Search results

Jump to: navigation, search
  • understanding of complex network dynamics and leads to better design of * Distributed network resource allocation
    6 KB (722 words) - 17:32, 14 October 2008
  • ...es, digital and video libraries, compression and coding, security over the network. ...e, OCR and document analysis, mobile robots and visual navigation, network security, remote sensing and environment control, video surveillance and intelligent
    2 KB (268 words) - 17:47, 14 October 2008
  • o Applications of network coding in cross-layer design o Security aspects in cross-layer designs
    3 KB (424 words) - 17:47, 14 October 2008
  • Network estimation and processing techniques • Wireless network security and privacy
    6 KB (731 words) - 10:33, 14 August 2023
  • * Wireless privacy and security * Wireless network architecture and technologies systems
    3 KB (456 words) - 18:10, 14 October 2008
  • ...ity, the current series of events starting with INTERNET 2009 is targeting network calculi and supporting mechanisms for these challenging issues. ...ents using microeconomics, topological routing vs. table-based routing vs. network coding, power-efficient routing
    11 KB (1,385 words) - 17:48, 14 October 2008
  • .Network Protocol and Security
    3 KB (375 words) - 17:48, 14 October 2008
  • * Trust, security and privacy Network protocols, routing, algorithms
    19 KB (2,503 words) - 13:25, 28 October 2020
  • * Security and privacy in vehicular networks * In-network processing and aggregation
    3 KB (378 words) - 14:22, 24 August 2016
  • - Peer-to-Peer and overlay network support in SPSs - Security and privacy in SPSs
    3 KB (490 words) - 20:05, 14 October 2008
  • rent out network presence, computation power, and data storage space + Security and information assurance
    7 KB (907 words) - 21:51, 14 October 2008
  • • MAC, Network, Transport, Application Protocols and Cross-Layer Design • Network Coding, MIMO, Cooperative Communications and Other Novel Techniques
    2 KB (244 words) - 20:05, 14 October 2008
  • * Analysis and design of network architectures and algorithms * Experimental results from operational networks or network applications
    3 KB (353 words) - 20:31, 14 October 2008
  • * › Mobile Network Protocols and Packet Services * › Adaptive Wireless Network Protocols
    9 KB (1,219 words) - 20:05, 14 October 2008
  • * Cryptography and Security * Network Analysis
    2 KB (216 words) - 20:05, 14 October 2008
  • • Ethical, Social, Privacy, Security and moral Issues in an e-societ • Mobile Network Architecture
    5 KB (530 words) - 10:27, 24 June 2011
  • Computer and Network Security
    3 KB (332 words) - 20:06, 14 October 2008
  • o Security and Privacy o Network and Internet Support for Distributed Applications
    2 KB (303 words) - 20:06, 14 October 2008
  • ...mic experts to present and discuss communications quality, reliability and security issues as they relate to real world issues. The output from the workshops a * Network Architecture and Design
    4 KB (505 words) - 22:15, 14 October 2008
  • | Title = Sixth International Conference on Wireless On-demand Network Systems and Services On-demand Network Systems and Services
    6 KB (686 words) - 20:06, 14 October 2008
  • * Security and trust management in collaborative networks, systems, and applications * Workflow technology and workflow management for collaborative network management
    6 KB (674 words) - 22:45, 14 October 2008
  • Database Security and Transaction Support Advanced Applications of Neural Network
    9 KB (1,240 words) - 22:56, 14 October 2008
  • ...ame studies/game design, e) graphics and interfaces and f ) networking and security. Papers that fall outside these topic areas are strongly encouraged and sho Networks and Security
    9 KB (1,275 words) - 14:46, 27 December 2015
  • - Social network analysis - Trust, privacy, and security on the semantic web
    6 KB (827 words) - 23:04, 14 October 2008
  • * Error tolerance, security and robustness * Network protocols and middleware for embedded systems
    2 KB (316 words) - 23:05, 14 October 2008
  • * Cryptography and Network Security * Voice-over-IP and Security
    2 KB (167 words) - 23:05, 14 October 2008
  • bioinformatics; Network computing; Neural computing; programs; foundations of security; term rewriting;
    5 KB (698 words) - 23:08, 14 October 2008
  • This track is dedicated to communication and network technologies that are of specific relevance to developing countries. The tr * Innovations in femtocells, picocells and relay network technologies
    9 KB (1,127 words) - 17:19, 26 April 2011
  • * Data Portability and Social Network Portability * Policies, authentication, security, and trust within
    5 KB (709 words) - 23:08, 14 October 2008
  • * Security and data integrity * Telecommunications, network and systems management
    5 KB (634 words) - 15:36, 14 December 2008
  • - Security and Access Control - Information Content Security
    4 KB (595 words) - 23:09, 14 October 2008
  • * mobile database security * sensor network databases
    7 KB (875 words) - 23:09, 14 October 2008
  • ...stems and networks designed using database principles (and vice versa), to network monitoring systems that depend on advanced data management and analysis cap * Network algorithms and theory applied to database systems
    3 KB (332 words) - 23:10, 14 October 2008
  • ...systems. However, such systems constrained resources in terms of autonomy, network bandwidth or storage capacity, mobile devices (mobile phones, PDA�?�) h * Reliability, security and privacy
    2 KB (324 words) - 16:49, 16 December 2020
  • ...he Natural Sciences and Engineering Research Council of Canada. The LORNET Network is hosting its 4th annual e-learning conference on Intelligent Interactive * Security and privacy;
    4 KB (503 words) - 23:11, 14 October 2008
  • and military operations. Such networking is essential for safety, security and economic vitality in •Trust, security, dependability, privacy, QoS and
    5 KB (549 words) - 17:15, 5 July 2020
  • ...special issue is to explore the development of vehicular ad hoc and sensor network technologies about communication, networking, and applications. Security issues
    3 KB (364 words) - 23:11, 14 October 2008
  • * Network Data Mining * Network Management
    3 KB (339 words) - 23:11, 14 October 2008
  • ...ocols, web architectures and protocols, network measurements and testbeds, network management systems, content distribution, peer to peer and overlay networks ...e, multilayer design and optimisation, MPLS and GMPLS, RFID, multicasting, network modelling and simulation, real-time voice/video over IP networks, resource
    7 KB (981 words) - 03:18, 6 January 2009
  • 1. NGN(Next Generation Network), NGI(Next Generation Internet) and Future Internet Technologies 5. RFID/USN(Ubiquitous Sensor Network) Technologies
    2 KB (200 words) - 23:11, 14 October 2008
  • * Network-based applications * Network Security
    4 KB (465 words) - 23:11, 14 October 2008
  • * Wireless Mesh & Sensor Network Applications * Network Security & Reliability
    4 KB (559 words) - 23:11, 14 October 2008
  • ...ocus on new models and methods as well as mechanisms, which can enable the network to perform adaptive behaviors. High-speed Network Protocols
    7 KB (990 words) - 23:11, 14 October 2008
  • - Computer and Communications Network Security
    3 KB (375 words) - 23:37, 14 October 2008
  • | Title = Third International Conference on Bio-Inspired Models of Network, Information and Computing Systems 3rd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems
    5 KB (694 words) - 23:11, 14 October 2008
  • | Title = New Technologies, Mobility and Security ...8 is the Second International Conference on New Technologies, Mobility and Security that will be held from 5 to 7 November, 2008 in Tangier, Morocco.
    2 KB (209 words) - 23:12, 14 October 2008
  • 6. Intelligent Communication Systems and Network Protocols 7. Security Signal Processing
    4 KB (496 words) - 23:12, 14 October 2008
  • Papers related to wireless and mobile network Modeling, Analysis, - Wireless network algorithms and protocols
    4 KB (596 words) - 23:12, 14 October 2008
  • Security/privacy in wireless systems Wireless network architectures
    2 KB (244 words) - 23:12, 14 October 2008
  • 1 .5 Network Management 1 .6 Network Planning and Optimization
    2 KB (250 words) - 23:12, 14 October 2008
  • ...and operation of Next Generation Internet networks. It is organized by the Network of Excellence (NoE) Euro-FGI (http://www.eurongi.org) that was initiated by * Network co-operation
    3 KB (382 words) - 23:12, 14 October 2008
  • ...ield of computer and data communication networks. We invite submissions on network architecture, design, implementation, operations, analysis, measurement, pe * Analysis and design of network architectures and algorithms
    3 KB (352 words) - 23:12, 14 October 2008
  • - Network Security - Trust, Security, and Privacy
    3 KB (465 words) - 23:13, 14 October 2008
  • * Computer Networks and Security * Network Reliability and QoS
    2 KB (283 words) - 23:13, 14 October 2008
  • | Title = Fifth Annual Conference on Wireless On demand Network Systems and Services effort as well as with little dependency on existing network infrastructures.
