Search results
Create the page "It security" on this wiki! See also the search results found.
- as it was the case of the special tracks presented in AAMAS-08 and - privacy and security10 KB (1,371 words) - 16:14, 12 November 2020
- ...(AINA 2004) will be held in Fukuoka, Kyushu, Japan in March 29 - 31, 2004. It will include sessions on all aspects of theory, design and application of c * Security and Privacy12 KB (1,537 words) - 22:19, 10 January 2018
- ...working and Application will be held in Xi'an, China in March 27-29, 2003. It will include sessions on all aspects of theory, design and application of c * Security and Privacy8 KB (1,040 words) - 22:20, 10 January 2018
- ...ful International Conference on High Performance and Communications(HPCC). It provides a forum for engineers and scientists in academia, industry, and go * Trust, security and privacy19 KB (2,503 words) - 13:25, 28 October 2020
- * Security and privacy in vehicular networks Thanks guys, I just about lost it lokoing for this.3 KB (378 words) - 14:22, 24 August 2016
- ...hing ranging from real-time critical systems to networked infrastructures. It is logical techniques that link implementation and specification through fo - Foundations of security5 KB (799 words) - 21:49, 26 February 2020
- ** Representing and reasoning about trust, privacy, and security ** Luciano Serafini, IT6 KB (854 words) - 12:05, 28 May 2016
- ...en source toolkits such as Giza++ and Moses. This development, exciting as it is, also bears the danger of introducing uniformity into MT research. AMTA ...g. Submissions should focus on the use of MT in a business setting and how it is integrated with other technologies to support business goals.16 KB (2,200 words) - 20:51, 18 February 2021
- ...languages; query optimization; real-time data; recovery; scientific data; security; semantic Web; semi-structured data; spatial data; temporal data; transacti ...lease forms. One author of each accepted paper will be expected to present it at the conference.3 KB (457 words) - 13:09, 7 December 2016
- ...erence in the series, will be held in Turin, Italy, during September 2008. It will continue to advanced applications and issues related to these areas. It will offer the opportunity to extensively discuss requirements,4 KB (457 words) - 16:14, 16 December 2020
- ...throughout the conference. The history of NEW2AN dates back to 1993, today it is an established conference featured by proceedings published by Springer * Network Security5 KB (598 words) - 10:18, 29 May 2016
- ...volvement of industry and academy. Industry involvement is essential since it poses practical and challenging problems for academic researchers. Therefor * Performance, dependability and security evaluation using analytical models, simulation or empirical approaches5 KB (660 words) - 16:46, 27 December 2015
- as well as to help shape the future of IT-transformed + Security, Privacy and Open Source TRACK5 KB (594 words) - 16:29, 25 March 2020
- | Title = The Second IEEE International Workshop on Security in Software Engineering | Field = Computer security and reliability5 KB (615 words) - 09:55, 29 May 2016
- Since the inaugural ICITA successfully held in Australia five years ago, it has been running four times the event in difference countries. Conference l ...as well as on multi-disciplinary studies. The uniqueness of ICITA is that it crosses narrowly defined subject areas and gathers researchers from not onl3 KB (427 words) - 17:01, 29 May 2016
- |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability4 KB (487 words) - 10:42, 21 August 2020
- |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability6 KB (689 words) - 10:39, 21 August 2020
- ...o present their latest research findings in these rapidly changing fields. It * Security and availability issues for current/future computer systems3 KB (406 words) - 17:39, 30 September 2016
- Security and privacy ...hnical call for papers. While the poster need not describe completed work, it should report on research for which at least preliminary results are availa6 KB (771 words) - 16:09, 16 September 2019
- - Checking or improving the safety, security, or correctness of programs ...ng to the ACM proceedings format. These 10 pages include everything (i.e., it is the total length of the paper). The program chair will reject papers tha5 KB (667 words) - 14:18, 25 November 2016
- * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main5 KB (656 words) - 11:29, 27 August 2020
- * Security ...ng to the ACM proceedings format. These 10 pages include everything (i.e., it is the total length of the paper). The program chair will reject papers tha5 KB (678 words) - 20:58, 26 November 2016
- it several times. Please, pass the information to whom it may benefit. Thank * foundations of security6 KB (682 words) - 10:18, 14 April 2020
