Search results

Jump to: navigation, search
  • as it was the case of the special tracks presented in AAMAS-08 and - privacy and security
    10 KB (1,371 words) - 16:14, 12 November 2020
  • ...(AINA 2004) will be held in Fukuoka, Kyushu, Japan in March 29 - 31, 2004. It will include sessions on all aspects of theory, design and application of c * Security and Privacy
    12 KB (1,537 words) - 22:19, 10 January 2018
  • ...working and Application will be held in Xi'an, China in March 27-29, 2003. It will include sessions on all aspects of theory, design and application of c * Security and Privacy
    8 KB (1,040 words) - 22:20, 10 January 2018
  • ...ful International Conference on High Performance and Communications(HPCC). It provides a forum for engineers and scientists in academia, industry, and go * Trust, security and privacy
    19 KB (2,503 words) - 13:25, 28 October 2020
  • * Security and privacy in vehicular networks Thanks guys, I just about lost it lokoing for this.
    3 KB (378 words) - 14:22, 24 August 2016
  • ...hing ranging from real-time critical systems to networked infrastructures. It is logical techniques that link implementation and specification through fo - Foundations of security
    5 KB (799 words) - 21:49, 26 February 2020
  • ** Representing and reasoning about trust, privacy, and security ** Luciano Serafini, IT
    6 KB (854 words) - 12:05, 28 May 2016
  • ...en source toolkits such as Giza++ and Moses. This development, exciting as it is, also bears the danger of introducing uniformity into MT research. AMTA ...g. Submissions should focus on the use of MT in a business setting and how it is integrated with other technologies to support business goals.
    16 KB (2,200 words) - 20:51, 18 February 2021
  • ...languages; query optimization; real-time data; recovery; scientific data; security; semantic Web; semi-structured data; spatial data; temporal data; transacti ...lease forms. One author of each accepted paper will be expected to present it at the conference.
    3 KB (457 words) - 13:09, 7 December 2016
  • ...erence in the series, will be held in Turin, Italy, during September 2008. It will continue to advanced applications and issues related to these areas. It will offer the opportunity to extensively discuss requirements,
    4 KB (457 words) - 16:14, 16 December 2020
  • ...throughout the conference. The history of NEW2AN dates back to 1993, today it is an established conference featured by proceedings published by Springer * Network Security
    5 KB (598 words) - 10:18, 29 May 2016
  • ...volvement of industry and academy. Industry involvement is essential since it poses practical and challenging problems for academic researchers. Therefor * Performance, dependability and security evaluation using analytical models, simulation or empirical approaches
    5 KB (660 words) - 16:46, 27 December 2015
  • as well as to help shape the future of IT-transformed + Security, Privacy and Open Source TRACK
    5 KB (594 words) - 16:29, 25 March 2020
  • | Title = The Second IEEE International Workshop on Security in Software Engineering | Field = Computer security and reliability
    5 KB (615 words) - 09:55, 29 May 2016
  • Since the inaugural ICITA successfully held in Australia five years ago, it has been running four times the event in difference countries. Conference l ...as well as on multi-disciplinary studies. The uniqueness of ICITA is that it crosses narrowly defined subject areas and gathers researchers from not onl
    3 KB (427 words) - 17:01, 29 May 2016
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • ...o present their latest research findings in these rapidly changing fields. It * Security and availability issues for current/future computer systems
    3 KB (406 words) - 17:39, 30 September 2016
  • Security and privacy ...hnical call for papers. While the poster need not describe completed work, it should report on research for which at least preliminary results are availa
    6 KB (771 words) - 16:09, 16 September 2019
  • - Checking or improving the safety, security, or correctness of programs ...ng to the ACM proceedings format. These 10 pages include everything (i.e., it is the total length of the paper). The program chair will reject papers tha
    5 KB (667 words) - 14:18, 25 November 2016
  • * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main
    5 KB (656 words) - 11:29, 27 August 2020
  • * Security ...ng to the ACM proceedings format. These 10 pages include everything (i.e., it is the total length of the paper). The program chair will reject papers tha
    5 KB (678 words) - 20:58, 26 November 2016
  • it several times. Please, pass the information to whom it may benefit. Thank * foundations of security
    6 KB (682 words) - 10:18, 14 April 2020
  • - security in distributed computing, cryptographic protocols ...he paper. The program committee may decline to make the award or may split it.