    3 KB (413 words) - 23:13, 14 October 2008
  • architectural boundaries of large-scale network services. We solicit * Security and resilience of networked systems
    4 KB (528 words) - 23:13, 14 October 2008
  • sub-areas of research: adaptation of system operations to the network the 90's that had an inward focus on network signaling & control today's
    5 KB (651 words) - 23:13, 14 October 2008
  • - Wireless network security and privacy - Security Techniques and systems
    3 KB (343 words) - 10:31, 14 August 2023
  • *Security and privacy in Web search and mining *Discovery-driven Web and social network mining
    2 KB (237 words) - 12:23, 11 September 2020
  • | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.
    4 KB (457 words) - 23:13, 14 October 2008
  • ...nhanced business information systems, e-education specialists, Information security, and other Web related technologies. The aim of NWeSP'08 is to serve as a f Web Services Security
    3 KB (494 words) - 23:16, 14 October 2008
  • ...os, audio recordings) in bibliometrics (publication patterns), in homeland security (terrorist networks). * Social network analysis
    3 KB (453 words) - 23:14, 14 October 2008
  • networks, including user behavior models, security and trust, P2P, the Network Society"
    7 KB (813 words) - 23:14, 14 October 2008
  • * Networking and network services * Security, privacy, and trust
    6 KB (869 words) - 23:14, 14 October 2008
  • * Security of WiMAX in NGN * Network architecture infrastructure integration of WiMAX in NGN
    1 KB (181 words) - 23:14, 14 October 2008
  • ...ant research dialog, or pushes the architectural boundaries of large-scale network services. We solicit papers describing original and previously unpublished * Security, robustness, and fault-tolerance in networked environments
    8 KB (1,093 words) - 23:15, 14 October 2008
  • ...itionally offered predominantly passive experiences, continual advances in network and computer technologies are providing tools for implementing greater inte * QoS and Security Support for Entertainment
    8 KB (1,011 words) - 23:15, 14 October 2008
  • | Title = IEEE 3rd International Workshop on Distributed Autonomous Network Management Systems 3rd International Workshop on Distributed Autonomous Network
    6 KB (663 words) - 23:15, 14 October 2008
  • * Security, privacy and trust management in collaborative networks, systems, and appli * Workflow management for collaborative network/system
    8 KB (1,093 words) - 23:15, 14 October 2008
  • | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)
    5 KB (628 words) - 23:15, 14 October 2008
  • 3-08 Network routing and communication algorithms 4. Security and Privacy
    5 KB (623 words) - 23:15, 14 October 2008
  • ...ng difficult social and policy issues such as those related to privacy and security The third generation of social networking technologies has hit the Web. This network serve increasingly
    8 KB (1,003 words) - 23:15, 14 October 2008
  • | Title = 4th IEEE Workshop on Secure Network Protocols 4th workshop on Secure Network Protocols (NPSec 2008)
    4 KB (493 words) - 23:15, 14 October 2008
  • * Giuseppe Persiano: Security of networks of low capability devices Network information management is a growing area of research at the attention
    4 KB (563 words) - 23:15, 14 October 2008
  • * Measurement-based network management such as traffic engineering * Network applications such as WWW, multimedia streaming, and gaming
    3 KB (313 words) - 23:15, 14 October 2008
  • ...lumes, mainly because of converged type of traffic resulted from converged network operation under converged services and applications. Moreover, wireless acc * New Teletraffic and Network Traffic Challenges and Paradigms
    5 KB (598 words) - 10:18, 29 May 2016
  • ...act may both be mobile. Their implementation requires advances in wireless network technologies and devices, development of infrastructures supporting cogniti * Ad hoc and sensor network support for ubiquitous computing
    5 KB (599 words) - 23:15, 14 October 2008
  • | Title = 18th International workshop on Network and Operating Systems Support for Digital Audio and Video In-network stream processing
    3 KB (322 words) - 23:15, 14 October 2008
  • |Title=6th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    509 bytes (65 words) - 14:00, 6 November 2020
  • |Title=7th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    509 bytes (62 words) - 14:01, 6 November 2020
  • |Title=9th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    496 bytes (63 words) - 14:05, 6 November 2020
  • |Title=15th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    506 bytes (61 words) - 14:16, 6 November 2020
  • |Title=8th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    475 bytes (60 words) - 14:03, 6 November 2020
  • |Title=14th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    485 bytes (60 words) - 14:15, 6 November 2020
  • |Title=12th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    497 bytes (60 words) - 14:11, 6 November 2020
  • |Title=13th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    516 bytes (64 words) - 14:12, 6 November 2020
  • |Title=10th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    491 bytes (60 words) - 14:07, 6 November 2020
  • |Title=11th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    507 bytes (62 words) - 14:09, 6 November 2020
  • | Title = First ACM Conference on Wireless Network Security | Field = Computer security and reliability
    2 KB (197 words) - 23:15, 14 October 2008
  • - Information forensics and security - Sensor network
    2 KB (253 words) - 23:16, 14 October 2008
  • Hyper Network Communication Network Security and Information Assurance
    4 KB (438 words) - 23:17, 14 October 2008
  • ...industry, and government to present and discuss recent advances in sensor network research and applications. The conference covers both theoretical and exper Network health monitoring
    4 KB (570 words) - 23:17, 14 October 2008
  • ...rch domains that increasingly play a key role in connecting systems across network centric environments to allow distributed computing and information sharing * OSS and security, security implication of OSS, security concerns in using OSS
    5 KB (697 words) - 23:18, 14 October 2008
  • ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha The international conference on Advances in Social Network Analysis and Mining (ASONAM 2009) will primarily provide an interdisciplina
    3 KB (404 words) - 23:18, 14 October 2008
  • o Privacy and security issues. o Impact of recommendation models on the evolution of the social network.
    5 KB (592 words) - 23:18, 14 October 2008
  • intelligence, domain constraints and network intelligence in data blog mining, security mining, taxation mining, scientific data
    4 KB (510 words) - 23:19, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = Second ACM Conference on Wireless Network Security | Field = Computer security and reliability
    2 KB (291 words) - 23:19, 14 October 2008
  • | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability
    5 KB (673 words) - 23:19, 14 October 2008
  • | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability
    6 KB (697 words) - 23:19, 14 October 2008
  • | Title = The First ACM Computer Security Architecture Workshop | Field = Computer security and reliability
    5 KB (619 words) - 23:19, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability
    6 KB (736 words) - 23:20, 14 October 2008
  • | Title = Information Security South Africa (ISSA) Conference 2008 | Field = Computer security and reliability
    4 KB (465 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability
    4 KB (565 words) - 23:20, 14 October 2008
  • | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability
    2 KB (262 words) - 23:20, 14 October 2008
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • - Mobile Network Traffic Engineering, Performance & Optimization - Wireless & Mobile Network Management and Service Infrastructure
    10 KB (1,262 words) - 23:20, 14 October 2008
  • Service Security, Privacy and Trust Service Network Economic Structures and Effects
    18 KB (2,352 words) - 23:23, 14 October 2008
  • * Information Security * Ubiquitous and Sensor Network
    3 KB (415 words) - 23:23, 14 October 2008
  • | Field = Computer security and reliability ...des research at all design levels: circuit, architecture, compiler, OS and network. This workshop aims to become a forum for academia and industry to discuss
    5 KB (598 words) - 01:12, 31 May 2012
  • RAID, and network-storage system designs). ...s increasingly important as boundaries between hardware/software and local/network
    3 KB (406 words) - 17:39, 30 September 2016
  • ...SETI@Home?s "BOINC" computational Grid; BitTorrent?s Content Distribution Network; and ppLive, and ppStream in China, as well as Zattoo in Europe, all of thr * Security and Trust in Distributed Systems
    6 KB (761 words) - 03:28, 6 January 2009
  • resources such as processing, network bandwidth and storage capacity - Networking and Security
    5 KB (577 words) - 23:27, 14 October 2008
  • * Hardware support for security * Network processor and router architectures
    2 KB (259 words) - 10:14, 29 May 2016
  • ...d their own properties with respect to traffic load, congestion situation, network topology, and wireless channel propagation etc. However, cognitive radio wi ...s that report the latest research advances in this field from physical and network layers to practical applications.