- - security in distributed computing, cryptographic protocols ...he paper. The program committee may decline to make the award or may split it.6 KB (766 words) - 13:19, 28 November 2016
- * Linkage between IT services and business services; * Web services security and privacy;3 KB (356 words) - 15:56, 15 February 2017
- ...r computing; Grid computing; Pervasive and mobile computing architectures; Security in networks and distributed systems Be aware that you won't be able to delete or modify your paper once it is uploaded. Nobody but authorized members of the organisation board will b4 KB (490 words) - 17:05, 27 December 2015
- |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)6 KB (793 words) - 15:12, 1 October 2020
- ...uman networking with the use of wearable and implantable wireless sensors. It encompasses wireless body area network, wireless sensor network, and wirele o Security and privacy issues of UWB-based body-centric networking for personal health5 KB (664 words) - 17:20, 5 July 2020
- construction of high quality computational systems. It is now a - Models of concurrency, security and mobility;7 KB (1,094 words) - 11:42, 29 September 2016
- ...ns about all aspects of parallel and distributed computing and networking. It will feature session presentations, workshops, tutorials and keynote speech · Reliability, fault-tolerance, and security8 KB (1,050 words) - 18:04, 5 January 2017
- ...round seems necessary for sensor networks to achieve their full potential. It is a challenge for abstract modeling, algorithmic design and analysis to ac * Cryptography, Security and trust6 KB (750 words) - 16:50, 27 December 2015
- * Business, IT People and System Responsibilities * IT Governance4 KB (571 words) - 12:58, 9 March 2020
- ...t has become a key concern both from a social and political point of view. It is critical to provide rescue personnel with information technology tools t * Security issues in agent-based systems for search and rescue missions, use of games,6 KB (783 words) - 17:04, 27 December 2015
- * Network Security Submission of papers to COMSNETS 2010 carries with it the implied agreement that one or more of the listed authors will attend th7 KB (1,054 words) - 16:43, 27 December 2015
- ...ssion instructions for details. A poster need not describe completed work; it should report on research for which at least preliminary results are availa - Security8 KB (1,119 words) - 09:57, 27 February 2020
- RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure14 KB (1,651 words) - 15:56, 15 February 2017
- - Business-IT Alignment - Security and Privacy3 KB (392 words) - 13:50, 30 April 2020
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (429 words) - 08:55, 1 August 2019
- |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability9 KB (1,092 words) - 09:35, 1 August 2019
- ...nformation, IS effectiveness requires going beyond the syntactic nature of IT and delve into the human functions involved in the semantic, pragmatic and * Information security3 KB (380 words) - 15:10, 1 October 2020
- |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress2 KB (217 words) - 16:50, 19 November 2020
- * Theory of Security in Networks According to the ICALP policy, for every accepted paper it is required that at least one author attends the meeting and delivers the t4 KB (602 words) - 06:44, 26 August 2020
- * IT governance * Privacy, security, trust, and safety management3 KB (395 words) - 15:14, 24 September 2020
- ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)2 KB (298 words) - 16:47, 5 July 2020
- |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)5 KB (609 words) - 17:01, 5 July 2020
- ...ance the state-of-the-art and practical applications of computer networks. It provides a publication vehicle for complete coverage of all topics of inter • Network Security and Privacy • Network Services and Applications3 KB (318 words) - 16:46, 5 July 2020
- |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability2 KB (217 words) - 16:57, 27 December 2015
- |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability5 KB (597 words) - 10:45, 21 August 2020
- ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev3 KB (462 words) - 11:51, 22 March 2020
- − Information Security and Applied Cryptography. ...ferences. The paper should not exceed twelve pages and should be edited so it can be properly printed on letter size paper.3 KB (367 words) - 16:37, 27 December 2015
- ...ivilization that can resolve the conflict of civilizations, and how should it be discussed? 4-1-2. Is it possible to envisage the evolution or development of ethics?10 KB (1,552 words) - 17:04, 24 February 2016
- ...range of audiences over large numbers of geographically dispersed people. It is evident that the satellite will play a complementary, but essential, rol - Security related issues of satellite communications9 KB (1,218 words) - 16:06, 1 October 2020