    6 KB (766 words) - 13:19, 28 November 2016
  • * Linkage between IT services and business services; * Web services security and privacy;
    3 KB (356 words) - 15:56, 15 February 2017
  • ...r computing; Grid computing; Pervasive and mobile computing architectures; Security in networks and distributed systems Be aware that you won't be able to delete or modify your paper once it is uploaded. Nobody but authorized members of the organisation board will b
    4 KB (490 words) - 17:05, 27 December 2015
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • ...uman networking with the use of wearable and implantable wireless sensors. It encompasses wireless body area network, wireless sensor network, and wirele o Security and privacy issues of UWB-based body-centric networking for personal health
    5 KB (664 words) - 17:20, 5 July 2020
  • construction of high quality computational systems. It is now a - Models of concurrency, security and mobility;
    7 KB (1,094 words) - 11:42, 29 September 2016
  • ...ns about all aspects of parallel and distributed computing and networking. It will feature session presentations, workshops, tutorials and keynote speech · Reliability, fault-tolerance, and security
    8 KB (1,050 words) - 18:04, 5 January 2017
  • ...round seems necessary for sensor networks to achieve their full potential. It is a challenge for abstract modeling, algorithmic design and analysis to ac * Cryptography, Security and trust
    6 KB (750 words) - 16:50, 27 December 2015
  • * Business, IT People and System Responsibilities * IT Governance
    4 KB (571 words) - 12:58, 9 March 2020
  • ...t has become a key concern both from a social and political point of view. It is critical to provide rescue personnel with information technology tools t * Security issues in agent-based systems for search and rescue missions, use of games,
    6 KB (783 words) - 17:04, 27 December 2015
  • * Network Security Submission of papers to COMSNETS 2010 carries with it the implied agreement that one or more of the listed authors will attend th
    7 KB (1,054 words) - 16:43, 27 December 2015
  • ...ssion instructions for details. A poster need not describe completed work; it should report on research for which at least preliminary results are availa - Security
    8 KB (1,119 words) - 09:57, 27 February 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    14 KB (1,651 words) - 15:56, 15 February 2017
  • - Business-IT Alignment - Security and Privacy
    3 KB (392 words) - 13:50, 30 April 2020
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • ...nformation, IS effectiveness requires going beyond the syntactic nature of IT and delve into the human functions involved in the semantic, pragmatic and * Information security
    3 KB (380 words) - 15:10, 1 October 2020
  • |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress
    2 KB (217 words) - 16:50, 19 November 2020
  • * Theory of Security in Networks According to the ICALP policy, for every accepted paper it is required that at least one author attends the meeting and delivers the t
    4 KB (602 words) - 06:44, 26 August 2020
  • * IT governance * Privacy, security, trust, and safety management
    3 KB (395 words) - 15:14, 24 September 2020
  • ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)
    2 KB (298 words) - 16:47, 5 July 2020
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • ...ance the state-of-the-art and practical applications of computer networks. It provides a publication vehicle for complete coverage of all topics of inter • Network Security and Privacy • Network Services and Applications
    3 KB (318 words) - 16:46, 5 July 2020
  • |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (217 words) - 16:57, 27 December 2015
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev
    3 KB (462 words) - 11:51, 22 March 2020
  • − Information Security and Applied Cryptography. ...ferences. The paper should not exceed twelve pages and should be edited so it can be properly printed on letter size paper.
    3 KB (367 words) - 16:37, 27 December 2015
  • ...ivilization that can resolve the conflict of civilizations, and how should it be discussed? 4-1-2. Is it possible to envisage the evolution or development of ethics?
    10 KB (1,552 words) - 17:04, 24 February 2016
  • ...range of audiences over large numbers of geographically dispersed people. It is evident that the satellite will play a complementary, but essential, rol - Security related issues of satellite communications
    9 KB (1,218 words) - 16:06, 1 October 2020
  • indexes so that it can be assessed easily. Revised and expanded version of the The 2012 International Conference of Information Security and Internet Engineering
    7 KB (909 words) - 16:30, 10 September 2020
  • ...ple. It is time to ask: can the Web be reimagined for the public good? Can it be made more human-centric, and if so, how? ...rity & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and trust for Web access; false news; data for the public good; and crime o
    6 KB (910 words) - 12:04, 31 January 2020
  • *Models to Support IT Management *Cyber Security and Privacy
    5 KB (663 words) - 11:49, 18 February 2020
  • * Trust, Data Privacy, and Security with Semantic Technologies ...ces. Each submission will be reviewed by several PC members who will judge it based on its innovativeness, appropriateness, and impact of results in term
    6 KB (872 words) - 14:00, 22 February 2020
  • • Information and data governance, information assurance, security, compliance • Role of mutual impact of society on/by IT (with focus on ontologies and databases)
    6 KB (872 words) - 23:11, 24 February 2020
  • ...st is a metropolitan region south of Brisbane on Australia’s east coast. It's famed for its long sandy beaches, surfing spots and elaborate system of i * Trust, privacy, and security on the Semantic Web
    5 KB (663 words) - 14:34, 5 December 2018
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • indexes so that it can be assessed easily. Revised and expanded version of the The 2013 International Conference of Information Security and Internet Engineering
    7 KB (903 words) - 16:27, 10 September 2020
  • |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".