    3 KB (409 words) - 23:27, 14 October 2008
  • ...a broad forum an outstanding opportunity for researchers, academicians and network engineers to discuss new and emerging technologies in the field of computer - Network management and performance
    3 KB (413 words) - 23:28, 14 October 2008
  • Computational Intelligence: Artificial neural network, Fuzzy systems, Genetic algorithm, Evolutionary computing, Machine learning ...energy, Waste management, Waste treatment and recycling, Water network and security, Sensor technologies, Intelligent Micro-grids
    4 KB (561 words) - 23:29, 14 October 2008
  • of real-time embedded systems, such as timeliness, safety, security, - COMPOSITIONAL DISTRIBUTED SYSTEMS: composition of network protocol
    6 KB (707 words) - 23:29, 14 October 2008
  • |Field=Computer Science, Embedded systems, Embedded Network Sensor Systems, Sensor Systems Sensor network architecture and protocols Sensor network algorithms such as localization, routing, time synchronization, clustering,
    6 KB (771 words) - 16:09, 16 September 2019
  • ...ity when compared to traditional critical systems, where dependability and security are fairly well understood as complementary concepts and a variety of prove ...lopment tools with middleware, traditional dependability, fault tolerance, security, and adaptivity concepts, together with social and psychological aspects, t
    8 KB (952 words) - 23:31, 14 October 2008
  • Security in distributed systems Network-based Computing
    5 KB (702 words) - 23:31, 14 October 2008
  • ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.
    5 KB (580 words) - 10:32, 12 May 2020
  • ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more.
    4 KB (577 words) - 09:28, 12 May 2020
  • *Big Data platforms with applications to network management, security, measurements *Design, analysis, and evaluation of network architectures
    4 KB (514 words) - 12:03, 6 April 2020
  • ...ternet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation. ...tem analysis and control, HVDC and FACTS, Power market, Power distribution network and automation, Power protection, SCADA, EMS, WAMS and substation automatio
    4 KB (504 words) - 23:33, 14 October 2008
  • ?Semantic Web ?Semantic Search and Query ?Semantic Link Network ?Semantic Normalization ?Semantic Interoperability ?Semantic Visualization ...lf-Organized Intelligence ?Service-oriented Computing ?Mobile Grid ?Social Network ?Community Discovery
    3 KB (367 words) - 23:35, 14 October 2008
  • | Title = SANS Network Security 2007
    492 bytes (57 words) - 23:36, 14 October 2008
  • | Title = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymaker
    4 KB (451 words) - 23:37, 14 October 2008
  • * foundations of security * security and trust issues in services
    6 KB (682 words) - 10:18, 14 April 2020
  • of billions of sensing devices. While a single sensor network typically - Sensor network protocols
    4 KB (483 words) - 23:37, 14 October 2008
  • �?� Network architectures for sensor networks SECURITY
    11 KB (1,533 words) - 23:38, 14 October 2008
  • ...ield of computer and data communication networks. We invite submissions on network architecture, design, implementation, operations, analysis, measurement, pe * Network applications & services
    3 KB (380 words) - 19:34, 17 November 2008
  • ...obile. The implementation of such a paradigm requires advances in wireless network technologies and devices, development of infrastructures supporting cogniti * Information Security and Cryptography
    3 KB (386 words) - 23:39, 14 October 2008
  • ...nd security, systems health management, and related areas. Collaborate and network with scientists, engineers, developers and customers, in a balance of forma
    1 KB (164 words) - 23:39, 14 October 2008
  • ...tures and compilers for graphics/gaming, embedded processors, DSPs, ASIPs (network, multimedia, wireless, etc.) * Microarchitecture support for reliability, dependability, and security
    3 KB (326 words) - 17:43, 8 November 2008
  • ...cast network, home network, mobile multimedia QoS, mobile security, ad hoc network ...system), personal information management, data integration and federation, security, privacy
    2 KB (303 words) - 23:42, 14 October 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...management /locator-location paradigm/; Recovering and fault-tolerance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Cont ...Scalability; User and service mobility; Wireless QoS; Traffic engineering; Network planning; Intermittent services; Virtualization; Self-management and contr
    7 KB (883 words) - 17:35, 7 January 2021
  • ...raw observations that are used in our experiments. Examples might include network measurement or capturing data such as seismic measurements. Middleware is r * Virtual organization and security issues of instruments and sensors on the Grid
    4 KB (642 words) - 21:17, 9 December 2008
  • ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Network Architectures and Routing
    5 KB (526 words) - 01:02, 2 February 2009
  • | Title = 3rd International Conference on Network and System Security 3rd International Conference on Network and System Security (NSS 2009)
    12 KB (1,669 words) - 12:58, 18 January 2009
  • o Security o Network architecture
    5 KB (567 words) - 12:58, 18 January 2009
  • o Game-theoretic aspects of network formation on the Internet * Security, Privacy, Encryption, and Digital Rights, including
    9 KB (1,221 words) - 12:58, 18 January 2009
  • | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...mance Analysis; Power Aware Embedded Computing; Adaptive Embedded Systems; Security in Embedded Systems. System-on-Chip and Network-on-Chip Design & Testing: Design of Application- Specific Instruction-Set P
    3 KB (337 words) - 12:59, 18 January 2009
  • ...building federated digital technologies that will enable the formation of network of digital technologies. Data and Network mining
    4 KB (529 words) - 13:00, 18 January 2009
  • - Data warehouse privacy, security, and reliability - Security, privacy and social impact of data mining
    7 KB (1,006 words) - 13:00, 18 January 2009
  • | Title = The 11th ACM workshop on Multimedia and Security The 11th ACM workshop on Multimedia and Security will be held in Princeton, New Jersey, USA on September 7th and 8th of 2009
    3 KB (303 words) - 17:06, 24 February 2016
  • o Network management, QoS management o System architecture and protocol (e.g., MAC, network, transport)
    14 KB (1,518 words) - 13:01, 18 January 2009
  • + Security + Social Network
    3 KB (410 words) - 13:01, 18 January 2009
  • Security in wireless networks Network measurement and Management
    3 KB (320 words) - 16:40, 27 December 2015
  • ...their research results and address open issues in Wireless Communications, Network Technologies, Services and Application. Network Technologies
    2 KB (210 words) - 13:01, 18 January 2009
  • * Network applications and services * Network architectures and management
    10 KB (1,206 words) - 13:01, 18 January 2009
  • ...pose architectures and accelerators; Architecture of the memory hierarchy; Network and interconnect architectures; Parallel I/O and storage systems; Power-eff ...algorithms; Optimizations of communication and synchronization protocols; Network algorithms, Scheduling and load balancing; Scientific applications; Applica
    4 KB (490 words) - 17:05, 27 December 2015
  • - Computer and Network Architecture - Security Engineering
    10 KB (1,321 words) - 13:01, 18 January 2009
  • ...practical aspects of health informatics and bioinformatics and a chance to network with others working and researching in this area. • Security, Ethics and Privacy
    4 KB (528 words) - 13:01, 18 January 2009
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • Nowadays, computing and network systems, such as peer-to-peer, wireless ad hoc, sensor networks, and genera ...this direction, biology, psychology, economics (e.g., game theory), social network, and many other research fields can provide many helpful hints for autonomo
    6 KB (767 words) - 13:01, 18 January 2009
  • - Innovative applications of social network analysis - Scalable, customizable social network infrastructure construction
    3 KB (446 words) - 13:02, 18 January 2009
  • | Title = Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use | Field = Computer security and reliability
    11 KB (1,539 words) - 13:02, 18 January 2009
  • | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)
    6 KB (852 words) - 13:02, 18 January 2009
  • ...place in conjunction with the 3rd International Conference on Information Security and Assurance, Seoul, Korea http://www.sersc.org/ISA2009. A wireless sensor network (WSN) is an emerging research field with several interesting application do
    3 KB (450 words) - 13:02, 18 January 2009
  • ...ssues can expose the network infrastructure to stability, performance, and security problems. ...izations. Also, it can be the basis for prevention and response in network security, as typically the detection of attacks and intrusions requires the analysis
    5 KB (431 words) - 13:03, 18 January 2009
  • ...ess body area network, wireless sensor network, and wireless personal area network. Body-centric wireless communications find rich applications in personal he o Security and privacy issues of UWB-based body-centric networking for personal health
    5 KB (664 words) - 17:20, 5 July 2020
  • ...ergy and brainpower. As a speaker, you will have the unique opportunity to network and share knowledge with hundreds of other IT leaders, executives and busin * Security throughout the enterprise (servers, programming, development process, preve
    2 KB (299 words) - 16:33, 27 February 2009
  • ...temas, Wireless communications, Technologies and applications, Information security ...temas, Wireless communications, Technologies and applications, Information security
    8 KB (977 words) - 16:33, 27 February 2009
  • ...number of devices connected to the networks has changed the Internet to a "network of things and computers". These trends, plus the rise of collaborative tech * Frameworks and Overarching Issues of Network Governance
    4 KB (557 words) - 16:33, 27 February 2009
  • | Title = IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09) IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09)
    2 KB (229 words) - 16:33, 27 February 2009
  • 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.
