2008
  • * Handoffs for Entertainment (Internet to WLAN, to 3G/BT/...) * QoS and Security Support for Entertainment
    8 KB (1,011 words) - 23:15, 14 October 2008
  • * Security aspects in network management "Design of Next Generation Internet Based on Application-Oriented Networking"
    6 KB (663 words) - 23:15, 14 October 2008
  • | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)
    5 KB (628 words) - 23:15, 14 October 2008
  • 2-02 Internet computing 4. Security and Privacy
    5 KB (623 words) - 23:15, 14 October 2008
  • ...ing development of new mobile technologies and the widespread usage of the Internet ...ng difficult social and policy issues such as those related to privacy and security
    8 KB (1,003 words) - 23:15, 14 October 2008
  • NPSec 2008 particularly welcomes new ideas on security in the context of future Internet design, such as architectural considerations for future
    4 KB (493 words) - 23:15, 14 October 2008
  • | Title = Internet Measurement Conference 2008 Internet Measurement Conference (IMC) 2008
    3 KB (313 words) - 23:15, 14 October 2008
  • * Future Internet Services: Teletraffic and Performance Issues * Network Security
    5 KB (598 words) - 10:18, 29 May 2016
  • * Wireless Internet access in ubiquitous systems * Security, privacy and social issues of mobile and ubiquitous systems
    5 KB (599 words) - 23:15, 14 October 2008
  • R. SP for Internet and Wireless Communications V. Signal Processing for Security
    2 KB (226 words) - 23:17, 14 October 2008
  • # security technology and systems * Integrity, Security, and Fault Tolerance
    6 KB (733 words) - 12:48, 27 October 2016
  • ...systems to mobile computing, multimedia systems, peer-to-peer networks and Internet services. All communication systems must interoperate with each other. Conn * Innovative architectures for Internet services, web services
    3 KB (358 words) - 23:18, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability
    5 KB (673 words) - 23:19, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability
    6 KB (736 words) - 23:20, 14 October 2008
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • - Multimedia security and content protection - Multimedia analysis and social media on the Internet
    3 KB (425 words) - 23:20, 14 October 2008
  • like voice, email, short messages, Internet access, m-commerce, to mobile video conferencing, - Personalization, Privacy and Security in Mobile Computing
    10 KB (1,262 words) - 23:20, 14 October 2008
  • * Internet telephony and hypermedia technologies and systems * Multimedia security including digital watermark and encryption
    5 KB (595 words) - 23:20, 14 October 2008
  • ...in meeting the challenges of scale and complexity in datacenter-scale and Internet-scale computing systems. At the same time, the real-world challenges and op ...learning techniques to address reliability, performance, power management, security, fault diagnosis, or manageability issues in computer systems
    6 KB (837 words) - 23:21, 14 October 2008
  • - Grid, P2P, Web Services and Internet Computing - Security, Privacy and Trust
    3 KB (357 words) - 23:23, 14 October 2008
  • * Internet and Web Applications * Information Security
    3 KB (415 words) - 23:23, 14 October 2008
  • Mobile learning became a fact, due to the technical accessibility and Internet communications. Many online classes, learning systems, university curricula ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design
    6 KB (765 words) - 23:26, 14 October 2008
  • * Architecture/software issues focusing on Internet services * Studies of Internet applications and services with implications for systems design
    3 KB (406 words) - 17:39, 30 September 2016
  • As the global Internet extends its reach with both backbone and "to the edge" bandwidth increasing * Security and Trust in Distributed Systems
    6 KB (761 words) - 03:28, 6 January 2009
  • ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors. * Architecture and protocols for security.
    4 KB (528 words) - 23:27, 14 October 2008
  • ...n progress, with an emphasis on systems that actually run in the wide-area Internet. * Architectural support for improving security or availability
    4 KB (577 words) - 23:31, 14 October 2008
  • | Title = International Conference on Distributed Computing and Internet Technologies International Conference on Distributed Computing and Internet Technologies
    5 KB (702 words) - 23:31, 14 October 2008
  • ...ms, protocols, peer-to-peer computing, sensor networks, inter-operability, security, trusted and dependable systems, fault tolerance, virtual subnets for ORC. ...bility, synchronization, resource allocation, scheduling, fault tolerance, security.
    3 KB (377 words) - 23:31, 14 October 2008
  • *Big Data platforms with applications to network management, security, measurements *Internet measurement and modeling
    4 KB (514 words) - 12:03, 6 April 2020
  • ...ternet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation.
    4 KB (504 words) - 23:33, 14 October 2008
  • International Conference on Internet and Web Applications and Services, Trust, security, and privacy
    8 KB (1,075 words) - 23:52, 14 October 2008
  • ...n Social and Facebook APIs for socially networked applications, OpenID for security, and cloud computing offerings from Amazon, Microsoft, Google, and others w * Portal security models and solutions;
    3 KB (378 words) - 23:34, 14 October 2008
  • ...ement ?Ontology Information/Knowledge/Service Integration ?Knowledge Flow ?Internet-based Knowledge Engineering and Software Engineering ...sed Multi-agent Systems ?Nature-Inspired Computing ? Autonomous Computing ?Internet-based Intelligent Applications ?P2P Computing ?Grid Computing ?Self-Organiz
    3 KB (367 words) - 23:35, 14 October 2008
  • | Title = SANS Network Security 2007 | Field = Internet
    492 bytes (57 words) - 23:36, 14 October 2008
  • Internet and Web technologies, information systems, information retrieval, applications for the Internet and Web.
    9 KB (1,215 words) - 23:38, 14 October 2008
  • * Future Internet design * Security, trust, & privacy
    3 KB (380 words) - 19:34, 17 November 2008
  • ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network - Future Internet
    2 KB (303 words) - 23:42, 14 October 2008
  • - Internet applications, social networks, recommender systems - security in distributed computing, cryptographic protocols
    6 KB (766 words) - 13:19, 28 November 2016
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ** Security, Privacy, and Trust ** Broadband Internet access
    5 KB (670 words) - 15:15, 16 February 2009
  • |Title=The First International Conference on Advances in Future Internet * Internet Mechanisms
    7 KB (883 words) - 17:35, 7 January 2021
  • ** Privacy and security ** Evolution of mobile internet technologies
    11 KB (1,366 words) - 16:44, 14 January 2009
  • |Field=Internet security
    2 KB (219 words) - 17:25, 14 January 2009
  • - Distributed applications ICTs: trade, medicine, industry, the Internet, etc.. - Technology for Internet
    6 KB (812 words) - 12:55, 18 January 2009
  • ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Internet Protocols
    5 KB (526 words) - 01:02, 2 February 2009
  • | Title = 3rd International Conference on Network and System Security 3rd International Conference on Network and System Security (NSS 2009)
    12 KB (1,669 words) - 12:58, 18 January 2009
  • o Game-theoretic aspects of network formation on the Internet * Security, Privacy, Encryption, and Digital Rights, including
    9 KB (1,221 words) - 12:58, 18 January 2009
  • | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...o raises a host of ethical issues, such as those pertaining to information security, privacy, data mining, and intellectual property. Therefore, as e-business The new paradigm of business on the internet and its ethical implications
    6 KB (856 words) - 13:00, 18 January 2009
  • both on usage of mashup solutions in open Internet environments underlining in business intranet environments stressing the need for security and
    6 KB (684 words) - 13:00, 18 January 2009
  • Internet Modeling Security and Access Control
    4 KB (529 words) - 13:00, 18 January 2009
  • * Internet Services * Security Systems & Services
    9 KB (1,183 words) - 13:41, 23 January 2009
  • economies. The term Internet of Services relates to the representation Internet. Many issues around the mapping between economic services and
    6 KB (798 words) - 13:01, 18 January 2009
  • - AI in Computer Security - Intelligent Internet Agents
    4 KB (582 words) - 14:47, 2 December 2010
  • o Internet broadcasting o Security in Power Line Communications
    14 KB (1,518 words) - 13:01, 18 January 2009
  • - Intelligent Internet Systems - Security, Privacy and Trust
    4 KB (588 words) - 13:01, 18 January 2009
  • - Security Engineering 17) Security & Privacy in Pervasive Computing environments - SPPC 09
    10 KB (1,321 words) - 13:01, 18 January 2009
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • ...point is far away from sufficient, which has been proved by the dilemma of Internet QoS research and applications. More important, multidisciplinary perspectiv * Privacy, security, ethics, culture, and anonymity issues
    6 KB (767 words) - 13:01, 18 January 2009
  • infrastructure that is enabled by various kinds of networks including the Internet. - Security, privacy, trust and safety of cyber physical & social computing
    3 KB (446 words) - 13:02, 18 January 2009
  • | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)
    6 KB (852 words) - 13:02, 18 January 2009
  • * security in distributed computing, cryptographic protocols * distributed computing issues in the Internet and the world-wide web
    7 KB (890 words) - 15:05, 27 December 2015
  • ...temas, Wireless communications, Technologies and applications, Information security ...an overhead projector, a screen and a video projector. Unlimited access to Internet for all participants.