- indexes so that it can be assessed easily. Revised and expanded version of the The 2012 International Conference of Information Security and Internet Engineering7 KB (909 words) - 16:30, 10 September 2020
- ...ple. It is time to ask: can the Web be reimagined for the public good? Can it be made more human-centric, and if so, how? ...rity & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and trust for Web access; false news; data for the public good; and crime o6 KB (910 words) - 12:04, 31 January 2020
- *Models to Support IT Management *Cyber Security and Privacy5 KB (663 words) - 11:49, 18 February 2020
- * Trust, Data Privacy, and Security with Semantic Technologies ...ces. Each submission will be reviewed by several PC members who will judge it based on its innovativeness, appropriateness, and impact of results in term6 KB (872 words) - 14:00, 22 February 2020
- • Information and data governance, information assurance, security, compliance • Role of mutual impact of society on/by IT (with focus on ontologies and databases)6 KB (872 words) - 23:11, 24 February 2020
- ...st is a metropolitan region south of Brisbane on Australia’s east coast. It's famed for its long sandy beaches, surfing spots and elaborate system of i * Trust, privacy, and security on the Semantic Web5 KB (663 words) - 14:34, 5 December 2018
- |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability5 KB (575 words) - 10:16, 1 August 2019
- indexes so that it can be assessed easily. Revised and expanded version of the The 2013 International Conference of Information Security and Internet Engineering7 KB (903 words) - 16:27, 10 September 2020
- |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".6 KB (801 words) - 11:04, 14 April 2020
- |Homepage=https://www.caise19.it/ ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness.3 KB (375 words) - 15:06, 24 September 2020
- ...nformation, IS effectiveness requires going beyond the syntactic nature of IT and delve into the human functions involved in the semantic, pragmatic and Information security3 KB (441 words) - 14:52, 1 October 2020
- ...huyLoi University and held from 07 to 09 November 2016 in Ha Noi, Vietnam. It continues to offer an opportunity for researchers and innovators to discuss ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.3 KB (422 words) - 12:09, 24 April 2016
- * Semantics for IT Safety & Security * Safety & Security10 KB (1,347 words) - 15:01, 26 September 2016
- * Trust, security, and privacy ...research approach and results during the poster session of the conference. It is great for discussing your research in free form with all attendants of t6 KB (898 words) - 14:42, 24 September 2016
- ...posal, its appeal to a viable fraction of the Web community as well as how it fits in with the conference. Topics of interest include, but are not restri * Web Security and Trust Management2 KB (230 words) - 00:37, 28 May 2016
- * Information and data governance, information assurance, security, compliance * Role of mutual impact of society on/by IT (with focus on ontologies and databases)6 KB (877 words) - 23:06, 24 February 2020
- |Field=information security, hacking, it security386 bytes (48 words) - 16:18, 8 July 2016
- ...rnational Conference on Semantic Technology for Intelligence, Defense, and Security ...chnology and ontology relevant to the fields of Intelligence, Defense, and Security. We are especially interested in papers on the following topics:4 KB (506 words) - 11:39, 8 October 2020
- knowledge management and databases. Since 1992, it has successfully brought - Security and Privacy12 KB (1,565 words) - 04:15, 5 August 2023
- - Security and Data Protection ...t your research paper at http://worldconedu.org/paper-submission/ or email it to papers-2016@worldconedu.org6 KB (777 words) - 23:29, 29 July 2016
- Modern society is a networked society permeated by information technology (IT), which defines ECIS 2015's Conference Theme. Networks - perceived as a gro * Methods, Tools and Human Factors in IS/IT Management3 KB (434 words) - 10:28, 26 July 2016
- * IT Implementation, Adoption and Use * Security and Privacy of Information and IS2 KB (263 words) - 10:32, 26 July 2016
- ...Computing based on Semantics (“meaning”, "context", “intention”). It addresses all types of resources including data, document, tool, device, pr Use of Semantics in IT Applications5 KB (580 words) - 20:22, 28 January 2017
- ...ablished itself as the world's premier research conference in data mining. It provides an international forum for presentation of original research resul - Security, privacy and social impact of data mining3 KB (407 words) - 10:17, 27 July 2016
- - Internet security - Globalisation and developmental IT5 KB (641 words) - 22:32, 29 July 2016