    7 KB (897 words) - 17:05, 27 February 2009
  • Network management • Network performance evaluation
    5 KB (654 words) - 17:06, 27 February 2009
  • · Network routing and communication algorithms · Reliability, fault-tolerance, and security
    8 KB (1,050 words) - 18:04, 5 January 2017
  • * Network applications & services * Network architectures
    4 KB (559 words) - 17:06, 27 February 2009
  • * Security and privacy in P2P systems * Network support for P2P systems
    5 KB (623 words) - 17:06, 27 February 2009
  • establish contacts between computer network researchers, practitioners * Security and privacy
    3 KB (456 words) - 17:06, 27 February 2009
  • | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability
    8 KB (967 words) - 17:07, 27 February 2009
  • communicate through a Wireless Network. The building of software    * Privacy and security services
    6 KB (861 words) - 17:07, 27 February 2009
  • | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability
    4 KB (506 words) - 17:07, 27 February 2009
  • | Title = Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) | Field = Computer security and reliability
    4 KB (600 words) - 17:07, 27 February 2009
  • ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Security and Privacy
    7 KB (941 words) - 17:07, 27 February 2009
  • ...ks. Features including the extremely large number of sensor devices in the network, the severe power, computing and memory limitations, their dense, random de * Cryptography, Security and trust
    6 KB (750 words) - 16:50, 27 December 2015
  • Computer System, Information Security and Networks • Network Dimensioning
    3 KB (319 words) - 17:07, 27 February 2009
  • ...l Applications, Practice, Extensions, XML, Open Source, Model Development, Network Modeling, Distributed Simulation and Industry, Modeling Very Large Scale Sy ...ng on line, Computational resources are becoming cheaper, while ubiquitous network access has started to appear.
    38 KB (4,832 words) - 17:07, 27 February 2009
  • | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability
    12 KB (1,690 words) - 17:08, 27 February 2009
  • | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability
    3 KB (480 words) - 17:08, 27 February 2009
  • | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability
    6 KB (828 words) - 17:08, 27 February 2009
  • * Measurement-based network management such as traffic engineering * Network applications such as multimedia streaming, gaming and on-line social networ
    6 KB (774 words) - 17:08, 27 February 2009
  • * Project, risk and security management * Social network analysis
    4 KB (571 words) - 12:58, 9 March 2020
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • * Network management and planning * Network topology
    1 KB (148 words) - 10:22, 29 May 2016
  • - Web Security and Privacy - Network systems, proxies and servers
    3 KB (440 words) - 15:25, 9 December 2009
  • |Title=5th European Conference on Computer Network Defence |Field=Computer security and reliability
    4 KB (530 words) - 15:02, 27 December 2015
  • |Title=International Workshop on Wireless Multimedia Computing and Security Services - Security, privacy, and cryptographic protocols for WMC
    3 KB (477 words) - 16:54, 8 August 2009
  • |Field=Network Virtual Environment -Trust and security issues in P2P systems
    5 KB (738 words) - 16:48, 10 August 2009
  • * Network architectures and protocols * Network security and intrusion detection
    5 KB (630 words) - 11:13, 1 November 2009
  • * Coordination and deployment of multi-robots system or wireless sensors network on site, * Security issues in agent-based systems for search and rescue missions, use of games,
    6 KB (783 words) - 17:04, 27 December 2015
  • | Title = International journal of Network Security & Its Applications (IJNSA) International journal of Network Security & Its Applications (IJNSA)
    3 KB (339 words) - 11:32, 2 August 2009
  • ...their research results and address open issues in Wireless Communications, Network Technologies, Services and Application. Network Technologies
    2 KB (230 words) - 11:32, 2 August 2009
  • * Network-based applications * Network Security
    7 KB (1,054 words) - 16:43, 27 December 2015
  • * Data privacy and security * Social Network Analysis
    4 KB (553 words) - 11:33, 2 August 2009
  • Information security IT and network security
    2 KB (258 words) - 11:33, 2 August 2009
  • - Social network analysis and mining - Personalization, security and privacy
    4 KB (525 words) - 11:34, 2 August 2009
  • Web Security and Privacy Network systems, proxies and servers
    4 KB (564 words) - 12:01, 6 November 2020
  • |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security
    5 KB (599 words) - 10:21, 20 November 2020
  • * Self-aware and self- adaptive network design and evaluation * Network self-healing, security and self-defence
    4 KB (479 words) - 11:35, 2 August 2009
  • to refer specifically to network performance and reliability dependability, security, accuracy, customer service, trust, etc.). The
    8 KB (1,033 words) - 11:35, 2 August 2009
  • | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)
    6 KB (746 words) - 11:35, 2 August 2009
  • ...so on. Novel mechanisms and designs are required which integrate QoI with network and computational QoS that take into account the aforementioned challenges - Network services (time sync, QoS) for target/event detection, localization, trackin
    5 KB (734 words) - 11:35, 2 August 2009
  • ...o enable seamless, smooth, and reliable multimedia streaming over wireless network. * Security issues and solutions for mobile multimedia retrieval.
    5 KB (674 words) - 11:35, 2 August 2009
  • ...pers, IPSN is very interested in showcasing demonstrations of novel sensor network technology, applications, and hardware as well as posters showing exiting e ...Sensor Networks (IPSN) is a leading, single-track, annual forum on sensor network research. IPSN brings together researchers from academia, industry, and gov
    8 KB (1,119 words) - 09:57, 27 February 2020
  • ? Network design and planning ? Security and privacy
    5 KB (571 words) - 11:35, 2 August 2009
  • Global Production Network Risk and Security Management
    4 KB (462 words) - 11:36, 2 August 2009
  • ...ices into every day’s life processes. This leads to a highly distributed network of devices communicating with human beings as well as other devices. With t ...onse time, resource consumption, throughput, availability, reliability and security.
    9 KB (1,206 words) - 11:40, 2 August 2009
  • ...ons and Technologies - Applications, Protocols, Algorithms, Simulators and Security Security aspects
    3 KB (339 words) - 11:36, 2 August 2009
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    14 KB (1,651 words) - 15:56, 15 February 2017
  • |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security
    3 KB (352 words) - 12:39, 11 August 2009
  • * Database Security and Transaction Support * Advanced Applications of Neural Network
    5 KB (552 words) - 17:06, 12 August 2009
  • |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability
    6 KB (766 words) - 10:54, 26 April 2010
  • |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security
    5 KB (667 words) - 14:27, 13 September 2009
  • * Application security * Blended Internet security methods
    5 KB (607 words) - 18:01, 3 December 2009
  • |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust
    4 KB (484 words) - 14:20, 14 December 2009
  • |Title=3rd International Workshop on Wireless Multimedia Computing and Security Services ...ward for a deeper understanding in wireless multimedia computing (WMC) and security services.