    8 KB (977 words) - 16:33, 27 February 2009
  • ISGIG 2009 - the Internet of the Future ...rld. The large number of devices connected to the networks has changed the Internet to a "network of things and computers". These trends, plus the rise of coll
    4 KB (557 words) - 16:33, 27 February 2009
  • ...ibilities in artificial intelligence) to the observation that increases in Internet connection speeds, modular web applications, and advances in computer graph - Web Security
    4 KB (630 words) - 16:33, 27 February 2009
  • Internet based applications • Network security
    5 KB (654 words) - 17:06, 27 February 2009
  • · Reliability, fault-tolerance, and security · Internet computing and web services
    8 KB (1,050 words) - 18:04, 5 January 2017
  • * Future Internet design * Security, trust, & privacy
    4 KB (559 words) - 17:06, 27 February 2009
  • dominant consumers of residential Internet subscribers' bandwidth, and are * Security and privacy in P2P systems
    5 KB (623 words) - 17:06, 27 February 2009
  • | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability
    8 KB (967 words) - 17:07, 27 February 2009
  • ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Security and Privacy
    7 KB (941 words) - 17:07, 27 February 2009
  • in harmony with societal values and economic viability, with enhanced security, -Web and Internet Applications
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability
    3 KB (480 words) - 17:08, 27 February 2009
  • - Security, reliability, biometrics - Power management, reliability, security, performance
    4 KB (589 words) - 17:08, 27 February 2009
  • | Title = Internet Measurement Conference 2009 | Field = Internet
    6 KB (774 words) - 17:08, 27 February 2009
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • ...in track, covering different aspects of Web Information Systems, including Internet Technology, Web Interfaces and Applications, Society, e-Communities, e-Busi 1. Internet Technology
    3 KB (440 words) - 15:25, 9 December 2009
  • * Security issues in agent-based systems for search and rescue missions, use of games, == Internet ==
    6 KB (783 words) - 17:04, 27 December 2015
  • | Title = International journal of Network Security & Its Applications (IJNSA) International journal of Network Security & Its Applications (IJNSA)
    3 KB (339 words) - 11:32, 2 August 2009
  • * Internet architecture and protocols * Network Security
    7 KB (1,054 words) - 16:43, 27 December 2015
  • Information security IT and network security
    2 KB (258 words) - 11:33, 2 August 2009
  • | Acronym = IJEB - Spl Issue on Internet Technology 2009 | Title = Internet Technology: Emerging Technologies & Applications - A Special Issue of the I
    4 KB (564 words) - 12:01, 6 November 2020
  • |Title=International Workshop on P2P, Parallel, Grid and Internet Computing Fourth International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC-2010)
    7 KB (912 words) - 17:36, 5 November 2020
  • |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security
    5 KB (599 words) - 10:21, 20 November 2020
  • | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)
    6 KB (746 words) - 11:35, 2 August 2009
  • | Title = First Iberic Conference on Web-Applications Security (IBWAS’09) First Iberic Conference on Web-Applications Security (IBWAS’09)
    9 KB (1,261 words) - 11:35, 2 August 2009
  • ? Security and privacy ? Wireless & Mobile network Security
    5 KB (571 words) - 11:35, 2 August 2009
  • -Journal of Internet Technology (JIT) (SCI) IASM 2009 (Information Assurance and Security Management)- http://ispan2009.comm.ccu.edu.tw/IASM2009.html
    4 KB (422 words) - 11:36, 2 August 2009
  • | Title = International Workshop on the Future Internet of Things and Services - Embedded Web Services for Pervasive Devices International Workshop on the Future Internet of Things and Services - Embedded Web Services for Pervasive Devices (http:
    9 KB (1,206 words) - 11:40, 2 August 2009
  • |Title=The Fifth International Conference on Internet Monitoring and Protectio ICIMP 2010: The Fifth International Conference on Internet Monitoring and Protection
    14 KB (1,651 words) - 15:56, 15 February 2017
  • |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security
    3 KB (352 words) - 12:39, 11 August 2009
  • ...Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce and Human Factors. 4. Software Agents and Internet Computing
    5 KB (552 words) - 17:06, 12 August 2009
  • |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability
    6 KB (766 words) - 10:54, 26 April 2010
  • |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security
    5 KB (667 words) - 14:27, 13 September 2009
  • - Internet technologies - Internet security
    4 KB (507 words) - 22:37, 18 November 2009
  • |Title=The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI C The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), Technical Co-Sponsored
    5 KB (607 words) - 18:01, 3 December 2009
  • |Title=7th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS |Field=Computer security and reliability
    7 KB (982 words) - 19:13, 3 January 2010
  • ...ometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications in the above themes. Information retrieval and internet applications
    3 KB (382 words) - 18:27, 20 January 2010
  • |Title=3rd International Conference on Security of Information and Networks |Field=Computer security
    10 KB (1,270 words) - 17:12, 20 April 2010
  • * › Multimedia Security * › Internet QoS for Multimedia Applications
    3 KB (310 words) - 15:37, 5 February 2010
  • The 2010 International Conference of Information Security and Internet Engineering
    4 KB (559 words) - 08:31, 9 March 2010
  • ...chnology has the capacity to destroy African commodity markets. This poses security threats if plans are not developed to retrain those that will be displaced ...ation, Environment & Sustainability, Education, Currency, Energy, Risk and Security, Welfare, Poverty, Employment, Corruption, Terrorism, Economic Growth, et
    4 KB (631 words) - 06:05, 16 March 2010
  • * Internet of Services * Cloud Security
    4 KB (405 words) - 20:45, 3 November 2010
  • - Security for enabling eCommerce - Trust & Security Issues in e-Commerce
    4 KB (601 words) - 00:22, 28 March 2010
  • |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress
    2 KB (217 words) - 16:50, 19 November 2020
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • |Title=3rd International Workshop on Internet and Distributed Computing Systems 2010 (IDCS'10) |Field=Internet, Distributed Computing
    5 KB (667 words) - 12:08, 19 May 2010
  • ...a larger and larger group of end-user applications (e.g., climate change, security, land use, weather). › Fusion and enriching of EO images with, the image product metadata, Internet tagged resources, photography, text, maps, etc…
    4 KB (582 words) - 16:22, 20 May 2010
  • ...n tracks, covering different aspects of Web Information Systems, including Internet Technology, Web Interfaces and Applications, Society, e-Communities, e-Busi 1. INTERNET TECHNOLOGY
    5 KB (627 words) - 12:33, 16 June 2010
  • ...fax services] demonstrate that everyday more and more people are utilizing internet faxing services because the offer very effective, efficiency user friendlin The benefits of [http://www.faxfromcomputer.org/ internet fax] over traditional fax machine is a lot and it provides with flexible us
    4 KB (626 words) - 14:16, 29 July 2010
  • ...orks and protocols, wireless communications, collaborative objects and the Internet of Things, machine learning, mobile and social sensing, and embedded system *Security and privacy
    3 KB (412 words) - 09:52, 27 February 2020
  • ...Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce and Human Factors. 4. SOFTWARE AGENTS AND INTERNET COMPUTING
    19 KB (2,462 words) - 19:10, 26 August 2010
  • ...happen to be new to these service providers and might be worried about the security of using these online services then, the following benefits are sure to get ...es also boast of good contact management systems they are also akin to our internet email accounts and also having good facilities to keep track of your faxes
    3 KB (610 words) - 16:33, 27 August 2010
  • The 2011 International Conference of Information Security and Internet Engineering
    3 KB (458 words) - 08:06, 31 August 2010
  • * Cyber-physical systems and Internet of Things (IoT) * Privacy, security, trust, and safety management
    3 KB (395 words) - 15:14, 24 September 2020
  • * Internet and Web applications, social networks and recommendation systems * Security in distributed computing, cryptographic protocols
    3 KB (344 words) - 11:30, 21 April 2020
  • - Internet technologies - Internet security
    6 KB (732 words) - 05:52, 5 December 2010
  • |Title=Fourth International Conference on Internet Technologies and Applications (ITA 11) |Field=Internet
    4 KB (579 words) - 15:24, 13 October 2010
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • security * Internet-based platforms based on AR/MR for mechatronics
    12 KB (1,378 words) - 21:13, 28 November 2010
  • Security in network, systems, and applications<br> Internet and web technologies<br>
    4 KB (554 words) - 12:34, 14 October 2020
  • Security in network, systems, and applications<br> Internet and web technologies<br>
    4 KB (556 words) - 12:33, 14 October 2020
  • Security in network, systems, and applications<br> Internet and web technologies<br>
    4 KB (552 words) - 08:13, 10 December 2010
  • Security in network, systems, and applications<br> Internet and web technologies<br>
    4 KB (554 words) - 10:24, 6 July 2020
  • Security in network, systems, and applications<br> Internet and web technologies<br>
    4 KB (554 words) - 12:33, 14 October 2020
  • |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (217 words) - 16:57, 27 December 2015
  • |Field=Computer security and reliability field of Systems Security, which has been created to build on the
    5 KB (701 words) - 05:52, 14 April 2011
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • * Internet, Web and Security Visualization
    4 KB (461 words) - 11:48, 1 July 2011
  • Service and Systems Design and QoS Network Security Internet of Services
    5 KB (677 words) - 11:59, 1 July 2011
  • |Field=Internet, World wide web ...Applications, Society, e-Communities, e-Business, Web Intelligence and Web Security.