    6 KB (801 words) - 11:04, 14 April 2020
  • |Homepage=https://www.caise19.it/ ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness.
    3 KB (375 words) - 15:06, 24 September 2020
  • ...nformation, IS effectiveness requires going beyond the syntactic nature of IT and delve into the human functions involved in the semantic, pragmatic and Information security
    3 KB (441 words) - 14:52, 1 October 2020
  • ...huyLoi University and held from 07 to 09 November 2016 in Ha Noi, Vietnam. It continues to offer an opportunity for researchers and innovators to discuss ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.
    3 KB (422 words) - 12:09, 24 April 2016
  • * Semantics for IT Safety & Security * Safety & Security
    10 KB (1,347 words) - 15:01, 26 September 2016
  • * Trust, security, and privacy ...research approach and results during the poster session of the conference. It is great for discussing your research in free form with all attendants of t
    6 KB (898 words) - 14:42, 24 September 2016
  • ...posal, its appeal to a viable fraction of the Web community as well as how it fits in with the conference. Topics of interest include, but are not restri * Web Security and Trust Management
    2 KB (230 words) - 00:37, 28 May 2016
  • * Information and data governance, information assurance, security, compliance * Role of mutual impact of society on/by IT (with focus on ontologies and databases)
    6 KB (877 words) - 23:06, 24 February 2020
  • |Field=information security, hacking, it security
    386 bytes (48 words) - 16:18, 8 July 2016
  • ...rnational Conference on Semantic Technology for Intelligence, Defense, and Security ...chnology and ontology relevant to the fields of Intelligence, Defense, and Security. We are especially interested in papers on the following topics:
    4 KB (506 words) - 11:39, 8 October 2020
  • knowledge management and databases. Since 1992, it has successfully brought - Security and Privacy
    12 KB (1,565 words) - 04:15, 5 August 2023
  • - Security and Data Protection ...t your research paper at http://worldconedu.org/paper-submission/ or email it to papers-2016@worldconedu.org
    6 KB (777 words) - 23:29, 29 July 2016
  • Modern society is a networked society permeated by information technology (IT), which defines ECIS 2015's Conference Theme. Networks - perceived as a gro * Methods, Tools and Human Factors in IS/IT Management
    3 KB (434 words) - 10:28, 26 July 2016
  • * IT Implementation, Adoption and Use * Security and Privacy of Information and IS
    2 KB (263 words) - 10:32, 26 July 2016
  • ...Computing based on Semantics (“meaning”, "context", “intention”). It addresses all types of resources including data, document, tool, device, pr Use of Semantics in IT Applications
    5 KB (580 words) - 20:22, 28 January 2017
  • ...ablished itself as the world's premier research conference in data mining. It provides an international forum for presentation of original research resul - Security, privacy and social impact of data mining
    3 KB (407 words) - 10:17, 27 July 2016
  • - Internet security - Globalisation and developmental IT
    5 KB (641 words) - 22:32, 29 July 2016
  • ...brating the achievements of artificial intelligence research and practice. It is a highly referenced conference that will provide authors with useful cri ...pers on AI techniques in the context of novel application domains, such as security, sustainability, health care, transportation, and commerce. A special theme
    10 KB (1,466 words) - 15:17, 7 March 2021
  • * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main
    4 KB (528 words) - 11:25, 26 June 2020
  • * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main
    4 KB (490 words) - 11:42, 26 June 2020
  • ...ry, it grew as well renowned event of the scientific community. Every year it joins international researchers for scientific discussions on the developme * security and privacy
    9 KB (1,190 words) - 10:12, 5 June 2019
  • ...tors, practitioners, researchers and scientists in the development arenas. It aims to provide discussions and simulations in the communication technology Communication Security, Trust, Protocols and Applications
    5 KB (588 words) - 18:00, 21 January 2017
  • - Smart city IT connectivity management - Smart city system security and privacy
    4 KB (565 words) - 09:46, 7 February 2017
  • Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin ...(seventh edition) will be held at Luton, UK during August 16-18, 2017 and it offers the opportunity for institutes, research centers, engineers, scienti
    5 KB (631 words) - 15:09, 10 April 2017
  • * Trust, security, and privacy ...research approach and results during the poster session of the conference. It is great for discussing your research in free form with all attendants of t
    7 KB (988 words) - 09:50, 14 August 2019
  • ...ry, it grew as well renowned event of the scientific community. Every year it joins international researchers for scientific discussions on the developme *security and privacy