    3 KB (497 words) - 03:43, 28 February 2010
  • ...ometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications in the above themes. Fuzzy and neural network systems
    3 KB (382 words) - 18:27, 20 January 2010
  • |Title=3rd International Conference on Security of Information and Networks |Field=Computer security
    10 KB (1,270 words) - 17:12, 20 April 2010
  • |Title=The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems
    3 KB (338 words) - 16:53, 27 December 2015
  • * › Mobile Network Protocols and Packet Services * › Adaptive Wireless Network Protocols
    4 KB (379 words) - 15:35, 5 February 2010
  • |Title=International Conference on Security and Cryptography |Field=Computer security and reliability
    4 KB (409 words) - 15:40, 5 February 2010
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • |Title=Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments |Field=Computer security and reliability
    3 KB (498 words) - 02:52, 22 December 2012
  • - Simulation issues of large-scale VCS and integration of traffic-network simulators - Security, encryption and privacy for vehicular systems
    5 KB (624 words) - 21:14, 4 March 2010
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc * Cloud Security
    4 KB (405 words) - 20:45, 3 November 2010
  • - Security for enabling eCommerce - Trust & Security Issues in e-Commerce
    4 KB (601 words) - 00:22, 28 March 2010
  • |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress
    2 KB (217 words) - 16:50, 19 November 2020
  • |Superevent=2010 secau Security Congress '''INFORMING SECURITY'''
    2 KB (215 words) - 06:52, 13 April 2010
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • - Security of Communication Networks - Network-based Applications (VoIP, streaming)
    5 KB (667 words) - 12:08, 19 May 2010
  • ...eral disciplines and applications (military, industrial, medical, homeland security, etc.) with the aim of collecting and distributing observations of our worl › Sensor/Sensor Network Ontology Engineering
    5 KB (639 words) - 16:17, 20 May 2010
  • 5. WEB SECURITY * › Web Security and Privacy
    5 KB (627 words) - 12:33, 16 June 2010
  • |Field=Network Virtual Environment - Trust and security issues in P2P systems
    6 KB (858 words) - 09:18, 19 August 2010
  • |Title=The Third International Workshop on Systems and Network Telemetry and Analytics (SNTA2020) |Field=systems and network telemetry, Machine learning, data science, High-performance computing, Dist
    4 KB (584 words) - 17:42, 13 March 2020
  • |Title=Usenix Network and Distributed System Security Symposium |Field=Security
    147 bytes (20 words) - 00:56, 28 February 2020
  • *Network and system architectures and protocols *Security and privacy
    3 KB (412 words) - 09:52, 27 February 2020
  • |Title=Usenix Network and Distributed System Security Symposium
    684 bytes (84 words) - 11:33, 10 March 2020
  • * › Database Security and Transaction Support * › Advanced Applications of Neural Network
    19 KB (2,462 words) - 19:10, 26 August 2010
  • * Foundations of Privacy, Trust and Reputation in Network * Network Models for Distributed Computing
    4 KB (602 words) - 06:44, 26 August 2020
  • |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium
    3 KB (343 words) - 16:31, 6 May 2020
  • NEURAL NETWORK MODELS * Neural network approaches to optimization
    5 KB (574 words) - 15:58, 6 March 2020
  • * Security in distributed computing, cryptographic protocols * System-on-chip and network-on-chip architectures
    3 KB (344 words) - 11:30, 21 April 2020
  • Network algorithms • Network architectures
    4 KB (579 words) - 15:24, 13 October 2010
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • ...s a publication vehicle for complete coverage of all topics of interest to network professionals and brings to its readers the latest and most important findi • Network Architectures and Protocols • Network Coding
    3 KB (318 words) - 16:46, 5 July 2020
  • ...practical aspects of health informatics and bioinformatics and a chance to network with others working and researching in this or related areas. Security, Ethics and Privacy
    5 KB (693 words) - 10:44, 14 November 2010
  • * Scale-free network structure of Cyber Physical Systems * System-on-Chip and Network-on-Chip Design
    12 KB (1,378 words) - 21:13, 28 November 2010
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 12:34, 14 October 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (556 words) - 12:33, 14 October 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (552 words) - 08:13, 10 December 2010
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 10:24, 6 July 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 12:33, 14 October 2020
  • |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (217 words) - 16:57, 27 December 2015
  • ...ecial Issue on Smart Protocols and Algorithms of the International Journal Network Protocols and Algorithms (ISSN 1943-3581) ...ng capacity let us include more complex algorithms that can be used by the network device to enhance the communication procedure.
    6 KB (833 words) - 15:16, 24 September 2020
  • |Field=Computer security and reliability `SysSec <http://syssec-project.eu>`_ is a Network of Excellence in the
    5 KB (701 words) - 05:52, 14 April 2011
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev
    3 KB (462 words) - 11:51, 22 March 2020
  • |Title=10th IEEE International Symposium on Network Computing and Applications The IEEE International Symposium on Network Computing and Applications is seeking articles concerning fundamental resea
    3 KB (322 words) - 05:59, 8 March 2011
  • A rational network can be defined as a network in which rational (self interested) participants have no reason to deviate from the actual network intended purposes (critical or not). To this
    7 KB (1,019 words) - 18:29, 8 April 2011
  • * Network Optimization * Security
    3 KB (283 words) - 11:37, 1 July 2011
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc Service and Systems Design and QoS Network Security
    5 KB (677 words) - 11:59, 1 July 2011
  • ...Applications, Society, e-Communities, e-Business, Web Intelligence and Web Security. Web Security and Privacy
    5 KB (612 words) - 12:07, 1 July 2011
  • *Network Interfaces *Network Management
    13 KB (1,774 words) - 18:35, 31 August 2011
  • * What does a network of truly interconnected documents look like? How could interoperability acr ...semantic technologies for HealthCare, Medical Informatics and Computer Security. Projects with high relevance to social networking, low-tech environments
    8 KB (1,106 words) - 15:50, 20 July 2011
  • - Security related issues of satellite communications - Infrastructure and network management
    9 KB (1,218 words) - 16:06, 1 October 2020
  • Network models (mobility models, traffic models, network topology) Security and emergency applications
    6 KB (809 words) - 16:26, 28 September 2011
  • Don't miss out on the opportunity to network with international researchers and practitioners and discuss the latest res *Privacy and Security
    5 KB (669 words) - 14:40, 20 December 2011
  • Information Security Network Management
    8 KB (1,085 words) - 16:28, 6 February 2012
  • - SOFTNETWORKING: Advances in Software Defined Networking and Network Communications modeling; Communications security; Computer
    6 KB (725 words) - 19:58, 22 November 2020
  • Neural network Head of 'Decision Support and Control Systems' Network Research Centre and Director of Postgraduate Admissions,
    11 KB (1,490 words) - 11:59, 27 January 2012
  • |Field=Computer security and reliability * Cyber Security
    2 KB (304 words) - 10:54, 5 March 2012
  • Energy-aware network equipments and applications Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability
    10 KB (1,297 words) - 17:49, 24 February 2012
  • ...venth International Workshop on Frontiers in Availability, Reliability and Security |Field=Computer security and reliability
    2 KB (221 words) - 16:12, 29 February 2012
  • ...ques to adjust the multimedia transmission protocols to compliant with the network’s various situations. This workshop will be held in conjunction with the - Intelligent Video Network Engineering with Distributed Optimization
    5 KB (726 words) - 15:28, 2 March 2012
  • ...t-contention protocols; Named data networking; Adaptive contention window; Network mobility models; Spectrum aggregation schemes; Smart meters; Dynamic load; ...rks; Network function virtualization (NFV) of small cells; Self-organizing network functionalities for virtualized small cells; The role of open source softwa
    13 KB (1,580 words) - 19:35, 18 February 2021
  • |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security
    4 KB (581 words) - 18:48, 24 February 2020
  • ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modelling) ...cessing (e.g. graph neural networks, domain adaptation, transfer learning, network architectures, neural ranking, neural recommendation, and neural prediction
    5 KB (653 words) - 13:04, 3 August 2023
  • |Title=19th International Conference on Applied Cryptography and Network Security |Field=computer security
    870 bytes (109 words) - 19:16, 22 January 2021
  • *Security, privacy, and trust *Social network analytics
    4 KB (535 words) - 21:32, 11 February 2020
  • *Security, privacy, and trust *Social network analytics
    4 KB (500 words) - 17:29, 6 January 2021
  • • Semantic social network analysis • Information and data governance, information assurance, security, compliance
    6 KB (872 words) - 23:11, 24 February 2020
  • * Network operations and management * Network security
    5 KB (630 words) - 05:00, 19 April 2012
  • Communication & Network systems: Computer & Network Security Systems
    10 KB (1,363 words) - 09:26, 7 May 2012
  • ...cations, Neural Networks and Applications, Remote Sensing, Self Organizing Network (SON), Project IEEE.802. ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and
    3 KB (434 words) - 22:46, 30 May 2012
  • Neural Network Applications Data Security
    10 KB (1,492 words) - 17:22, 26 June 2012
  • Wireless Network Protocols Network Architecture
    5 KB (600 words) - 14:41, 20 June 2012
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc Service and Systems Design and QoS Network Security
    5 KB (662 words) - 18:50, 20 June 2012
  • Smart Grid Security and Reliability Energy Efficient Network Hardware
    5 KB (649 words) - 10:44, 21 June 2012
  • |Field=terrorism, national security, crime, politics, law |Superevent=secau Security Congress
    4 KB (575 words) - 05:16, 28 June 2012
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • |Title=25th Usenix Network and Distributed System Security Symposium
    638 bytes (81 words) - 11:59, 10 March 2020
  • - Security and Access Control<br /> - Network Systems and Devices <br />
    3 KB (466 words) - 13:00, 16 August 2012
  • Advanced Applications of Neural Network Security
    5 KB (552 words) - 15:08, 21 August 2012
  • Co-sponsorship with International Network of Social Network Analysis (INSNA) ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society.