    5 KB (612 words) - 12:07, 1 July 2011
  • *Internet Tools *Network Security
    13 KB (1,774 words) - 18:35, 31 August 2011
  • - Security related issues of satellite communications - Voice, broadband Internet, DVB, positioning
    9 KB (1,218 words) - 16:06, 1 October 2020
  • The 2012 International Conference of Information Security and Internet Engineering
    7 KB (909 words) - 16:30, 10 September 2020
  • - Security and Data Protection - Increasing Affordability and Access to the Internet
    6 KB (784 words) - 03:09, 22 November 2011
  • ...created for user needs. This process has now reached the private life. The Internet, Web and wireless communication has fundamentally changed our daily communi *Privacy and Security
    5 KB (669 words) - 14:40, 20 December 2011
  • Information Security Internet Computing
    8 KB (1,085 words) - 16:28, 6 February 2012
  • Communications modeling; Communications security; Computer New Internet technologies
    6 KB (725 words) - 19:58, 22 November 2020
  • - Internet technologies - Internet security
    5 KB (595 words) - 05:03, 15 January 2012
  • Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability Computer occupational diseases and INTERNET harmful information filtering
    10 KB (1,297 words) - 17:49, 24 February 2012
  • ...Telecommunications in Smart Cities; IoT virtual networks; Device-to-device Internet; Mobile clouds; Smart and sustainable cities; Public data centers; Traffic ...t; Communications networks security; Information security; IPR and network security;
    13 KB (1,580 words) - 19:35, 18 February 2021
  • |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security
    4 KB (581 words) - 18:48, 24 February 2020
  • ...ng|Computer networking]]: <span style="font-size:90%">[[:category:Internet|Internet]], [[:category:World wide web|World wide web]] <!--[[:category:Information theory|Information theory]], [[:category:Internet|Internet]], [[:category:World wide web|World wide web]], [[:category:Wireless comput
    7 KB (815 words) - 18:03, 14 April 2021
  • *Industry 4.0, Factory of the Future and Internet of Things *Cyber Security and Privacy
    5 KB (663 words) - 11:49, 18 February 2020
  • ...es (e.g., consumer devices, wearable computing, neuroinformatics, sensors, Internet-of-Things, vehicles). * Information Security (e.g., privacy, surveillance, censorship, encryption, security).
    8 KB (1,024 words) - 09:57, 13 May 2020
  • ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2019 (OnTheMove'19)" that co-locates three conferences: ODBASE'19, • Semantic Web and the Internet of Things (IoT)
    6 KB (872 words) - 23:11, 24 February 2020
  • |Title=8th Asian Internet Engineering Conference 8th Asian Internet Engineering Conference
    5 KB (630 words) - 05:00, 19 April 2012
  • *Security and privacy, cryptographic protocols *Internet of things and cyber-physical systems
    2 KB (299 words) - 11:51, 8 April 2020
  • ...etworks , Network Modeling and Simulation, Computer Network : Performance, Security and Applications, Neural Networks and Applications, Remote Sensing, Self Or ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and
    3 KB (434 words) - 22:46, 30 May 2012
  • * Data streams and the Internet of Things * Trust, privacy, and security on the Semantic Web
    5 KB (663 words) - 14:34, 5 December 2018
  • * Data streams and the Internet of Things * Trust, privacy, and security on the Semantic Web
    5 KB (699 words) - 14:57, 5 December 2018
  • Security & Privacy Internet, Web and Security Visualization
    4 KB (466 words) - 16:27, 19 June 2012
  • Internet of Things Security: Vulnerability and Privacy
    5 KB (600 words) - 14:41, 20 June 2012
  • Service and Systems Design and QoS Network Security Internet of Services
    5 KB (662 words) - 18:50, 20 June 2012
  • ...forget that optical fiber is crucial to telecommunications in general and internet in particular. System Reliability and Security
    8 KB (1,102 words) - 17:23, 18 July 2012
  • *Security and Information Assurance *Web and internet computing
    2 KB (274 words) - 18:15, 13 August 2012
  • - Security and Access Control<br /> - Information Content Security<br />
    3 KB (466 words) - 13:00, 16 August 2012
  • ...Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce, Human Factors and Enterprise Architecture. 3. INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION34. SOFTWARE AGENTS AND INTERNET COMPUTING
    5 KB (552 words) - 15:08, 21 August 2012
  • ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. Security informatics
    6 KB (728 words) - 01:01, 25 August 2012
  • The 2013 International Conference of Information Security and Internet Engineering
    7 KB (903 words) - 16:27, 10 September 2020
  • The 2013 International Conference of Information Security and Internet Engineering
    6 KB (868 words) - 17:21, 29 August 2012
  • Information Security Internet and Web Applications
    2 KB (224 words) - 08:27, 26 October 2012
  • ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Big data and the Internet of Things
    3 KB (375 words) - 15:06, 24 September 2020
  • |Title=2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013) 2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013)
    6 KB (764 words) - 02:27, 11 December 2012
  • ...ents, logistics and networking, to complex event processing in finance and security. The DEBS conference brings together researchers and practitioners from the - Internet of Things (event-processing in M2M)
    6 KB (826 words) - 15:44, 29 January 2021
  • - Internet technologies - Internet security
    4 KB (535 words) - 14:38, 17 January 2013
  • - Internet regulation ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust
    5 KB (702 words) - 10:02, 5 March 2013
  • Internet of Things • Security: Vulnerability and Privacy
    5 KB (647 words) - 19:06, 5 April 2013
  • - Future Internet architectures and mobile network management - Future Internet architectures with smart objects
    9 KB (1,145 words) - 16:57, 11 April 2013
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • *Cyber Security *Internet & Web Applications
    3 KB (308 words) - 17:30, 26 May 2016
  • * Future Internet Architectures and Protocols * Integration of Web and Internet‐connected Objects
    2 KB (230 words) - 00:37, 28 May 2016
  • ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2016 (OnTheMove'16)" that co-locates three conferences: ODBASE'16, * Semantic Web and the Internet of Things (IoT)
    9 KB (1,131 words) - 23:18, 24 February 2020
  • ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2020 (OnTheMove'20)" that co-locates three conferences: ODBASE'20, * Semantic Web and the Internet of Things (IoT)
    6 KB (877 words) - 23:06, 24 February 2020
  • |Title=CRISIS 2016 : 11th International Conference on Risks and Security of Internet and Systems |Field=computer security
    382 bytes (45 words) - 00:54, 14 July 2016
  • |Field=embedded systems, internet of things, connectivity, safety and security
    401 bytes (49 words) - 16:22, 8 July 2016
  • * Intelligent Systems: Internet, Software, Energy, Hybrid * Database Privacy and Security
    4 KB (464 words) - 11:38, 4 September 2020
  • - Security and Data Protection - Increasing Affordability and Access to the Internet
    6 KB (790 words) - 13:45, 24 July 2016
  • - Security and Data Protection - Increasing Affordability and Access to the Internet
    6 KB (777 words) - 23:29, 29 July 2016
  • |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things
    870 bytes (100 words) - 18:53, 2 March 2021
  • |Title=RFIDSec 2016 : 12th Workshop on RFID and IoT Security |Field=RFID, internet-of-things, IOT, security
    372 bytes (47 words) - 15:35, 27 August 2016
  • * Security and Privacy Issues * EIS and Internet of Things
    925 bytes (116 words) - 11:05, 24 August 2016
  • - Internet technologies - Internet security
    5 KB (641 words) - 22:32, 29 July 2016
  • |Field=semantic web, internet of things, big data, information security
    431 bytes (45 words) - 21:01, 26 November 2016
  • * Intelligent Systems: Internet, Software, Energy, Hybrid * Database Privacy and Security
    3 KB (340 words) - 11:27, 4 September 2020
  • * Software & System Security ** Software and system security and privacy
    18 KB (2,288 words) - 12:48, 27 October 2016
  • * security and privacy * Internet of Things
    9 KB (1,190 words) - 10:12, 5 June 2019
  • * Intelligent Systems: Internet, Software, Energy, Hybrid * Database Privacy and Security
    3 KB (361 words) - 10:38, 4 September 2020
  • Future Internet and networking architectures Communication Security, Trust, Protocols and Applications
    5 KB (588 words) - 18:00, 21 January 2017
  • ...Internet of everything (http://www.dirf.org/intech/internet-of-things-and-internet-of-everything/) Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –
    5 KB (631 words) - 15:09, 10 April 2017
  • * Semantic technologies for the Internet of Things * Trust, security, and privacy
    7 KB (988 words) - 09:50, 14 August 2019
  • *security and privacy *internet of things and cyber-physical systems
    10 KB (1,309 words) - 10:29, 5 June 2019
  • *Web Security, Integrity, Privacy, and Trust *Ubiquitous Intelligence and the Internet of Things
    18 KB (2,394 words) - 16:28, 29 January 2018
  • to Meaningful Internet Systems 2017 (OnTheMove'17)" that co-locates three * Semantic Web and the Internet of Things (IoT)
    6 KB (798 words) - 23:16, 24 February 2020
  • * Security and Information Assurance * Web and internet computing
    10 KB (1,396 words) - 13:30, 28 July 2017
  • * Security and Information Assurance * Web and Internet Computing
    5 KB (679 words) - 13:28, 28 July 2017
  • ...considered in wireless environments and architecture with the use of IoT (Internet of things), big data analysis and a strong heterogeneity of access technolo - E-Health and the Internet of Things (IoT)
    4 KB (509 words) - 11:36, 8 August 2017
  • Schneier’s article “The Internet is a surveillance state” summarised the state of Internet privacy as “Welcome to an Internet without privacy,
    7 KB (901 words) - 11:13, 16 July 2017
  • * Multimedia analysis and Internet * Multimedia security and content protection
    3 KB (384 words) - 13:28, 28 July 2017
  • With the development of Internet of Things (IoT), various large-scale real-time  Design and implementation of Internet of Things related applications
    4 KB (532 words) - 13:28, 28 July 2017
  • - Internet of Services - Services Security and Reliability
    7 KB (1,009 words) - 13:39, 3 September 2017
  • |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)
    4 KB (562 words) - 12:05, 3 September 2017
  • * Security and Information Assurance * Web and Internet Computing
    5 KB (651 words) - 11:34, 8 August 2017
  • |Title=CODASPY 2018 : Conference on Data and Application Security and Privacy 8th ACM Conference on Data and Application Security and Privacy will be held on
    6 KB (807 words) - 13:40, 3 September 2017
  • * Internet, Web and Security Visualization
    5 KB (615 words) - 10:58, 15 May 2020
  • The Internet of things Engineering Network and Data Security
    5 KB (673 words) - 09:53, 3 September 2017
  • - Internet applications, social systems, peer-to-peer and overlay networks - Security and privacy, cryptographic protocols
    7 KB (1,009 words) - 15:54, 3 September 2019
  • Security, Computer Vision. Following the past successful symposium SoICT 2016, 2. Network Communication and Security: Future Internet, Optical Networks, Mobile
    4 KB (559 words) - 11:58, 8 August 2017
  • - Service Security and Privacy - Machine to Machine Communications, Internet of things and Smart Cities
    6 KB (873 words) - 13:30, 28 July 2017
  • Protocols, architectures and applications for the Internet of Things Cryptography and network security
    4 KB (524 words) - 13:30, 28 July 2017
  • * Computer Security * Internet & Cloud Computing
    4 KB (523 words) - 13:30, 28 July 2017
  • * Cryptography and Information security * Internet Engineering & Web services
    3 KB (347 words) - 10:20, 20 November 2020
  • * Cryptography and Information security * Internet Engineering & Web services
    3 KB (346 words) - 17:32, 18 February 2021
  • - Internet of Things and Embedded Systems - IT Architecture and Security
    1 KB (136 words) - 11:52, 8 August 2017
  • Internet of things Network management & security
    4 KB (497 words) - 11:58, 8 August 2017
  • ...T 2017 : Special Issue on State of the art and Research Challenges in the Internet of Things (IoT) in Journal of Computer Networks and Communications (Indexed State of the art and Research Challenges in the Internet
    4 KB (483 words) - 10:00, 21 August 2017
  • |Field=security Wireless Networks, Data Communication Technologies, and Network Security. The
    4 KB (486 words) - 11:57, 8 August 2017
  • |Title=IJNSA 2017 : International Journal of Network Security & Its Applications -- UGC, ERA Indexed |Field=security
    4 KB (628 words) - 13:34, 28 July 2017
  • |Field=security Wireless Networks, Data communication Technologies, and Network Security. The
    4 KB (546 words) - 11:35, 8 August 2017
  • |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
    5 KB (722 words) - 10:00, 21 August 2017
  • |Title=DMCS 2017 : DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17) |Field=security
    4 KB (626 words) - 09:30, 3 September 2017
  • |Title=ICNS - Ei 2017 : 2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus |Field=security
    2 KB (308 words) - 11:50, 3 September 2017
  • |Field=security robustness, security, privacy, and ergonomics of EEG-based biometric systems and
    3 KB (450 words) - 15:32, 9 October 2020
  • |Title=ASPMI 2018 : Advances in Security and Privacy of Multimodal Interfaces |Field=security
    4 KB (592 words) - 13:34, 28 July 2017
  • ...e=SPIoT 2017 : The 6th International Symposium on Security and Privacy on Internet of Things |Field=security
    3 KB (379 words) - 12:01, 3 September 2017
  • |Field=internet of things and network security.
    4 KB (442 words) - 10:00, 21 August 2017
  • * Web and Internet Computing * Security and Privacy
    5 KB (589 words) - 11:46, 8 August 2017
  • - Internet search - Security
    4 KB (580 words) - 20:58, 12 November 2020
  • wellness, safety and security, energy and environment, communication and • Social Internet of things for smart environments and urban networking
    5 KB (696 words) - 11:36, 8 August 2017
  • - Internet of Things Area 5: Security and Privacy in Sensor Networks
    5 KB (632 words) - 12:30, 3 September 2017
  • - Big Data Applications for Internet of Things - Big Data Privacy and Security
    4 KB (583 words) - 10:01, 3 September 2017
  • art solutions in Wired and Wireless Networks, Internet of Things, and Internet Internet of Things, etc.
    4 KB (475 words) - 12:34, 8 August 2017
  • Computer Security SEC Internet of Things IoT
    5 KB (660 words) - 13:50, 8 April 2020
  • Advanced Machine Learning Technologies for Network Security. Machine learning in Internet of things and cloud computing
    3 KB (355 words) - 12:33, 3 September 2017
  • INTERNET BASED SYSTEMS (SITIS 2017) - Multimedia system for traffic and public security
    5 KB (623 words) - 11:57, 8 August 2017
  • Technology and the Internet Technology. The modern applications are emerging in * Cryptography, Security and Privacy of Mobile & Wireless Networks
    5 KB (616 words) - 13:19, 28 July 2017
  • vehicles, smart communities, biomedical instruments, security surveillance. * Internet Scale System Design
    5 KB (654 words) - 09:58, 21 August 2017
  • development of robust and high-quality intelligent Internet-scale distributed as Cloud computing, Internet-of-Things (IoT), Machine-to-Machine (M2M)
    4 KB (494 words) - 13:20, 28 July 2017
  • - Data streams and the Internet of Things - Trust, privacy, and security on the Semantic Web
    7 KB (903 words) - 13:23, 28 July 2017
  • • Safety & SecurityInternet of Things
    2 KB (298 words) - 09:59, 21 August 2017
  • Homeland Security Internet of Things
    3 KB (324 words) - 13:34, 5 December 2017
  • - Internet search - Security
    3 KB (346 words) - 19:16, 26 November 2020
  • |Acronym=Technologies for Security of EHR 2017 |Title=Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Cha
    5 KB (650 words) - 13:24, 28 July 2017
  • * Test, Verification, and Security of Digital Systems * Designing Electronics for the Internet of Things
    1 KB (178 words) - 10:05, 20 November 2020
  • Information Systems Analysis and Specification, Internet Computing, Electronic - Security
    6 KB (818 words) - 13:40, 3 September 2017
  • cloud computing, big data, pervasive computing, Internet of Things, and social communications, from smart cloud computing to smart security. The conference is
    3 KB (412 words) - 11:51, 3 September 2017
  • ...e=WICS 2017 : 4th International Workshop on Information and Communication Security |Field=security
    3 KB (347 words) - 19:48, 22 November 2017
  • |Title=IEEE IINTEC 2017 : International Conference on Internet of Things, Embedded Systems and Communications |Field=security
    6 KB (743 words) - 11:45, 8 August 2017
  • |Field=security challenges brought by the absence of infrastructures and security threats at
    4 KB (500 words) - 09:56, 21 August 2017
  • ...yberIoT 2017 : Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal |Field=security
    4 KB (547 words) - 09:58, 21 August 2017
  • systems, the Internet of Things, real-time and embedded systems, have scalability, elasticity, availability, reliability, and security.