    10 KB (1,309 words) - 10:29, 5 June 2019
  • ...S is a series of peer-reviewed International Computer Science conferences. It is a forum for researchers and practitioners to present their state-of-the- *Web Security, Integrity, Privacy, and Trust
    18 KB (2,394 words) - 16:28, 29 January 2018
  • * IT policy and business management * Security and Information Assurance
    10 KB (1,396 words) - 13:30, 28 July 2017
  • ...Kumar Das, Calcutta Institute of Engineering and Management, IndiaBai Li, IT Technical Analyst, AustraliaBhupendra Gupta, Indian Institute of Informatio
    3 KB (403 words) - 09:15, 12 July 2017
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • * IT policy and business management * Security and Information Assurance
    5 KB (679 words) - 13:28, 28 July 2017
  • *Semantics for Safety, Security & Privacy *Semantics for IT Safety & Security
    6 KB (759 words) - 15:52, 5 December 2018
  • IT-driven collaborations. The conference is nevertheless not about the union o Emerging Enterprise Technologies are profoundly changing the way we think of IT
    7 KB (1,009 words) - 13:39, 3 September 2017
  • Research, Development, and Application. And it will be held in Shanghai, China, Security Applications of Big Data
    3 KB (461 words) - 13:22, 3 September 2017
  • |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)
    4 KB (562 words) - 12:05, 3 September 2017
  • * Security and Information Assurance & IT) [http://airccse.org/cscp.html] series (Confirmed).
    5 KB (651 words) - 11:34, 8 August 2017
  • * Internet, Web and Security Visualization ...cientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, auth
    5 KB (615 words) - 10:58, 15 May 2020
  • It is one of the leading international conferences for presenting novel and Network and Data Security
    5 KB (673 words) - 09:53, 3 September 2017
  • - Security and privacy, cryptographic protocols in a journal or conference with published proceedings. It should not be
    7 KB (1,009 words) - 15:54, 3 September 2019
  • presentation of recent original work and it is an opportunity for students and Databases; Security and Cryptography; Operating Systems; Networks, Distributed
    3 KB (438 words) - 11:45, 8 August 2017
  • |Title=SPDF-Mobile 2017 : Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security
    4 KB (536 words) - 09:59, 21 August 2017
  • Physical layer security As more information becomes available, it will be published at the RTUWO'17
    3 KB (415 words) - 13:30, 28 July 2017
  • ComSoc organized in Latin America. It has attracted authors and attendees from - Service Security and Privacy
    6 KB (873 words) - 13:30, 28 July 2017
  • only created a new trend in online education, it also has been adopted by a - Security and accreditation models.
    3 KB (407 words) - 11:52, 8 August 2017
  • user-efficiency. Due to the growth in IT, individuals and organizations informatics to solve privacy, security, healthcare, education, poverty, and
    4 KB (570 words) - 13:30, 28 July 2017
  • - IT Architecture and Security
    1 KB (136 words) - 11:52, 8 August 2017
  • knowledge in their areas of interest. It aims to promote activities in research, - Information Security & Risk Management
    6 KB (814 words) - 09:03, 3 September 2017
  • It is on the verge of transforming our lives, providing a more convenient and Security and privacy in heterogeneous IoT
    4 KB (483 words) - 10:00, 21 August 2017
  • |Field=security Wireless Networks, Data Communication Technologies, and Network Security. The
    4 KB (486 words) - 11:57, 8 August 2017
  • |Field=security Wireless Networks, Data communication Technologies, and Network Security. The
    4 KB (546 words) - 11:35, 8 August 2017
  • |Title=DMCS 2017 : DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17) |Field=security
    4 KB (626 words) - 09:30, 3 September 2017
  • ...: ACM--2017 the 7th International Conference on Communication and Network Security (ICCNS 2017)--SCOPUS, Ei Compendex |Field=network security
    2 KB (216 words) - 13:34, 28 July 2017
  • * Security and Privacy * IT Policy and Business Management
    5 KB (589 words) - 11:46, 8 August 2017
  • - Security and Privacy - Security
    8 KB (1,150 words) - 10:11, 7 August 2019
  • of the educational and research staff. In this frame it can be seen as a mirror Industrial Electronics, Information Security, Information Theory,
    4 KB (554 words) - 13:19, 28 July 2017
  • ...al ventures — indeed all those who are passionate about the Web and what it has to offer. * Security and Privacy on the Web
    12 KB (1,422 words) - 10:18, 5 October 2023
  • questions of peace, security and human security abound. In this period of great the Pacific islands before it attracted the attention of Pacific and Asian
    7 KB (1,000 words) - 12:07, 3 September 2017
  • * Cryptography, Security and Privacy of Mobile & Wireless Networks & IT) [http://airccse.org/cscp.html] series (Confirmed).