- ...brating the achievements of artificial intelligence research and practice. It is a highly referenced conference that will provide authors with useful cri ...pers on AI techniques in the context of novel application domains, such as security, sustainability, health care, transportation, and commerce. A special theme10 KB (1,466 words) - 15:17, 7 March 2021
- * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main4 KB (528 words) - 11:25, 26 June 2020
- * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main4 KB (490 words) - 11:42, 26 June 2020
- ...ry, it grew as well renowned event of the scientific community. Every year it joins international researchers for scientific discussions on the developme * security and privacy9 KB (1,190 words) - 10:12, 5 June 2019
- ...tors, practitioners, researchers and scientists in the development arenas. It aims to provide discussions and simulations in the communication technology Communication Security, Trust, Protocols and Applications5 KB (588 words) - 18:00, 21 January 2017
- - Smart city IT connectivity management - Smart city system security and privacy4 KB (565 words) - 09:46, 7 February 2017
- Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin ...(seventh edition) will be held at Luton, UK during August 16-18, 2017 and it offers the opportunity for institutes, research centers, engineers, scienti5 KB (631 words) - 15:09, 10 April 2017
- * Trust, security, and privacy ...research approach and results during the poster session of the conference. It is great for discussing your research in free form with all attendants of t7 KB (988 words) - 09:50, 14 August 2019
- ...ry, it grew as well renowned event of the scientific community. Every year it joins international researchers for scientific discussions on the developme *security and privacy10 KB (1,309 words) - 10:29, 5 June 2019
- ...S is a series of peer-reviewed International Computer Science conferences. It is a forum for researchers and practitioners to present their state-of-the- *Web Security, Integrity, Privacy, and Trust18 KB (2,394 words) - 16:28, 29 January 2018
- * IT policy and business management * Security and Information Assurance10 KB (1,396 words) - 13:30, 28 July 2017
- ...Kumar Das, Calcutta Institute of Engineering and Management, IndiaBai Li, IT Technical Analyst, AustraliaBhupendra Gupta, Indian Institute of Informatio3 KB (403 words) - 09:15, 12 July 2017
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 13:28, 28 July 2017
- * IT policy and business management * Security and Information Assurance5 KB (679 words) - 13:28, 28 July 2017
- *Semantics for Safety, Security & Privacy *Semantics for IT Safety & Security6 KB (759 words) - 15:52, 5 December 2018
- IT-driven collaborations. The conference is nevertheless not about the union o Emerging Enterprise Technologies are profoundly changing the way we think of IT7 KB (1,009 words) - 13:39, 3 September 2017
- Research, Development, and Application. And it will be held in Shanghai, China, Security Applications of Big Data3 KB (461 words) - 13:22, 3 September 2017
- |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)4 KB (562 words) - 12:05, 3 September 2017
- * Security and Information Assurance & IT) [http://airccse.org/cscp.html] series (Confirmed).5 KB (651 words) - 11:34, 8 August 2017
- * Internet, Web and Security Visualization ...cientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, auth5 KB (615 words) - 10:58, 15 May 2020
- It is one of the leading international conferences for presenting novel and Network and Data Security5 KB (673 words) - 09:53, 3 September 2017
- - Security and privacy, cryptographic protocols in a journal or conference with published proceedings. It should not be7 KB (1,009 words) - 15:54, 3 September 2019
- presentation of recent original work and it is an opportunity for students and Databases; Security and Cryptography; Operating Systems; Networks, Distributed3 KB (438 words) - 11:45, 8 August 2017
- |Title=SPDF-Mobile 2017 : Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security4 KB (536 words) - 09:59, 21 August 2017
- Physical layer security As more information becomes available, it will be published at the RTUWO'173 KB (415 words) - 13:30, 28 July 2017
- ComSoc organized in Latin America. It has attracted authors and attendees from - Service Security and Privacy6 KB (873 words) - 13:30, 28 July 2017
- only created a new trend in online education, it also has been adopted by a - Security and accreditation models.3 KB (407 words) - 11:52, 8 August 2017
- user-efficiency. Due to the growth in IT, individuals and organizations informatics to solve privacy, security, healthcare, education, poverty, and4 KB (570 words) - 13:30, 28 July 2017
- - IT Architecture and Security1 KB (136 words) - 11:52, 8 August 2017
- knowledge in their areas of interest. It aims to promote activities in research, - Information Security & Risk Management6 KB (814 words) - 09:03, 3 September 2017
- It is on the verge of transforming our lives, providing a more convenient and Security and privacy in heterogeneous IoT4 KB (483 words) - 10:00, 21 August 2017