    11 KB (1,364 words) - 13:23, 3 September 2017
  • ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security
    8 KB (1,170 words) - 13:40, 3 September 2017
  • - Internet of Things - Security and Privacy
    6 KB (825 words) - 13:22, 3 September 2017
  • |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer
    5 KB (571 words) - 11:53, 3 September 2017
  • Information Security Network Security
    2 KB (269 words) - 11:57, 3 September 2017
  • Information Security & Computer Forensics Internet applications
    2 KB (246 words) - 12:11, 3 September 2017
  • *security, access control, and licensing issues of Linked Data All contributions will be archived at Internet Archive.
    6 KB (926 words) - 17:55, 9 January 2018
  • TECHNOLOGY & INTERNET BASED SYSTEMS the Web and the Internet of Things (IoT) technologies that connect unlimited
    6 KB (876 words) - 09:59, 21 August 2017
  • * Security and Information Assurance * Web and Internet Computing
    4 KB (478 words) - 08:48, 16 May 2020
  • programming platforms (e.g MS Azure, Google Appe Engine), and internet-based rapid evolution and proliferation of Internet of Things systems, we this session
    6 KB (880 words) - 10:00, 21 August 2017
  • * Web Science and the Internet of Things * Anonymity, security and trust for Web access
    8 KB (1,023 words) - 19:05, 7 March 2020
  • * privacy and security issues * internet multimedia computing
    4 KB (436 words) - 11:49, 21 April 2020
  • *Big Data platforms with applications to network management, security, measurements *Internet measurement and modeling
    2 KB (290 words) - 11:16, 6 April 2020
  • *Internet services, cloud computing, and datacenters *Security, reliability, availability, and sustainability
    4 KB (547 words) - 12:27, 30 September 2019
  • * Information Security, Privacy, and Risk Management * E-Business and the Internet of Things
    1 KB (188 words) - 07:35, 17 April 2020
  • * User Interfaces for the Internet of Things * Usable Security
    2 KB (200 words) - 08:47, 17 April 2020
  • === Information Security === ...lysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies.
    3 KB (314 words) - 11:52, 27 March 2020
  • |Title=15th International Conference on Availability, Reliability, and Security The International Conference on Availability, Reliability, and Security (ARES) 2020
    3 KB (313 words) - 17:14, 4 November 2020
  • |Title=17th International Conference on Trust, Privacy and Security in Digital Business New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to businesses by making possible the provision
    5 KB (690 words) - 12:02, 26 March 2020
  • |Title=16th EAI International Conference on Security and Privacy in Communication Networks * Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
    2 KB (299 words) - 13:10, 30 March 2020
  • *Big data platforms with applications to network management, security, measurements *Internet measurement and modeling
    2 KB (238 words) - 11:18, 6 April 2020
  • * data center and internet-scale systems. * security and practical applications of cryptography,
    2 KB (210 words) - 12:33, 22 December 2020
  • [[SECURWARE 2021]], The Fifteenth International Conference on Emerging Security Information, Systems and Technologies [[AFIN 2021]], The Thirteenth International Conference on Advances in Future Internet
    2 KB (238 words) - 17:26, 14 January 2021
  • ...r systems; High-efficiency power amplifiers; Voltage scaling applications; Internet of Things (IoT) devices; Smart building systems; Low-latency arbiters; Feed ...is (Data and DataFlows); CNN Interference systems; Programmable platforms; Security access; Automatic acceleration platforms; Reconfigurable hardware; Clouds F
    5 KB (556 words) - 15:23, 14 January 2021
  • Topic 4: Security and Privacy: Topic 5: Internet of Things:
    2 KB (254 words) - 08:59, 14 April 2020
  • *data center and internet-scale systems. *security and practical applications of cryptography,
    3 KB (303 words) - 08:58, 16 April 2020
  • * data center and internet-scale systems, * security and practical applications of cryptography,
    2 KB (222 words) - 11:23, 16 April 2020
  • * Information Security, Privacy, and Risk Management * Digital Business Platforms, Blockchain, Social Networking, and the Internet of Things
    1 KB (158 words) - 08:18, 17 April 2020
  • ...rmation processing; Biometric analysis, forensic analysis watermarking and security; Processing signal, image and video collections; Implementation of signal, ...link); Space observation (backhaul link); Small cells (cover zones without Internet); Space-IoT (monitoring sensors); Standard adaptation to 6G for handoff and
    10 KB (1,215 words) - 14:46, 19 April 2020
  • ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking; ...in CLOUD/GRID; User profiles and priorities in CLOUD/GRID; Performance and security in CLOUD/GRID systems; Fault tolerance, resilience, survivability, robustne
    14 KB (1,770 words) - 14:56, 19 April 2020
  • ...achine learning methods; Model training, inference, and serving; Trust and security for machine learning applications; Testing, debugging, and monitoring of ma ...ous systems; Monitoring and control in autonomous systems; Performance and security in autonomous systems; Management of autonomous systems; Testing autonomous
    16 KB (1,897 words) - 12:31, 18 May 2020
  • ...Web photo tagging; Opinion-based Web services; Interactive keyword search; Internet advertising services; Online personal assistants; Collaborative writing; So ...owsers; Tabular Data on the Web; Web linguistic changes; Web-based systems security; Web preferences; Web pattern semantics; Modeling web user activities; Twit
    11 KB (1,390 words) - 12:35, 18 May 2020
  • * IT security, intellectual property and personal anonymity in open innovation * Openness in various public initiatives (e.g. Smart Cities, Internet of Things)
    6 KB (748 words) - 10:02, 30 April 2020
  • * How can MAS help developing Cyber-Physical Systems and Internet-of-Things? Which development tools and frameworks are available/needed? safety and security for mobile MAS deployment
    8 KB (1,092 words) - 12:49, 22 April 2020
  • |Title=38th International Conference on Computer Safety, Reliability, and Security The 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP)
    3 KB (419 words) - 10:51, 19 June 2020
  • * Security * Internet of Spaces
    1 KB (139 words) - 15:45, 22 April 2020
  • |Title=14-th International Workshop on Advances in Information Security * Security of next generation Operating Systems
    2 KB (200 words) - 12:01, 28 April 2020
  • * Internet, Web and Security Visualization
    3 KB (293 words) - 10:38, 15 May 2020
  • * - Future Internet and Next Generation Networking * - Security in Computer and Telecommunication Systems
    5 KB (640 words) - 13:03, 5 May 2020
  • ...x effects, which must be controlled to adhere to safety, availability, and security guarantees where needed. This special day will cover the latest trends in a ...lidation challenges, and test or fault injection methods addressing system security.