    6 KB (728 words) - 01:01, 25 August 2012
  • - Energy-efficient network services and operations - Energy-aware network equipments and applications
    4 KB (491 words) - 22:39, 28 August 2012
  • Network Security
    2 KB (234 words) - 08:25, 26 October 2012
  • Information Security Computer & Network Security
    2 KB (224 words) - 08:27, 26 October 2012
  • • Wireless Network Protocols • Network Architecture
    5 KB (647 words) - 19:06, 5 April 2013
  • ...esearchers, academics and practitioners specializing in the area of Mobile Network Management, Service Management, Virtualization and Object Management. ...and cooperation in an environment with a multitude of access technologies, network operators and business actors.
    9 KB (1,145 words) - 16:57, 11 April 2013
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • ** Social network analysis with Semantic Web Technologies ** Representing and reasoning about trust, privacy, and security
    5 KB (711 words) - 19:02, 7 March 2020
  • *Information Security and Cryptography *Network and Cyber Security
    2 KB (227 words) - 11:30, 21 June 2016
  • ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.
    3 KB (422 words) - 12:09, 24 April 2016
  • ...ogy; Computational neuroscience; Cognitive models; Neural hardware; Neural network theory & models; Neurodynamics; Neuroinformatics; Neuroengineering; Computa ...en Computing; Hybrid systems; Self-aware systems; Sensor networks; Network security; Petrochemical; Oil & Gas.
    3 KB (309 words) - 17:11, 18 February 2021
  • ...by people who make things work - just like you. In addition, attendees can network with experts in a variety of fields. These relationships provide great valu * Data Science (Data Mining, Machine Learning, Network Analytics)
    10 KB (1,347 words) - 15:01, 26 September 2016
  • Climate, Energy, Food, Health, Transport, Security, and Social Sciences – are the most important societal challenges tackled * Transport - Streaming sensor network and geospatial data integration
    3 KB (412 words) - 08:53, 24 September 2016
  • * Semantic social network analysis * Information Assurance and Security
    9 KB (1,131 words) - 23:18, 24 February 2020
  • |Field=social networks, complex networks, large networks, network and security
    529 bytes (63 words) - 13:47, 25 September 2016
  • * Information systems and Network security
    2 KB (197 words) - 16:16, 10 November 2016
  • ...IEICE Transactions Special Section on Information and Communication System Security (August 2017) |Field=security, informatioin security, network security, cyber security
    421 bytes (51 words) - 15:56, 15 February 2017
  • * Semantic social network analysis * Information and data governance, information assurance, security, compliance
    6 KB (877 words) - 23:06, 24 February 2020
  • ...ACM 2016 : 2016 6th International Conference on Communication and Network Security(ICCNS 2016)--ACM, EI and Scopus
    451 bytes (56 words) - 16:17, 8 July 2016
  • - Knowledge Base and Semantic Network - Security and Privacy
    12 KB (1,565 words) - 04:15, 5 August 2023
  • ...NCS 2016 : Eighth International Conference on Network and Communications Security |Field=security, networking, communications, network security
    433 bytes (52 words) - 11:17, 5 September 2016
  • |Title=ICNCT 2017 : 5th International Conference on Network and Computing Technologies (ICNCT 2017) |Field=networks, computing, cloud computing, network security
    443 bytes (50 words) - 09:31, 19 July 2019
  • |Field=cloud computing, multimedia, network security, networking
    416 bytes (48 words) - 10:48, 11 September 2016
  • |Field=communications, software engineering, networks, network security
    467 bytes (58 words) - 10:48, 11 September 2016
  • |Field=data mining, network, mechanisms&methods ...ment for sensors; Data mining and management for wireless systems; Dynamic network discovery; Mining from multiple sources; Mining personal semantic data; Min
    10 KB (1,305 words) - 00:29, 12 December 2020
  • |Title=SMGSSP 2017: Smart Micro-Grid Systems Security and Privacy |Field=privacy, security, smart micro-grids, cyber-physical systems
    2 KB (246 words) - 09:12, 3 September 2017
  • - Data Science: Methods for analyzing scientific data, business data, social network analysis, recommender systems, mining sequences, time series analysis, onli ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (282 words) - 10:48, 8 February 2020
  • * Data Science: Methods for analyzing scientific data, business data, social network analysis, recommender systems, mining sequences, time series analysis, onli ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (270 words) - 10:49, 8 February 2020
  • ...S-ACM 2016 : 2016 4th International Conference on Information and Network Security (ICINS 2016)--Ei Compendex
    452 bytes (54 words) - 10:46, 11 September 2016
  • * security and privacy * social network applications
    9 KB (1,190 words) - 10:12, 5 June 2019
  • Emerging cellular and new network architectures for 5G Communication Security, Trust, Protocols and Applications
    5 KB (588 words) - 18:00, 21 January 2017
  • - Smart city network management and services - Smart city system security and privacy
    4 KB (565 words) - 09:46, 7 February 2017
  • Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –
    5 KB (631 words) - 15:09, 10 April 2017
  • Security and Access Control Information Content Security
    4 KB (528 words) - 18:46, 29 August 2017
  • *security and privacy *social network analytics
    10 KB (1,309 words) - 10:29, 5 June 2019
  • *Web Security, Integrity, Privacy, and Trust *Visualizing Social Network Data
    18 KB (2,394 words) - 16:28, 29 January 2018
  • * Semantic social network analysis * Information/data governance, information assurance, security, compliance
    6 KB (798 words) - 23:16, 24 February 2020
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • ...inals, users’ needs and services (data, content, live streams or complex network services). - Network interoperability in the e-health ecosystems
    4 KB (509 words) - 11:36, 8 August 2017
  • *Semantics for Safety, Security & Privacy *Semantics for IT Safety & Security
    6 KB (759 words) - 15:52, 5 December 2018
  •  Data collection, analytics, security and management  Network techniques for real-time data processing
    4 KB (532 words) - 13:28, 28 July 2017
  • through the global network. Further, the conference considers as essential the - Edge Cloud Network Management
    7 KB (1,009 words) - 13:39, 3 September 2017
  • Management Issues of Social Network Big Data Security Applications of Big Data
    3 KB (461 words) - 13:22, 3 September 2017
  • |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)
    4 KB (562 words) - 12:05, 3 September 2017
  • * Security and Information Assurance * International Journal of Network Security & Its Applications (IJNSA)
    5 KB (651 words) - 11:34, 8 August 2017
  • Big data security, Database security Security and fault tolerance for embedded or ubiquitous systems
    3 KB (464 words) - 09:30, 3 September 2017
  • science and services, Web Information Systems and Applications, Computer Network Computer Network and Application Technology
    5 KB (673 words) - 09:53, 3 September 2017
  • research that includes AI and Big Data Analytics, Network Communication & Security, Computer Vision. Following the past successful symposium SoICT 2016,
    4 KB (559 words) - 11:58, 8 August 2017
  • researchers to extend their research network. Databases; Security and Cryptography; Operating Systems; Networks, Distributed
    3 KB (438 words) - 11:45, 8 August 2017
  • |Title=IJMNCT 2017 : International Journal of Mobile Network Communications & Telematics INTERNATIONAL JOURNAL OF MOBILE NETWORK COMMUNICATIONS & TELEMATICS (IJMNCT)
    6 KB (751 words) - 13:28, 28 July 2017
  • |Title=SPDF-Mobile 2017 : Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security
    4 KB (536 words) - 09:59, 21 August 2017
  • * Cryptography, security and privacy of mobile & wireless networks Network research field.