    5 KB (616 words) - 13:19, 28 July 2017
  • are still open for research. Hence, it is time to face new service-oriented -Security and privacy for SOCA
    4 KB (494 words) - 13:20, 28 July 2017
  • • Safety & Security fair. With 30,000 visitors, it has been an international professional meeting
    2 KB (298 words) - 09:59, 21 August 2017
  • |Acronym=Technologies for Security of EHR 2017 |Title=Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Cha
    5 KB (650 words) - 13:24, 28 July 2017
  • using IT, will arise from the conference. Papers describing advanced prototypes, - Security
    6 KB (818 words) - 13:40, 3 September 2017
  • |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security
    4 KB (565 words) - 17:27, 18 February 2021
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security
    5 KB (611 words) - 11:47, 8 August 2017
  • |Field=security benefits well beyond IT cost savings. Yet, many business leaders are concerned
    6 KB (799 words) - 13:28, 28 July 2017
  • |Field=security vehicles, robots and so on. It is thought that this will greatly improve the
    4 KB (500 words) - 09:56, 21 August 2017
  • ...yberIoT 2017 : Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal |Field=security
    4 KB (547 words) - 09:58, 21 August 2017
  • ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security
    8 KB (1,170 words) - 13:40, 3 September 2017
  • Green Computing is nowadays one of the major challenges for most IT - Security and Privacy
    6 KB (825 words) - 13:22, 3 September 2017
  • *security, access control, and licensing issues of Linked Data ...ish your article on the Web, and send us the URL. You are welcome to share it via community chat. There are a variety of examples in the wild. See the Li
    6 KB (926 words) - 17:55, 9 January 2018
  • |Field=security able to reach the crown-jewels and you have do it in a way that makes your
    1 KB (166 words) - 12:41, 20 October 2017
  • |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security The WCICSS-2017 is a meeting point for professionals and researchers, IT
    5 KB (571 words) - 10:51, 3 September 2017
  • * IT Policy and Business Management * Security and Information Assurance
    4 KB (478 words) - 08:48, 16 May 2020
  • patents, experimental data, etc. It also encompasses various scholarly related and applied research (e.g. platforms and applications). It will encourage the
    4 KB (566 words) - 10:00, 21 August 2017
  • - Security, compliance, and nonfunctional properties Position papers should draft a new idea and put it up for discussion at the workshop. Position papers should only be an extend
    7 KB (910 words) - 10:36, 26 November 2017
  • - Security, compliance, and non-functional requirements and properties Position papers should draft a new idea and put it up for discussion at the workshop. Position papers should only be an extend
    4 KB (565 words) - 18:34, 4 July 2020
  • - Security, compliance, and nonfunctional properties Positions papers: Position papers should draft a new idea and put it up for
    7 KB (1,046 words) - 10:36, 26 November 2017
  • ...obile computing, search engine, question answering, robotics, web service, security and privacy
    12 KB (1,578 words) - 14:54, 24 September 2020
  • ...nce will feature research talks, tutorials, demonstrations, and workshops. It will cover issues in data management, database and information systems rese Privacy and Security in Data Management.