- |Field=security Wireless Networks, Data Communication Technologies, and Network Security. The4 KB (486 words) - 11:57, 8 August 2017
- |Field=security Wireless Networks, Data communication Technologies, and Network Security. The4 KB (546 words) - 11:35, 8 August 2017
- |Title=DMCS 2017 : DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17) |Field=security4 KB (626 words) - 09:30, 3 September 2017
- ...: ACM--2017 the 7th International Conference on Communication and Network Security (ICCNS 2017)--SCOPUS, Ei Compendex |Field=network security2 KB (216 words) - 13:34, 28 July 2017
- * Security and Privacy * IT Policy and Business Management5 KB (589 words) - 11:46, 8 August 2017
- - Security and Privacy - Security8 KB (1,150 words) - 10:11, 7 August 2019
- of the educational and research staff. In this frame it can be seen as a mirror Industrial Electronics, Information Security, Information Theory,4 KB (554 words) - 13:19, 28 July 2017
- ...al ventures — indeed all those who are passionate about the Web and what it has to offer. * Security and Privacy on the Web12 KB (1,422 words) - 10:18, 5 October 2023
- questions of peace, security and human security abound. In this period of great the Pacific islands before it attracted the attention of Pacific and Asian7 KB (1,000 words) - 12:07, 3 September 2017
- * Cryptography, Security and Privacy of Mobile & Wireless Networks & IT) [http://airccse.org/cscp.html] series (Confirmed).5 KB (616 words) - 13:19, 28 July 2017
- are still open for research. Hence, it is time to face new service-oriented -Security and privacy for SOCA4 KB (494 words) - 13:20, 28 July 2017
- • Safety & Security fair. With 30,000 visitors, it has been an international professional meeting2 KB (298 words) - 09:59, 21 August 2017
- |Acronym=Technologies for Security of EHR 2017 |Title=Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Cha5 KB (650 words) - 13:24, 28 July 2017
- using IT, will arise from the conference. Papers describing advanced prototypes, - Security6 KB (818 words) - 13:40, 3 September 2017
- |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security4 KB (565 words) - 17:27, 18 February 2021
- ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security5 KB (611 words) - 11:47, 8 August 2017
- |Field=security benefits well beyond IT cost savings. Yet, many business leaders are concerned6 KB (799 words) - 13:28, 28 July 2017
- |Field=security vehicles, robots and so on. It is thought that this will greatly improve the4 KB (500 words) - 09:56, 21 August 2017
- ...yberIoT 2017 : Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal |Field=security4 KB (547 words) - 09:58, 21 August 2017
- ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security8 KB (1,170 words) - 13:40, 3 September 2017
- Green Computing is nowadays one of the major challenges for most IT - Security and Privacy6 KB (825 words) - 13:22, 3 September 2017
- *security, access control, and licensing issues of Linked Data ...ish your article on the Web, and send us the URL. You are welcome to share it via community chat. There are a variety of examples in the wild. See the Li6 KB (926 words) - 17:55, 9 January 2018
- |Field=security able to reach the crown-jewels and you have do it in a way that makes your1 KB (166 words) - 12:41, 20 October 2017
- |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security The WCICSS-2017 is a meeting point for professionals and researchers, IT5 KB (571 words) - 10:51, 3 September 2017
- * IT Policy and Business Management * Security and Information Assurance4 KB (478 words) - 08:48, 16 May 2020
- patents, experimental data, etc. It also encompasses various scholarly related and applied research (e.g. platforms and applications). It will encourage the4 KB (566 words) - 10:00, 21 August 2017
- - Security, compliance, and nonfunctional properties Position papers should draft a new idea and put it up for discussion at the workshop. Position papers should only be an extend7 KB (910 words) - 10:36, 26 November 2017
- - Security, compliance, and non-functional requirements and properties Position papers should draft a new idea and put it up for discussion at the workshop. Position papers should only be an extend4 KB (565 words) - 18:34, 4 July 2020
- - Security, compliance, and nonfunctional properties Positions papers: Position papers should draft a new idea and put it up for7 KB (1,046 words) - 10:36, 26 November 2017
- ...obile computing, search engine, question answering, robotics, web service, security and privacy12 KB (1,578 words) - 14:54, 24 September 2020
- ...nce will feature research talks, tutorials, demonstrations, and workshops. It will cover issues in data management, database and information systems rese Privacy and Security in Data Management.6 KB (826 words) - 09:45, 19 February 2021