    6 KB (820 words) - 13:30, 28 July 2017
  • Performance analysis, QoS and network management Advanced wireless network technologies, architectures
    3 KB (415 words) - 13:30, 28 July 2017
  • - Network Functions Virtualization - Software Define Network
    6 KB (873 words) - 13:30, 28 July 2017
  • Network functions virtualization and software defined networking Network coding techniques
    4 KB (524 words) - 13:30, 28 July 2017
  • Network-based computing systems Network management & security
    4 KB (497 words) - 11:58, 8 August 2017
  • - Computer Network and Architecture - Information Security & Risk Management
    6 KB (814 words) - 09:03, 3 September 2017
  • Network architecture and protocols for heterogeneous IoT Network operation and management
    4 KB (483 words) - 10:00, 21 August 2017
  • |Field=security aspects. Original papers are invited on Computer Networks, Network Protocols and
    4 KB (486 words) - 11:57, 8 August 2017
  • |Title=IJNSA 2017 : International Journal of Network Security & Its Applications -- UGC, ERA Indexed |Field=security
    4 KB (628 words) - 13:34, 28 July 2017
  • |Field=security aspects. Original papers are invited on computer Networks, Network Protocols and
    4 KB (546 words) - 11:35, 8 August 2017
  • |Acronym=COMNET SI SDN/NFV Security/Performance 2017 ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV
    4 KB (515 words) - 11:28, 6 November 2020
  • |Title=ICISS 2017 : International Conference on Information Systems Security |Field=security
    5 KB (626 words) - 12:02, 3 September 2017
  • |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
    5 KB (722 words) - 10:00, 21 August 2017
  • |Title=DMCS 2017 : DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17) |Field=security
    4 KB (626 words) - 09:30, 3 September 2017
  • |Title=ICNS - Ei 2017 : 2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus |Field=security
    2 KB (308 words) - 11:50, 3 September 2017
  • |Title=SPIoT 2017 : The 6th International Symposium on Security and Privacy on Internet of Things |Field=security
    3 KB (379 words) - 12:01, 3 September 2017
  • and network security. Large Network Analysis - methods, algorithms, processes, analytic tools
    4 KB (442 words) - 10:00, 21 August 2017
  • Embedded Systems and Communication: Computer Networks; Network and Security; Signal Processing; Sensor Network; Network and Systems.
    4 KB (495 words) - 13:34, 28 July 2017
  • ...: ACM--2017 the 7th International Conference on Communication and Network Security (ICCNS 2017)--SCOPUS, Ei Compendex |Field=network security
    2 KB (216 words) - 13:34, 28 July 2017
  • ...ICINS 2017 : 2017 5th International Conference on Information and Network Security (ICINS 2017)--Ei Compendex and Scopus |Field=network security
    1 KB (130 words) - 13:34, 28 July 2017
  • - Security - Sensor networks / Ad hoc network
    4 KB (580 words) - 20:58, 12 November 2020
  • wellness, safety and security, energy and environment, communication and • Safety, security, data privacy, reputation and trust management in smart
    5 KB (696 words) - 11:36, 8 August 2017
  • - Wireless Network Protocols - Network Performance
    5 KB (632 words) - 12:30, 3 September 2017
  • |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)
    5 KB (640 words) - 13:34, 28 July 2017
  • Allocation and Network Optimization in C-RAN" - Security
    4 KB (475 words) - 12:34, 8 August 2017
  • (18) Heterogeneous Network Topologies and Configurations (20) Information Security and Cryptography
    1 KB (157 words) - 13:19, 28 July 2017
  • * Security and Privacy on the Web *Social Network Analysis and Graph Algorithms for the Web
    12 KB (1,422 words) - 10:18, 5 October 2023
  • questions of peace, security and human security abound. In this period of great intersection of security and sustainability, as well as of the continued legacy
    7 KB (1,000 words) - 12:07, 3 September 2017
  • Computer Security SEC Social Network and Media Analysis SONAMA
    5 KB (660 words) - 13:50, 8 April 2020
  • Advanced Machine Learning Technologies for Network Security.
    3 KB (355 words) - 12:33, 3 September 2017
  • Network Security
    2 KB (212 words) - 13:19, 28 July 2017
  • |Title=WiMoA 2017 : 9th International Conference on Wireless, Mobile Network & Applications 9th International Conference on Wireless, Mobile Network & Applications (WiMoA
    5 KB (616 words) - 13:19, 28 July 2017
  • various types of networks, including emerging network function virtualization -Security and privacy for SOCA
    4 KB (494 words) - 13:20, 28 July 2017
  • - Information Content Security - Web Services Security
    2 KB (242 words) - 11:35, 8 August 2017
  • Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile and network infrastructures; Crowd sourcing; Reliability, Security, Privacy and
    4 KB (508 words) - 13:23, 28 July 2017
  • - Security - Sensor networks / Ad hoc network
    3 KB (346 words) - 19:16, 26 November 2020
  • * Test, Verification, and Security of Digital Systems * Network Processor Architectures
    1 KB (178 words) - 10:05, 20 November 2020
  • - Advanced Applications of Neural Network - Security
    6 KB (818 words) - 13:40, 3 September 2017
  • |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security
    4 KB (565 words) - 17:27, 18 February 2021
  • ...e=WICS 2017 : 4th International Workshop on Information and Communication Security |Field=security
    3 KB (347 words) - 19:48, 22 November 2017
  • |Field=security Communications Systems, Embedded Systems and Information Security , to attract a
    6 KB (743 words) - 11:45, 8 August 2017
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security
    5 KB (611 words) - 11:47, 8 August 2017
  • |Field=security * International Journal On Cryptography And Information Security (IJCIS)
    7 KB (946 words) - 13:28, 28 July 2017
  • ...Ei & Scopus 2018 : 2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus |Field=network security
    1 KB (171 words) - 09:58, 21 August 2017
  • scalability, elasticity, availability, reliability, and security. Alma Riska, Network Appliances, USA
    11 KB (1,364 words) - 13:23, 3 September 2017
  • ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security
    8 KB (1,170 words) - 13:40, 3 September 2017
  • - Energy Efficient Network Hardware - Security and Privacy
    6 KB (825 words) - 13:22, 3 September 2017
  • |Field=network security
    1 KB (160 words) - 09:58, 21 August 2017
  • greatly expand on your global network of scholars and professionals. Human Rights and Security
    2 KB (262 words) - 09:58, 21 August 2017
  • |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer
    5 KB (571 words) - 11:53, 3 September 2017
  • ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security Data intelligence and data security are two closely related views, while data
    4 KB (484 words) - 10:00, 21 August 2017
  • Information Security Network Security
    2 KB (269 words) - 11:57, 3 September 2017
  • Network intelligence and network Control Information Security & Computer Forensics
    2 KB (246 words) - 12:11, 3 September 2017
  • |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service
    5 KB (571 words) - 10:51, 3 September 2017
  • and intelligent data processing, as well as enhanced data security and privacy Management Issues of Social Network Big Data
    6 KB (876 words) - 09:59, 21 August 2017
  • * Security and Information Assurance * International Journal of Network Security & Its Applications (IJNSA)
    4 KB (478 words) - 08:48, 16 May 2020
  • * Scientific information network analysis * Privacy and security issues
    4 KB (566 words) - 10:00, 21 August 2017
  • network-based Processing - Security and Privacy aspects of data management in clouds and IoT systems
    6 KB (880 words) - 10:00, 21 August 2017
  • ...he presentation of work in progress, and the establishment of a scientific network between young researchers in the region. ...would like to provide an opportunity for people to establish a scientific network that can be intensely used, including mutual visits at affordable costs. Th
    7 KB (910 words) - 10:36, 26 November 2017
  • ...he presentation of work in progress, and the establishment of a scientific network between young researchers in the region. - Security, compliance, and non-functional requirements and properties
    4 KB (565 words) - 18:34, 4 July 2020
  • progress, and the establishment of a scientific network between young opportunity for people to establish a scientific network that can be intensely
    7 KB (1,046 words) - 10:36, 26 November 2017
  • * Anonymity, security and trust for Web access ** [[has general chair::Hans Akkermans]], Network Institute, VU Amsterdam, The Netherlands
    8 KB (1,023 words) - 19:05, 7 March 2020
  • ...- just like you. In addition, attendees will have a unique opportunity to network with experts in a variety of fields. These relationships provide great valu *Semantics for IT Safety & Security
    11 KB (1,487 words) - 13:45, 13 May 2019
  • * Interconnection network, router and network interface architecture * Architectural support for security or virtualization
    2 KB (315 words) - 11:47, 11 May 2020
  • ...chine learning, in fields like medicine, biology, industry, manufacturing, security, education, virtual environments, games, are especially encouraged. * neural network learning
    3 KB (425 words) - 20:41, 7 September 2019
  • *Big Data platforms with applications to network management, security, measurements *Design, analysis, and evaluation of network architectures
    2 KB (290 words) - 11:16, 6 April 2020
  • |Title=Usenix Network and Distributed System Security Symposium
    601 bytes (76 words) - 12:01, 10 March 2020
  • |Title=16th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    687 bytes (85 words) - 14:17, 6 November 2020
  • |Title=17th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    712 bytes (89 words) - 14:18, 6 November 2020
  • |Title=18th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    923 bytes (110 words) - 14:21, 6 November 2020
  • *Real-Time Age Detection Using a Convolutional Neural Network *A Maturity Model for IT-related Security Incident Management
    7 KB (917 words) - 18:07, 17 March 2020
  • |Title=International Conference on Cryptology and Network Security |Field=Security
    149 bytes (20 words) - 11:09, 22 March 2020
  • |Title=International Conference on network and System Security
    114 bytes (16 words) - 01:25, 18 March 2020
  • Text mining and social network analysis Security
    4 KB (401 words) - 07:52, 29 July 2020
  • |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
    11 KB (1,549 words) - 11:34, 17 April 2020
  • |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (152 words) - 10:13, 17 April 2020
  • * network theory and communication networks * privacy and security
    2 KB (192 words) - 08:38, 14 April 2020
  • === Information Security === ...lysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies.