    6 KB (826 words) - 09:45, 19 February 2021
  • ...nter its limitations. Every year, SEMANTiCS attracts information managers, IT-architects, software engineers and researchers from a wide spectrum of orga ...addresses problems common among information managers, software engineers, IT-architects and various specialist departments working to develop, implement
    11 KB (1,487 words) - 13:45, 13 May 2019
  • *A Maturity Model for IT-related Security Incident Management *Stress-Sensitive IT-Systems at Work: Insights from an Empirical Investigation
    7 KB (917 words) - 18:07, 17 March 2020
  • ...Madrid, Spain, for the first time. Madrid is the capital City of Spain and it gathers a thrilling mix of antique and modern cultures that is reflected i *Security, Privacy and Reliability
    2 KB (288 words) - 09:18, 6 June 2019
  • ​Use of Semantics in IT Applications * security and privacy
    2 KB (238 words) - 18:42, 7 March 2020
  • * Security and privacy in mobile systems ...cepted) at a workshop at least 6 months before our submission date and (2) it adds significant new contributions over the previous paper. Authors uncerta
    5 KB (759 words) - 15:21, 18 June 2020
  • |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
    11 KB (1,549 words) - 11:34, 17 April 2020
  • |Title=39th International Conference on Computer Safety, Reliability and Security The 39th International Conference on Computer Safety, Reliability and Security ( SafeComp)
    5 KB (617 words) - 11:54, 19 June 2020
  • * Simulation infrastructure and security issues for large scale distributed and/or cloud-based modeling and simulati * Integration of simulation with other IT systems, methods, and developments including simulation based decision-maki
    3 KB (457 words) - 08:25, 17 April 2020
  • |Title=17th International Conference on Trust, Privacy and Security in Digital Business ...se developments ultimately aim at improving our quality of life, at making it easier to generate wealth, and at ensuring that businesses remain competiti
    5 KB (690 words) - 12:02, 26 March 2020
  • * Security and privacy in mobile systems ...cepted) at a workshop at least 6 months before our submission date and (2) it adds significant new contributions over the previous paper. Authors uncerta
    5 KB (732 words) - 15:22, 18 June 2020
  • * Security and privacy in mobile systems ...version of a published, not just accepted, workshop paper is encouraged if it includes significant new contributions.
    6 KB (944 words) - 15:24, 18 June 2020
  • * Security and privacy in mobile systems ...cepted) at a workshop at least 6 months before our submission date and (2) it adds significant new contributions over the previous paper. Authors uncerta
    5 KB (721 words) - 10:07, 17 August 2023
  • ...and web-based applications, embedded and resource-limited computation, and security. ...wers come to an initial judgment about the paper without bias, not to make it impossible for them to discover the authors if they were to try. Nothing sh
    7 KB (1,057 words) - 10:13, 17 April 2020
  • ...and web-based applications, embedded and resource-limited computation, and security. ...wers come to an initial judgment about the paper without bias, not to make it impossible for them to discover the authors if they were to try. Nothing sh
    8 KB (1,080 words) - 10:43, 17 April 2020
  • ...he Tenth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies ...he Tenth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies
    10 KB (1,331 words) - 14:52, 19 April 2020
  • ...en science, open education, wikis and related social media, Wikipedia, and IT-driven open innovation research. ...ities, and everyone interested in understanding open collaboration and how it is changing the world.
    6 KB (748 words) - 10:02, 30 April 2020
  • safety and security for mobile MAS deployment security and trust in multi-agent systems
    8 KB (1,092 words) - 12:49, 22 April 2020
  • Due to the COVID-19 pandemic, it is with a great sense of responsibility that we have decided to move the ac * Control Architectures - Security
    3 KB (454 words) - 14:16, 27 April 2020
  • ...Design districts and just minutes from the Miami Beach Convention Center. It is the only marina-front downtown hotel with incredible bay views. ICUAS'17 * Security
    3 KB (385 words) - 15:55, 29 April 2020
  • ...and provides a forum for the latest R&D results in academia and industry. It is a combination of the 51st Summer Computer Simulation (SCSC) and the 22nd * - Security in Computer and Telecommunication Systems
    5 KB (640 words) - 13:03, 5 May 2020
  • ...onics, IoT, virtual reality, autonomous driving, robotics, and many more). It is difficult to clearly envision the way forward ...ultimedia, machine-learning, deep-learning, neuromorphism, cryptographics, security and trusted computing, special-function acceleration, processing-in-memory;
    6 KB (673 words) - 09:29, 6 May 2020