- ...nter its limitations. Every year, SEMANTiCS attracts information managers, IT-architects, software engineers and researchers from a wide spectrum of orga ...addresses problems common among information managers, software engineers, IT-architects and various specialist departments working to develop, implement11 KB (1,487 words) - 13:45, 13 May 2019
- *A Maturity Model for IT-related Security Incident Management *Stress-Sensitive IT-Systems at Work: Insights from an Empirical Investigation7 KB (917 words) - 18:07, 17 March 2020
- ...Madrid, Spain, for the first time. Madrid is the capital City of Spain and it gathers a thrilling mix of antique and modern cultures that is reflected i *Security, Privacy and Reliability2 KB (288 words) - 09:18, 6 June 2019
- Use of Semantics in IT Applications * security and privacy2 KB (238 words) - 18:42, 7 March 2020
- * Security and privacy in mobile systems ...cepted) at a workshop at least 6 months before our submission date and (2) it adds significant new contributions over the previous paper. Authors uncerta5 KB (759 words) - 15:21, 18 June 2020
- |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:11 KB (1,549 words) - 11:34, 17 April 2020
- |Title=39th International Conference on Computer Safety, Reliability and Security The 39th International Conference on Computer Safety, Reliability and Security ( SafeComp)5 KB (617 words) - 11:54, 19 June 2020
- * Simulation infrastructure and security issues for large scale distributed and/or cloud-based modeling and simulati * Integration of simulation with other IT systems, methods, and developments including simulation based decision-maki3 KB (457 words) - 08:25, 17 April 2020
- |Title=17th International Conference on Trust, Privacy and Security in Digital Business ...se developments ultimately aim at improving our quality of life, at making it easier to generate wealth, and at ensuring that businesses remain competiti5 KB (690 words) - 12:02, 26 March 2020
- * Security and privacy in mobile systems ...cepted) at a workshop at least 6 months before our submission date and (2) it adds significant new contributions over the previous paper. Authors uncerta5 KB (732 words) - 15:22, 18 June 2020
- * Security and privacy in mobile systems ...version of a published, not just accepted, workshop paper is encouraged if it includes significant new contributions.6 KB (944 words) - 15:24, 18 June 2020
- * Security and privacy in mobile systems ...cepted) at a workshop at least 6 months before our submission date and (2) it adds significant new contributions over the previous paper. Authors uncerta5 KB (721 words) - 10:07, 17 August 2023
- ...and web-based applications, embedded and resource-limited computation, and security. ...wers come to an initial judgment about the paper without bias, not to make it impossible for them to discover the authors if they were to try. Nothing sh7 KB (1,057 words) - 10:13, 17 April 2020
- ...and web-based applications, embedded and resource-limited computation, and security. ...wers come to an initial judgment about the paper without bias, not to make it impossible for them to discover the authors if they were to try. Nothing sh8 KB (1,080 words) - 10:43, 17 April 2020
- ...he Tenth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies ...he Tenth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies10 KB (1,331 words) - 14:52, 19 April 2020
- ...en science, open education, wikis and related social media, Wikipedia, and IT-driven open innovation research. ...ities, and everyone interested in understanding open collaboration and how it is changing the world.6 KB (748 words) - 10:02, 30 April 2020
- safety and security for mobile MAS deployment security and trust in multi-agent systems8 KB (1,092 words) - 12:49, 22 April 2020
- Due to the COVID-19 pandemic, it is with a great sense of responsibility that we have decided to move the ac * Control Architectures - Security3 KB (454 words) - 14:16, 27 April 2020
- ...Design districts and just minutes from the Miami Beach Convention Center. It is the only marina-front downtown hotel with incredible bay views. ICUAS'17 * Security3 KB (385 words) - 15:55, 29 April 2020
- ...and provides a forum for the latest R&D results in academia and industry. It is a combination of the 51st Summer Computer Simulation (SCSC) and the 22nd * - Security in Computer and Telecommunication Systems5 KB (640 words) - 13:03, 5 May 2020
- ...onics, IoT, virtual reality, autonomous driving, robotics, and many more). It is difficult to clearly envision the way forward ...ultimedia, machine-learning, deep-learning, neuromorphism, cryptographics, security and trusted computing, special-function acceleration, processing-in-memory;6 KB (673 words) - 09:29, 6 May 2020