    12 KB (1,651 words) - 13:30, 27 November 2020
  • * Internet and IP Based Environments * Information Infrastructure and Security
    2 KB (175 words) - 10:44, 7 May 2020
  • * Internet and IP Based Environments * Information Infrastructure and Security
    2 KB (174 words) - 10:43, 7 May 2020
  • * Internet of Things * Security, privacy, and trust
    6 KB (729 words) - 09:28, 12 May 2020
  • |Title=37th International Conference on Computer Safety, Reliability, and Security The 37th International Conference on Computer Safety, Reliability and Security (SAFECOMP)
    4 KB (475 words) - 10:23, 19 June 2020
  • * 2.6. Internet of things * 13. Hardware and Embedded Security:
    6 KB (739 words) - 15:08, 13 May 2020
  • * Internet, Web and Security Visualization
    5 KB (630 words) - 10:01, 15 May 2020
  • * Internet, Web and Security Visualization
    6 KB (735 words) - 11:44, 15 May 2020
  • |Title=15th Conference on Web and Internet Economics WINE 2019: The '''15th Conference on Web and Internet Economics'''
    2 KB (329 words) - 13:48, 23 June 2020
  • * Intelligence for Security * Internet of Things
    2 KB (239 words) - 14:17, 2 June 2020
  • |Title=The Fifteenth International Conference on Internet and Web Applications and Services |Field=Internet, Web Applications and Services
    14 KB (1,804 words) - 13:49, 5 June 2020
  • ...G and mmWave; Cognitive femtocell networks; ID/locator split in the future Internet; Mobility an named data networking (NDN); Smart sensing networks; Wearable/ ...s; Replication in mobile environments; Middleware for mobile environments; Internet and mobility; Software architecture for mobile applications
    7 KB (918 words) - 13:51, 5 June 2020
  • * Information security * Internet+techniques
    6 KB (720 words) - 12:20, 11 June 2020
  • * Information security * Internet+techniques
    5 KB (670 words) - 09:42, 12 June 2020
  • * Information security * Internet+techniques
    6 KB (784 words) - 12:58, 15 June 2020
  • |Title=The Fifteenth International Conference on Internet Monitoring and Protection |Field=internet monitoring, internet protection
    17 KB (2,088 words) - 12:49, 14 June 2020
  • |Title=36th International Conference on Computer Safety, Reliability, and Security ...ustrial Computer Systems, Technical Committee 7 on Reliability, Safety and Security (EWICS TC7). Since then, it has contributed to the progress of the state-of
    4 KB (457 words) - 11:48, 17 June 2020
  • |Title=11th Conference on Decision and Game Theory for Security 2020 Conference on Decision and Game Theory for Security
    3 KB (353 words) - 12:35, 23 June 2020
  • |Title=9th Conference on Decision and Game Theory for Security 2018 Conference on Decision and Game Theory for Security
    3 KB (423 words) - 11:27, 23 June 2020
  • |Title=8th Conference on Decision and Game Theory for Security 2017 Conference on Decision and Game Theory for Security
    3 KB (407 words) - 11:20, 23 June 2020
  • |Title=16th Conference on Web and Internet Economics WINE 2020: The 16th Conference on Web and Internet Economics, December 7-11, 2020, Peking University, Beijing
    2 KB (291 words) - 14:12, 23 June 2020
  • |Title=14th Conference on Web and Internet Economics WINE 2018: The '''14th Conference on Web and Internet Economics''', December 15-17, 2018, University of Oxford, United Kingdom
    5 KB (601 words) - 07:58, 24 June 2020
  • |Title=13th Conference on Web and Internet Economics WINE 2017: The '''13th Conference on Web and Internet Economics''' December 17-20, 2017, Indian Institute of Science, Bangalore,
    3 KB (409 words) - 11:05, 24 June 2020
  • The Internet of Signals * Information forensics and security
    2 KB (219 words) - 11:01, 22 August 2023
  • ...X (everything, things, people, etc.); Internet, Virtualization and Cloud; Internet and Big Data; Sensing and sensor networks; Energy-aware networks; Content-o ...nt and control of high speed networks; Performance in high speed networks; Security aspects in high speed networks; QoS/SLA in high speed networks; Diagnosing
    13 KB (1,636 words) - 11:51, 10 July 2020
  • * Internet Services and Applications * Communications and Information Security
    3 KB (483 words) - 08:08, 21 August 2020
  • Industry 4.0 and Internet of Things (IoT) approaches Intelligent security systems and applications
    5 KB (599 words) - 19:46, 9 July 2020
  • |Acronym=INTERNET 2020 |Title=The Twelfth International Conference on Evolving Internet
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ..."Spectrum Allocation and Management", "Wireless and mobile technologies", "Security in wireless and mobile environment" ...ty devices; Physical vibration virtual keyboard; Tactile and haptic mobile Internet; Commodity WiFi devices; Macro-Femto interference avoidance; Mobile apps an
    11 KB (1,335 words) - 02:28, 10 July 2020
  • ...a systems","Networking and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deploym ...ivate organizations; Cybersecurity risks; Smart home security and privacy; Security awareness; Digital forensics; Large e-Commerce; Digital crowdfunding platfo
    18 KB (2,036 words) - 02:36, 10 July 2020
  • ...on software product line engineering; Software for Cyber-physical systems; Internet-of-Things (IoT)-oriented software; Software for high speed sensing data; Sp ...ased software development; Service-oriented software development; Software security-based development; Aspect-oriented software development
    13 KB (1,573 words) - 12:00, 10 July 2020
  • ...applications; Exascale simulations high performance systems; Simulation of Internet of Vehicle (IoV) systems ...; Methods and tools for system quality prediction; Reliability prediction; Security prediction; Risk prediction; Performance prediction; Uncertainty handling i
    12 KB (1,421 words) - 12:02, 10 July 2020
  • * Internet modelling * Applications in: security, prediction, control, robotics, image and speech signal processing, bioinfo
    3 KB (382 words) - 12:25, 22 July 2020
  • * Internet of Things * IT Security and Digital Forensics
    1 KB (159 words) - 13:38, 29 July 2020
  • * – Security and privacy in joint communication and navigation systems * – Industrial Internet of Things (IIoT)
    2 KB (178 words) - 12:38, 30 July 2020
  • |Title=Twelfth International Conference on Advances in Future Internet |Field=Networking, Internet, Security, Sensor, Hardware, Technologies
    7 KB (904 words) - 12:32, 22 January 2021
  • |Title=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies
    15 KB (1,886 words) - 16:16, 25 August 2020
  • ...ow-cost devices; Ultra-low power devices; Nanosensors; Super-sensors; IoT (internet of Things) devices; Clothes-based sensors; Wearable multi-channel acoustic Environmental sensors; Bridges and civil construction sensors; Security sensors; Surveillance sensors; Space sensors; Image sensors
    9 KB (1,068 words) - 16:15, 25 August 2020
  • ...chronization; Tracking and partial position information; Failure handling; Security and authentication SEMOSN: Security and monitoring of sensor networks
    15 KB (1,880 words) - 14:45, 27 August 2020
  • ...r systems; High-efficiency power amplifiers; Voltage scaling applications; Internet of Things (IoT) devices; Smart building systems; Low-latency arbiters; Feed ...is (Data and DataFlows); CNN Interference systems; Programmable platforms; Security access; Automatic acceleration platforms; Reconfigurable hardware; Clouds F
    8 KB (908 words) - 15:13, 14 January 2021
  • |Field=Networking,Internet,Security,Sensor,Hardware,Technologies ...nts; Evolving software ecosystems; Component semantic similarity analysis; Security variability; Industrial lessons; Customer considerations on post-integratio
    6 KB (769 words) - 14:09, 24 August 2020
  • Green computing and Internet of Things (IoT) Privacy, Safety, and Security in Green-aware Services
    6 KB (815 words) - 20:27, 30 July 2020
  • * E- Business and Internet Computing * Privacy, security, ethical, and social issues
    9 KB (896 words) - 16:31, 6 August 2020
  • ...ocalization, retrieval and archiving; Video techniques for medical images; Internet support for remote medicine; Computer-controlled communications for medical ...onference applications; Real-time aspects in teleconferencing; Privacy and security in teleconference applications; QoS/SLA for teleconferencing applications;
    16 KB (1,964 words) - 13:34, 7 January 2021
  • * Internet Services and Applications * Communications and Information Security
    3 KB (482 words) - 08:25, 21 August 2020
  • * Communications and Information Security * Internet Services and Applications
    3 KB (489 words) - 09:05, 21 August 2020
  • * Communications and Information Security * Internet Services and Applications
    4 KB (604 words) - 09:59, 21 August 2020
  • |Title=8th International Conference on Availability, Reliability, and Security The 8th International Conference on Availability, Reliability and Security (ARES) 2013
    4 KB (468 words) - 11:39, 21 August 2020
  • |Title=9th International Conference on Availability, Reliability and Security The 9th International Conference on Availability, Reliability and Security (ARES) 2014
    4 KB (538 words) - 11:52, 21 August 2020