  • ...ain connections and support networks that otherwise would not be possible; it provides the ability to access information instantaneously and from any loc ...eshold and Near-threshold circuits; Circuits for neuro-computing; Hardware-security circuits including PUFs, TRNGs, crypto-circuits, side-channel-attacks mitig
    5 KB (629 words) - 09:36, 6 May 2020
  • ...earch into technologies for electronic and (embedded) systems engineering. It covers the design process, test, and tools for design automation of electro ...x effects, which must be controlled to adhere to safety, availability, and security guarantees where needed. This special day will cover the latest trends in a
    12 KB (1,651 words) - 13:30, 27 November 2020
  • ...and dynamic power, power and clock distribution, yield, manufacturability, security, reliability, and testability. ...gns on FPGAs establishing state-of-the-art in high-performance, low-power, security, or high-reliability. Designs leveraging unique capabilities of FPGA archit
    11 KB (1,541 words) - 15:35, 18 June 2020
  • * Internet, Web and Security Visualization ...cientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, auth
    5 KB (630 words) - 10:01, 15 May 2020
  • * Internet, Web and Security Visualization ...cientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, auth
    6 KB (735 words) - 11:44, 15 May 2020
  • ...2020) will continue the success of the previous IEEE Big Data conferences. It will provide a leading forum for disseminating the latest results in Big Da * Visualizing Large Scale Security Data
    9 KB (1,187 words) - 14:18, 27 May 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    17 KB (2,088 words) - 12:49, 14 June 2020
  • |Title=36th International Conference on Computer Safety, Reliability, and Security ...l Committee 7 on Reliability, Safety and Security (EWICS TC7). Since then, it has contributed to the progress of the state-of-the-art in dependable appli
    4 KB (457 words) - 11:48, 17 June 2020
  • '''Use of Semantics in IT Applications''' * security and privacy
    4 KB (529 words) - 11:04, 17 June 2020
  • * T06 Defence and security It is highly recommended, and mandatory if you choose to publish your paper in
    6 KB (885 words) - 12:35, 22 June 2020
  • * Communications and Information Security It is required that the manuscript follows the standard IEEE camera-ready form
    3 KB (483 words) - 08:08, 21 August 2020
  • * Theory of Security in Networks It is imperative that if a paper is accepted then at least one of the authors
    4 KB (556 words) - 06:42, 26 August 2020
  • * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main
    4 KB (525 words) - 11:27, 27 August 2020
  • * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main
    4 KB (537 words) - 14:06, 27 August 2020
  • ...the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to * Software security and trust; data privacy
    5 KB (557 words) - 07:07, 13 July 2020
  • ...a systems","Networking and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deploym ...ivate organizations; Cybersecurity risks; Smart home security and privacy; Security awareness; Digital forensics; Large e-Commerce; Digital crowdfunding platfo
    18 KB (2,036 words) - 02:36, 10 July 2020
  • ...systems; Cross-hospital resource management systems; Nurse challenges with IT and electronic medical records; Clinical personal self-management; Care con ...ical systems; Scalability evaluation; Mobile clouds in medical scenarios ; Security of medical systems; Privacy for wired and wireless medical devices
    8 KB (970 words) - 16:50, 14 July 2020
  • * IT Security and Digital Forensics
    1 KB (159 words) - 13:38, 29 July 2020
  • |Title=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies
    15 KB (1,886 words) - 16:16, 25 August 2020
  • ...VNC)''' is the premiere conference on vehicular networks and applications. It brings together researchers, professionals, and practitioners to share the ** Security, privacy, liability, and dependability of vehicular networks
    4 KB (493 words) - 23:17, 12 October 2020
  • * Green IT and Green Organization * Privacy, security, ethical, and social issues
    9 KB (896 words) - 16:31, 6 August 2020
  • * Communications and Information Security It is required that the manuscript follows the standard IEEE camera-ready form
    3 KB (482 words) - 08:25, 21 August 2020
  • * Communications and Information Security It is required that the manuscript follows the standard IEEE camera-ready form
    3 KB (489 words) - 09:05, 21 August 2020
  • * Communications and Information Security It is required that the manuscript follows the standard IEEE camera-ready form
    4 KB (604 words) - 09:59, 21 August 2020
  • ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV]] ||43 | [[IEEE Symposium on Security and Privacy 2018]] ||[[:39th IEEE Symposium on Security and Privacy]] ||43
    24 KB (2,633 words) - 18:53, 15 October 2020
  • * IT governance * Privacy, security, trust, and safety management
    3 KB (346 words) - 16:20, 24 September 2020
  • |Title=4th International Conference on Networking, Systems and Security (NSysS) |Field=security
    4 KB (587 words) - 12:07, 5 November 2020