- ...ain connections and support networks that otherwise would not be possible; it provides the ability to access information instantaneously and from any loc ...eshold and Near-threshold circuits; Circuits for neuro-computing; Hardware-security circuits including PUFs, TRNGs, crypto-circuits, side-channel-attacks mitig5 KB (629 words) - 09:36, 6 May 2020
- ...earch into technologies for electronic and (embedded) systems engineering. It covers the design process, test, and tools for design automation of electro ...x effects, which must be controlled to adhere to safety, availability, and security guarantees where needed. This special day will cover the latest trends in a12 KB (1,651 words) - 13:30, 27 November 2020
- ...and dynamic power, power and clock distribution, yield, manufacturability, security, reliability, and testability. ...gns on FPGAs establishing state-of-the-art in high-performance, low-power, security, or high-reliability. Designs leveraging unique capabilities of FPGA archit11 KB (1,541 words) - 15:35, 18 June 2020
- * Internet, Web and Security Visualization ...cientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, auth5 KB (630 words) - 10:01, 15 May 2020
- * Internet, Web and Security Visualization ...cientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, auth6 KB (735 words) - 11:44, 15 May 2020
- ...2020) will continue the success of the previous IEEE Big Data conferences. It will provide a leading forum for disseminating the latest results in Big Da * Visualizing Large Scale Security Data9 KB (1,187 words) - 14:18, 27 May 2020
- RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure17 KB (2,088 words) - 12:49, 14 June 2020
- |Title=36th International Conference on Computer Safety, Reliability, and Security ...l Committee 7 on Reliability, Safety and Security (EWICS TC7). Since then, it has contributed to the progress of the state-of-the-art in dependable appli4 KB (457 words) - 11:48, 17 June 2020
- '''Use of Semantics in IT Applications''' * security and privacy4 KB (529 words) - 11:04, 17 June 2020
- * T06 Defence and security It is highly recommended, and mandatory if you choose to publish your paper in6 KB (885 words) - 12:35, 22 June 2020
- * Communications and Information Security It is required that the manuscript follows the standard IEEE camera-ready form3 KB (483 words) - 08:08, 21 August 2020
- * Theory of Security in Networks It is imperative that if a paper is accepted then at least one of the authors4 KB (556 words) - 06:42, 26 August 2020
- * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main4 KB (525 words) - 11:27, 27 August 2020
- * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main4 KB (537 words) - 14:06, 27 August 2020
- ...the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to * Software security and trust; data privacy5 KB (557 words) - 07:07, 13 July 2020
- ...a systems","Networking and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deploym ...ivate organizations; Cybersecurity risks; Smart home security and privacy; Security awareness; Digital forensics; Large e-Commerce; Digital crowdfunding platfo18 KB (2,036 words) - 02:36, 10 July 2020
- ...systems; Cross-hospital resource management systems; Nurse challenges with IT and electronic medical records; Clinical personal self-management; Care con ...ical systems; Scalability evaluation; Mobile clouds in medical scenarios ; Security of medical systems; Privacy for wired and wireless medical devices8 KB (970 words) - 16:50, 14 July 2020
- * IT Security and Digital Forensics1 KB (159 words) - 13:38, 29 July 2020
- |Title=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies15 KB (1,886 words) - 16:16, 25 August 2020
- ...VNC)''' is the premiere conference on vehicular networks and applications. It brings together researchers, professionals, and practitioners to share the ** Security, privacy, liability, and dependability of vehicular networks4 KB (493 words) - 23:17, 12 October 2020
- * Green IT and Green Organization * Privacy, security, ethical, and social issues9 KB (896 words) - 16:31, 6 August 2020
- * Communications and Information Security It is required that the manuscript follows the standard IEEE camera-ready form3 KB (482 words) - 08:25, 21 August 2020
- * Communications and Information Security It is required that the manuscript follows the standard IEEE camera-ready form3 KB (489 words) - 09:05, 21 August 2020
- * Communications and Information Security It is required that the manuscript follows the standard IEEE camera-ready form4 KB (604 words) - 09:59, 21 August 2020
- ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV]] ||43 | [[IEEE Symposium on Security and Privacy 2018]] ||[[:39th IEEE Symposium on Security and Privacy]] ||4324 KB (2,633 words) - 18:53, 15 October 2020
- * IT governance * Privacy, security, trust, and safety management3 KB (346 words) - 16:20, 24 September 2020
- |Title=4th International Conference on Networking, Systems and Security (NSysS) |Field=security4 KB (587 words) - 12:07, 5 November 2020