  • |Title=14th International Conference on Availability, Reliability, and Security The 14th International Conference on Availability, Reliability, and Security (ARES) 2019
    5 KB (627 words) - 10:49, 25 August 2020
  • ...ty of health data to benefit patient and public health safety, privacy and security; Integrating heterogeneous clinical data into central data warehouses; Pati ...engineering of care plans in electronic format; Digital imagery and films; Internet imaging localization and archiving; Personal, adaptive, and content-based i
    16 KB (2,024 words) - 13:33, 24 August 2020
  • # Security and privacy issues # Smart cities and Internet of Things
    3 KB (327 words) - 10:00, 25 August 2020
  • |Title=13th International Conference on Availability, Reliability and Security The 13th International Conference on Availability, Reliability and Security (ARES) 2018
    3 KB (336 words) - 11:20, 25 August 2020
  • |Title=10th International Conference on Availability, Reliability and Security The 10th International Conference on Availability, Reliability and Security (ARES) 2015
    5 KB (590 words) - 11:54, 25 August 2020
  • * Algorithms for information security and privacy * Internet of Things Applications
    4 KB (436 words) - 12:06, 25 August 2020
  • |Title=11th International Conference on Availability, Reliability and Security The 11th International Conference on Availability, Reliability and Security (ARES) 2016
    5 KB (581 words) - 12:47, 25 August 2020
  • | [[IJEB - Spl Issue on Internet Technology 2009]] ||[[:Internet Technology: Emerging Technologies & Applications - A Special Issue of the I ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV]] ||43
    24 KB (2,633 words) - 18:53, 15 October 2020
  • Security and Privacy Internet of Things
    2 KB (246 words) - 15:08, 3 September 2020
  • *Intelligent Systems: Internet, Software, Energy, Hybrid *Database Privacy and Security
    4 KB (447 words) - 12:37, 4 September 2020
  • |Title=13th International Conference on Security and Privacy in Communications Networks Also known as: 13th EAI International Conference on Security and Privacy in Communication Networks (EAI = European Alliance for Innovati
    3 KB (326 words) - 09:35, 10 September 2020
  • |Title=12th International Conference on Security and Privacy in Communications Networks Also known as: 12th EAI International Conference on Security and Privacy in Communication Networks (EAI = European Alliance for Innovati
    3 KB (336 words) - 09:51, 10 September 2020
  • * Intelligent Systems: Internet, Software * Database Privacy and Security
    4 KB (478 words) - 11:05, 11 September 2020
  • * Cyber-physical systems and Internet of Things (IoT) * Privacy, security, trust, and safety management
    3 KB (346 words) - 16:20, 24 September 2020
  • |Title=4th International Conference on Networking, Systems and Security (NSysS) |Field=security
    4 KB (587 words) - 12:07, 5 November 2020
  • communications; Intra-vehicle communications; Vehicle-to-Internet and embedded systems; Internet of Things (IoT) impact on embedded
    10 KB (1,210 words) - 20:17, 22 November 2020
  • High data rates; Ultra fast access of Internet; Full home automation and zones without Internet); Space-IoT (monitoring sensors); Standard
    11 KB (1,377 words) - 20:26, 22 November 2020
  • Deep learning and Internet of Things; Deep learning and Big data; Data Model training, inference, and serving; Trust and security for machine
    9 KB (1,239 words) - 14:37, 29 December 2020
  • software dedicated to Internet of Things; Special requirements for data Software security
    12 KB (1,505 words) - 20:38, 22 November 2020
  • ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking; ...in CLOUD/GRID; User profiles and priorities in CLOUD/GRID; Performance and security in CLOUD/GRID systems; Fault tolerance, resilience, survivability, robustne
    13 KB (1,574 words) - 12:11, 24 November 2020
  • ...achine learning methods; Model training, inference, and serving; Trust and security for machine learning applications; Testing, debugging, and monitoring of ma ...ous systems; Monitoring and control in autonomous systems; Performance and security in autonomous systems; Management of autonomous systems; Testing autonomous
    16 KB (1,874 words) - 12:15, 24 November 2020
  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...databases; Automated prediction of relationships; Linked data streams and Internet of things; Preferred repairs; Parallel-correctness and transferability; Gua
    11 KB (1,360 words) - 18:45, 26 November 2020
  • |Title=The Sixteenth International Conference on Internet Monitoring and Protection - ICIMP 2021, The Sixteenth International Conference on Internet Monitoring and Protection
    17 KB (2,035 words) - 14:45, 18 February 2021
  • ...G and mmWave; Cognitive femtocell networks; ID/locator split in the future Internet; Mobility an named data networking (NDN); Smart sensing networks; Wearable/ ...s; Replication in mobile environments; Middleware for mobile environments; Internet and mobility; Software architecture for mobile applications
    7 KB (868 words) - 15:11, 18 February 2021
  • ...erization-driven scheduling; Data analytics and visualization; HPC in IoT (Internet of Things) systems; Observational data and simulations; Complex scientific ...ualization, and cloud networks; Delay/disruption tolerant networks; Future Internet broadband services; Software Defined Networks (SDN); Fast networks / Infini
    11 KB (1,325 words) - 15:01, 18 February 2021
  • (M2M) and Internet of Things (IoT); Mobile Cloud: WiFi signal-based vibration virtual keyboard; Tactile and haptic mobile Internet;
    12 KB (1,454 words) - 19:21, 30 November 2020
  • |Acronym=INTERNET 2021 |Title=The Thirteenth International Conference on Evolving Internet
    13 KB (1,607 words) - 19:32, 30 November 2020
  • Industry 4.0 and Internet of Things (IoT) approaches Intelligent security systems and applications
    6 KB (682 words) - 19:34, 30 November 2020
  • ...rmation processing; Biometric analysis, forensic analysis watermarking and security; Processing signal, image and video collections; Implementation of signal, ...link); Space observation (backhaul link); Small cells (cover zones without Internet); Space-IoT (monitoring sensors); Standard adaptation to 6G for handoff an
    9 KB (1,125 words) - 10:54, 8 December 2020
  • ...s; Business processes for Internet of Things (IoT); Business processes for Internet of Drons (IoD); Business Big Data analytics; Business models for Mobile env ...tion in Mobile Cloud computing; Cloud quality assessment; Auditability and Security in Cloud-based services; Legacy application in clouds; Protecting business
    8 KB (919 words) - 18:54, 8 December 2020
  • ...ile environments; Adaptive mechanisms in Internet of Things (IoT) and IoD (Internet of Drones); Adaptation in data-centric control; Self-Society; Adaptation in ...social factors involved in trust and adaptation; Applications of trust and security on adaptive systems, with a focus on web-based applications, social network
    8 KB (931 words) - 15:28, 29 December 2020
  • ...achine learning methods; Model training, inference, and serving; Trust and security for machine learning applications; Testing, debugging, and monitoring of ma ...and autonomous agents; Task planning and execution in multi-agent systems; Security, trust, reputation, privacy and safety in agent-based systems; Negotiation
    8 KB (972 words) - 18:55, 8 December 2020
  • ...-driven workflow design and management; Web content performance, accuracy, security, and reliability; Web content modeling; Web content-based applications; (Se ...ces; Digital audio transmission signal processing; Audio transmission over Internet; Audio Multiplexing Transmission Systems; Stereo audio transmission signal;
    13 KB (1,567 words) - 18:56, 8 December 2020
  • ...Service composition and orchestration in the Internet of Things (IoT) and Internet of Drones (IoD) systems; Service composition based on granularity computing ...ons through service composition; Reputation for Service composition in the Internet of Things (IoT)
    10 KB (1,221 words) - 18:57, 8 December 2020
  • routing; Communications modeling; Communications security; Autonomic Assessing Internet traffic on high speed railways; Assessing the
    8 KB (1,012 words) - 10:45, 9 December 2020
  • Interoperability in IoT; Software defined radio (SDR); Internet transmission signal processing; Audio transmission over Internet; Audio
    19 KB (2,346 words) - 10:51, 9 December 2020
  • Internet imaging and multimedia; Multimodal content analysis; Multimedia and security in mobile multimedia; Social and regulatory aspects of
    10 KB (1,212 words) - 14:36, 29 December 2020
  • Web and Internet Computing Mobile Data and Internet
    5 KB (640 words) - 21:39, 17 December 2020
  • |Title=The Sixteenth International Conference on Internet and Web Applications and Services |Field=applications, services, internet, web-based
    15 KB (1,921 words) - 01:00, 12 December 2020
  • ...ems, socio-technical systems, cloud computing, big data, machine learning, security, open source, and sustainability. ...th research and applications on, not exclusively, artificial intelligence, Internet of Things, smart cities, robot ethics and value-based Software Engineering.