  • embedded systems; Safety and security in embedded systems; Performance Security and protection systems
    10 KB (1,210 words) - 20:17, 22 November 2020
  • modeling; Security, privacy, and trust; Radio resource management; IT
    11 KB (1,377 words) - 20:26, 22 November 2020
  • Software sustainability for green IT; Energy consumption and e-waste Software security
    12 KB (1,505 words) - 20:38, 22 November 2020
  • ...Eleventh International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies |Field=Smart Grids, Green Communications and IT Energy-aware Technologies
    10 KB (1,235 words) - 18:42, 26 November 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    17 KB (2,035 words) - 14:45, 18 February 2021
  • ...agement; Scale enterprise computing; Data processing in encrypted domains; Security-intelligent lifecycle management; Portability of SOA applications; Multi-te ...tion in Mobile Cloud computing; Cloud quality assessment; Auditability and Security in Cloud-based services; Legacy application in clouds; Protecting business
    8 KB (919 words) - 18:54, 8 December 2020
  • |Title=1st Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of T The 1st Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of T
    6 KB (804 words) - 11:42, 28 January 2021
  • ...Eleventh International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies |Field=Smart Grids, Green Communications and IT Energy-aware Technologies
    10 KB (1,237 words) - 14:50, 10 February 2021
  • ...Eleventh International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies ...ges, Advanced IT energy-aware technologies, Challenges in Smart Grids and IT-energy aware technologies
    10 KB (1,277 words) - 11:56, 3 March 2021
  • Design Theory for Wellness Using IT Internet-of-Things for Security and Safety
    2 KB (243 words) - 04:39, 11 March 2021
  • ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modeling, information credibility) It is not allowed to submit papers that are identical (or substantially simila
    37 KB (5,185 words) - 11:25, 3 August 2023
  • Cyber-security, Privacy and Ethics of IS Network security and privacy
    2 KB (240 words) - 09:51, 13 April 2021
  • * security It is expected that the full version of each submitted paper should be ready a
    3 KB (425 words) - 14:12, 22 April 2021
  • ...channel modeling; Security, privacy, and trust; Radio resource management; IT application in Space Communications; Standards activities
    11 KB (1,294 words) - 02:42, 26 November 2021
  • ...tems and embedded computation models; Testing embedded systems; Safety and security in embedded systems; Performance analysis of embedded systems; Mission-crit Security and protection systems
    10 KB (1,228 words) - 02:46, 26 November 2021
  • ...tainability, context-awareness, agility; Software sustainability for green IT; Energy consumption and e-waste from computers during software upgrades; Go Software security
    13 KB (1,522 words) - 03:32, 3 December 2021
  • * Security, privacy, liability, and dependability of vehicular networks ...er will either be accepted in the category where it has been submitted, or it will be rejected (in particular: full papers will not be "downgraded" to sh
    6 KB (871 words) - 10:16, 31 January 2023
  • |Title=International Conference on Cyber Security and Information Engineering |Field=Cyber Security, Information Engineering
    4 KB (517 words) - 04:36, 29 June 2023
  • * Network security and privacy ...ide consent that their submissions may be subject to an early rejection if it is found to have more than 30% overlap with a single paper available to the
    8 KB (1,137 words) - 11:08, 3 August 2023
  • ...thriving city of Kuala Lumpur, Malaysia, from December 4th to 8th, making it the first time that the conference is being organized in this location. The * COMMUNICATION AND INFORMATION SYSTEM SECURITY
    6 KB (935 words) - 11:18, 3 August 2023
  • ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modeling, information credibility) It is not allowed to submit papers that are identical (or substantially simila
    7 KB (951 words) - 04:25, 5 September 2023
  • ...of information retrieval, knowledge management and databases. Since 1992, it has successfully brought together leading researchers and developers from t Authorization, data privacy and security
    5 KB (690 words) - 13:23, 14 August 2023
  • ...e their ideas face to face. The conference will be held every year to make it an ideal platform for people to share views and experiences in Big Data, Co Security Applications of Big Data,
    4 KB (526 words) - 09:06, 23 August 2023
  • ...echnology (CNCIT 2024) will be held in Xi'an, China during June 7-9, 2024. It is sponsored by The International Society for Applied Computing (ISAC) and Wireless Security
    5 KB (626 words) - 09:32, 27 February 2024
  • ☆ International Journal of Sustainable Energy. It is abstracted and indexed in ESCI, Scopus (Citescore 2021: 4.5), EBSCO, and Energy storage and cyber security for smart grids
    2 KB (285 words) - 08:45, 9 April 2024