- embedded systems; Safety and security in embedded systems; Performance Security and protection systems10 KB (1,210 words) - 20:17, 22 November 2020
- modeling; Security, privacy, and trust; Radio resource management; IT11 KB (1,377 words) - 20:26, 22 November 2020
- Software sustainability for green IT; Energy consumption and e-waste Software security12 KB (1,505 words) - 20:38, 22 November 2020
- ...Eleventh International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies |Field=Smart Grids, Green Communications and IT Energy-aware Technologies10 KB (1,235 words) - 18:42, 26 November 2020
- RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure17 KB (2,035 words) - 14:45, 18 February 2021
- ...agement; Scale enterprise computing; Data processing in encrypted domains; Security-intelligent lifecycle management; Portability of SOA applications; Multi-te ...tion in Mobile Cloud computing; Cloud quality assessment; Auditability and Security in Cloud-based services; Legacy application in clouds; Protecting business8 KB (919 words) - 18:54, 8 December 2020
- |Title=1st Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of T The 1st Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of T6 KB (804 words) - 11:42, 28 January 2021
- ...Eleventh International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies |Field=Smart Grids, Green Communications and IT Energy-aware Technologies10 KB (1,237 words) - 14:50, 10 February 2021
- ...Eleventh International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies ...ges, Advanced IT energy-aware technologies, Challenges in Smart Grids and IT-energy aware technologies10 KB (1,277 words) - 11:56, 3 March 2021
- Design Theory for Wellness Using IT Internet-of-Things for Security and Safety2 KB (243 words) - 04:39, 11 March 2021
- ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modeling, information credibility) It is not allowed to submit papers that are identical (or substantially simila37 KB (5,185 words) - 11:25, 3 August 2023
- Cyber-security, Privacy and Ethics of IS Network security and privacy2 KB (240 words) - 09:51, 13 April 2021
- * security It is expected that the full version of each submitted paper should be ready a3 KB (425 words) - 14:12, 22 April 2021
- ...channel modeling; Security, privacy, and trust; Radio resource management; IT application in Space Communications; Standards activities11 KB (1,294 words) - 02:42, 26 November 2021
- ...tems and embedded computation models; Testing embedded systems; Safety and security in embedded systems; Performance analysis of embedded systems; Mission-crit Security and protection systems10 KB (1,228 words) - 02:46, 26 November 2021
- ...tainability, context-awareness, agility; Software sustainability for green IT; Energy consumption and e-waste from computers during software upgrades; Go Software security13 KB (1,522 words) - 03:32, 3 December 2021
- * Security, privacy, liability, and dependability of vehicular networks ...er will either be accepted in the category where it has been submitted, or it will be rejected (in particular: full papers will not be "downgraded" to sh6 KB (871 words) - 10:16, 31 January 2023
- |Title=International Conference on Cyber Security and Information Engineering |Field=Cyber Security, Information Engineering4 KB (517 words) - 04:36, 29 June 2023
- * Network security and privacy ...ide consent that their submissions may be subject to an early rejection if it is found to have more than 30% overlap with a single paper available to the8 KB (1,137 words) - 11:08, 3 August 2023
- ...thriving city of Kuala Lumpur, Malaysia, from December 4th to 8th, making it the first time that the conference is being organized in this location. The * COMMUNICATION AND INFORMATION SYSTEM SECURITY6 KB (935 words) - 11:18, 3 August 2023
- ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modeling, information credibility) It is not allowed to submit papers that are identical (or substantially simila7 KB (951 words) - 04:25, 5 September 2023
- ...of information retrieval, knowledge management and databases. Since 1992, it has successfully brought together leading researchers and developers from t Authorization, data privacy and security5 KB (690 words) - 13:23, 14 August 2023
- ...e their ideas face to face. The conference will be held every year to make it an ideal platform for people to share views and experiences in Big Data, Co Security Applications of Big Data,4 KB (526 words) - 09:06, 23 August 2023
- ...echnology (CNCIT 2024) will be held in Xi'an, China during June 7-9, 2024. It is sponsored by The International Society for Applied Computing (ISAC) and Wireless Security5 KB (626 words) - 09:32, 27 February 2024
- ☆ International Journal of Sustainable Energy. It is abstracted and indexed in ESCI, Scopus (Citescore 2021: 4.5), EBSCO, and Energy storage and cyber security for smart grids2 KB (285 words) - 08:45, 9 April 2024