    2 KB (240 words) - 14:54, 3 February 2021
  • ...achine learning methods; Model training, inference, and serving; Trust and security for machine learning applications; Testing, debugging, and monitoring of ma ...prediction; Deep Analytics; Big data and cloud technologies; Big data and Internet of Things; High performance computing on Big data; Scalable access to Big D
    9 KB (1,229 words) - 03:37, 3 December 2021
  • * data center and internet-scale systems. * security and practical applications of cryptography,
    2 KB (245 words) - 17:00, 6 January 2021
  • |Title=Thirteenth International Conference on Advances in Future Internet * SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
    2 KB (257 words) - 12:33, 22 January 2021
  • ...on Security, Artificial Intelligence and Modeling for the next generation Internet of Things
    318 bytes (40 words) - 10:35, 28 January 2021
  • ...on Security, Artificial Intelligence and Modeling for the next generation Internet of Things ...on Security, Artificial Intelligence and Modeling for the next generation Internet of Things (SAM IoT) 2020
    6 KB (804 words) - 11:42, 28 January 2021
  • ...rocessing in big and fast data, publish/subscribe, data stream processing, security and encryption in stream processing, rule-based systems, maintenance of mat ...t processing, information-centric networking, software-defined networking, security, reliability and resilience, programmable hardware, energy management and g
    3 KB (344 words) - 15:54, 29 January 2021
  • ...processing, event processing in big and fast data, data stream processing, security and encryption in stream processing, complex event forecasting, in-network ...t processing, information-centric networking, software-defined networking, security, reliability and resilience, distributed ledger and blockchains, programmab
    2 KB (300 words) - 16:01, 29 January 2021
  • ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking; ...in CLOUD/GRID; User profiles and priorities in CLOUD/GRID; Performance and security in CLOUD/GRID systems; Fault tolerance, resilience, survivability, robustne
    13 KB (1,653 words) - 14:44, 10 February 2021
  • ...achine learning methods; Model training, inference, and serving; Trust and security for machine learning applications; Testing, debugging, and monitoring of ma ...ous systems; Monitoring and control in autonomous systems; Performance and security in autonomous systems; Management of autonomous systems; Testing autonomous
    16 KB (1,874 words) - 14:47, 10 February 2021
  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...databases; Automated prediction of relationships; Linked data streams and Internet of things; Preferred repairs; Parallel-correctness and transferability; Gua
    11 KB (1,361 words) - 14:52, 10 February 2021
  • |Title=International Conference on Cryptology and Network Security * • Embedded System Security
    2 KB (197 words) - 17:40, 11 February 2021
  • | {{OR|ACNS}} || International Conference on Applied Cryptography and Network Security || http://www.wikidata.org/entity/Q4781524 | ICoC || CCF Internet Conference of China || https://www.wikidata.org/entity/Q19854299
    19 KB (2,518 words) - 09:03, 21 February 2021
  • * Internet of Things * Internet connectivity and Internet access
    3 KB (291 words) - 11:57, 25 February 2021
  • ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking; ...in CLOUD/GRID; User profiles and priorities in CLOUD/GRID; Performance and security in CLOUD/GRID systems; Fault tolerance, resilience, survivability, robustne
    14 KB (1,718 words) - 11:30, 3 March 2021
  • ...achine learning methods; Model training, inference, and serving; Trust and security for machine learning applications; Testing, debugging, and monitoring of ma ...ous systems; Monitoring and control in autonomous systems; Performance and security in autonomous systems; Management of autonomous systems; Testing autonomous
    16 KB (1,956 words) - 11:50, 3 March 2021
  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...databases; Automated prediction of relationships; Linked data streams and Internet of things; Preferred repairs; Parallel-correctness and transferability; Gua
    12 KB (1,409 words) - 12:01, 3 March 2021
  • * Internet Technology and IP-based Applications * Security, Privacy and Trust
    2 KB (230 words) - 12:18, 4 March 2021
  • Internet-of-Things for Security and Safety
    2 KB (243 words) - 04:39, 11 March 2021
  • ...tions, Communication Theory and Techniques, Wireless Networks, Information Security
    1 KB (178 words) - 11:03, 23 March 2021
  • Internet, Web and Security Visualization
    2 KB (267 words) - 08:31, 26 March 2021
  • * Metrics for the security of embedded systems * FPGA design security
    3 KB (288 words) - 17:03, 7 April 2021
  • |Title=5th International Conference on E-Business and Internet IoS (Internet of Services) plus IoT
    2 KB (217 words) - 11:21, 9 April 2021
  • ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modeling, information credibility) ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modeling, information
    37 KB (5,185 words) - 11:25, 3 August 2023
  • |Title=2021 Workshop on Internet of Things Technologies • IoT and Future Internet Architectures
    2 KB (269 words) - 08:26, 13 April 2021
  • ●Computational Intelligence in Internet of Everything ●Computational Intelligence in Cyber Security
    1 KB (142 words) - 10:22, 11 August 2022
  • ...eless technologies; Interoperability in IoT; Software defined radio (SDR); Internet broadcasting; Mobile broadcasting and mobile TV; Cooperative communications ...ces; Digital audio transmission signal processing; Audio transmission over Internet; Audio Multiplexing Transmission Systems; Stereo audio transmission signal;
    19 KB (2,317 words) - 02:40, 26 November 2021
  • ...link); Space observation (backhaul link); Small cell (cover zones without Internet); Space-IoT (monitoring sensors); Standard adaptation to 6G for handoff and ...trial interference; Fade mitigation techniques; Advanced channel modeling; Security, privacy, and trust; Radio resource management; IT application in Space Com
    11 KB (1,294 words) - 02:42, 26 November 2021
  • ...hicle-to-roadside communications; Intra-vehicle communications; Vehicle-to-Internet communications; Driver-less transportation; Safeness in transportation syst ...tems and embedded computation models; Testing embedded systems; Safety and security in embedded systems; Performance analysis of embedded systems; Mission-crit
    10 KB (1,228 words) - 02:46, 26 November 2021
  • ...munications switching and routing; Communications modeling; Communications security; Computer communications; Distributed communications; Signal processing in New Internet technologies
    6 KB (832 words) - 02:47, 26 November 2021
  • ...ification in software requirements; Requirements for software dedicated to Internet of Things; Special requirements for data centers and cloud applications; Re Software security
    13 KB (1,522 words) - 03:32, 3 December 2021
  • ...; Multimedia extraction and annotation; Content search/browsing/retrieval; Internet imaging and multimedia; Multimodal content analysis; Multimedia abstraction ...and ubiquitous multimedia in ad hoc networks; Personalization, privacy and security in mobile multimedia; Social and regulatory aspects of mobile multimedia; M
    10 KB (1,221 words) - 03:35, 3 December 2021
  • ...munications switching and routing; Communications modeling; Communications security; Autonomic communications; Performance in communications; Computer communic ...; Assessing context correctness for secure mobile collaboration; Assessing security and reliability through linked data in cloud and fog computing; Assessing r
    8 KB (1,021 words) - 03:36, 3 December 2021
  • Information Privacy and Security, Internet of Things,
    4 KB (494 words) - 10:28, 27 September 2022
  • ...ital Electronics, Signals and Systems, Wireless Networks, Network and Data Security, Virtual Reality and Simulation, MIS Management Information System& Network ...unication, Wireless Sensor and Communication Networks, Cloud Computing and Internet of Thing, Mobile Computing and Communication, 5G and 6G Communications, Com
    4 KB (470 words) - 11:06, 27 September 2022
  • * ESCI Journal - Future Internet Special Issue: Network and Information Security: Threats, Vulnerabilities, Detection and Management
    2 KB (214 words) - 05:12, 1 June 2023
  • |Title=13th International Conference on Communication and Network Security * Special Issue - Network and Information Security: Threats, Vulnerabilities, Detection and Management, indexed within Scopus,
    2 KB (288 words) - 05:03, 9 October 2023
  • Network Security Internet of Things Computing
    4 KB (501 words) - 04:15, 20 July 2023
  • * Internet architectures * Internet of Things
    8 KB (1,137 words) - 11:08, 3 August 2023
  • * COMMUNICATION AND INFORMATION SYSTEM SECURITY * NEXT-GENERATION NETWORKING AND INTERNET
    6 KB (935 words) - 11:18, 3 August 2023
  • Security Applications of Big Data, Computational Intelligence in Internet of Everything,
    4 KB (526 words) - 09:06, 23 August 2023
  • Communication and Information Systems Security Next Generation Networking and Internet
    4 KB (550 words) - 05:55, 1 November 2023
  • Future Internet and Network Wireless Security
    5 KB (626 words) - 09:32, 27 February 2024