    3 KB (314 words) - 11:52, 27 March 2020
  • |Title=15th International Conference on Availability, Reliability, and Security The International Conference on Availability, Reliability, and Security (ARES) 2020
    3 KB (313 words) - 17:14, 4 November 2020
  • |Title=International Conference on Cryptology and Network Security
    617 bytes (70 words) - 14:35, 14 January 2021
  • |Title=16th EAI International Conference on Security and Privacy in Communication Networks * Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
    2 KB (299 words) - 13:10, 30 March 2020
  • * Wireless Network Security
    2 KB (192 words) - 14:37, 11 December 2023
  • *Big data platforms with applications to network management, security, measurements *Design, analysis, and evaluation of network architectures
    2 KB (238 words) - 11:18, 6 April 2020
  • |Title=14th International Conference on Provable and Practical Security ...s are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:
    2 KB (208 words) - 10:19, 9 April 2020
  • |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions
    2 KB (195 words) - 11:08, 9 April 2020
  • |Title=11th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (155 words) - 10:20, 17 April 2020
  • |Title=10th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (153 words) - 10:27, 17 April 2020
  • ...power lines) in Smart Grids; Data aggregation, privacy considerations, and network data anonymization; Mobility issues in Smart Grids; Demand - response with Utilities and transportation assets; Smart Grid efficiency, security and reliability; Smart Grids and renewable technologies; Enabling active pa
    10 KB (1,331 words) - 14:52, 19 April 2020
  • ...; Cognitive machine-to-machine networks; Adaptive multiple access schemes; Network service providers; Heterogeneous cellular networks; Caching in mobile cellu ENCOT: Emerging Network Communications and Technologies
    14 KB (1,770 words) - 14:56, 19 April 2020
  • |Title=14-th International Workshop on Advances in Information Security * Security of next generation Operating Systems
    2 KB (200 words) - 12:01, 28 April 2020
  • ...ems, payloads, communications, levels of autonomy, manned-unmanned swarms, network-controlled swarms, as well as challenges related to policies, procedures, r * Security
    3 KB (385 words) - 15:55, 29 April 2020
  • ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc. ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of serv
    4 KB (457 words) - 10:25, 6 May 2020
  • ...omplexity, predictability, quality of service, reliability, dependability, security, scalability, programmer productivity, etc. * Architectures and compilers for embedded processors, DSPs, GPUs, ASIPs (network processors, multimedia, wireless, etc.).
    4 KB (431 words) - 10:40, 6 May 2020
  • ...x effects, which must be controlled to adhere to safety, availability, and security guarantees where needed. This special day will cover the latest trends in a D7 Network on Chip, Click here for details
    12 KB (1,651 words) - 13:30, 27 November 2020
  • * Network Operations and Management * Information Infrastructure and Security
    2 KB (175 words) - 10:44, 7 May 2020
  • * Network Operations and Management * Information Infrastructure and Security
    2 KB (174 words) - 10:43, 7 May 2020
  • ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more. ...s; runtime systems; parallel and distributed systems; storage; networking; security and privacy; virtualization; software-hardware interactions; performance ev
    8 KB (1,078 words) - 09:27, 12 May 2020
  • * Networking (WAN, LAN, and datacenter) and network services * Security, privacy, and trust
    6 KB (729 words) - 09:28, 12 May 2020
  • * 5. Neural Network and Neuromorphic Computing: * 5.1. Hardware and devices for neuromorphic and neural network computing
    6 KB (739 words) - 15:08, 13 May 2020
  • * Visualizing Large Scale Security Data * HCI Challenges for Big Data Security & Privacy
    4 KB (563 words) - 15:55, 23 June 2020
  • * Visualizing Large Scale Security Data * HCI Challenges for Big Data Security & Privacy
    5 KB (543 words) - 21:14, 18 May 2020
  • * Mining graph and network data * Security and intrusion detection
    2 KB (261 words) - 20:06, 20 May 2020
  • ● Mining graph and network data ● Security and intrusion detection
    2 KB (268 words) - 20:28, 20 May 2020
  • * Mining graph and network data * Security and intrusion detection
    2 KB (272 words) - 21:17, 20 May 2020
  • * Web/online/network mining and learning * Structure/group/community/network mining
    4 KB (515 words) - 16:39, 25 May 2020
  • * Web/online/social/network mining and learning. * Structure/group/community/network mining.
    3 KB (308 words) - 16:50, 16 December 2020
  • * Visualizing Large Scale Security Data * HCI Challenges for Big Data Security & Privacy
    9 KB (1,187 words) - 14:18, 27 May 2020
  • * Fuzzy web engineering, information retrieval, text mining, and social network analysis * Computational intelligence in security
    2 KB (238 words) - 17:30, 6 May 2021
  • ...the Conference on Web and Internet Economics (named Workshop on Internet & Network Economics until 2013), which was held annually from 2005 to present. * Economic Aspects of Security and Privacy
    2 KB (329 words) - 13:48, 23 June 2020
  • ...obile devices and Internet technologies; Mobile IPv6 over Software Defined Network (SDN); Generative Mappings; Intensive mobile data processing; Virtualizatio ...s; Automatic computing for Web services; Web services challenges on trust, security, performance, scalability; Enterprise Web services; Web services discovery,
    14 KB (1,804 words) - 13:49, 5 June 2020
  • ...; Access control in mobile environments; Advanced roaming concepts; Mobile network edge-based service delivery platforms; Mobile content delivery networks; Mo Security and privacy environments; Protection and safety of distributed mobile data;
    7 KB (918 words) - 13:51, 5 June 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    17 KB (2,088 words) - 12:49, 14 June 2020
  • ...ment for sensors; Data mining and management for wireless systems; Dynamic network discovery; Mining from multiple sources; Mining personal semantic data; Min ...igration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques
    11 KB (1,356 words) - 12:56, 14 June 2020
  • * Economic Aspects of Security and Privacy * Social Networks and Network Games
    2 KB (291 words) - 14:12, 23 June 2020
  • * Economic Aspects of Security and Privacy * Network Games
    5 KB (601 words) - 07:58, 24 June 2020
  • * Economic Aspects of Security and Privacy * Network Games
    3 KB (409 words) - 11:05, 24 June 2020
  • * R12 Network, Passive and MIMO Radars, Multi-Sensor and Multi-Static Systems and Data Fu * R18 Defence and Security, Surveillance, Remote Traffi c Monitoring, Sense and Avoid Applications
    2 KB (300 words) - 19:03, 25 June 2020
  • ...nt and control of high speed networks; Performance in high speed networks; Security aspects in high speed networks; QoS/SLA in high speed networks; Diagnosing ...Management and control of sensor networks; Performance in sensor networks; Security and reliability aspects in sensor networks; Information assurance in sensor
    13 KB (1,636 words) - 11:51, 10 July 2020
  • * Network Algorithms and Performance Evaluation * Communications and Information Security
    3 KB (483 words) - 08:08, 21 August 2020
  • * Formal Methods for Network Information Management * Network Economics and Incentive-Based Computing Related to Networks
    4 KB (556 words) - 06:42, 26 August 2020
  • * Algorithmic and Complexity Aspects of Network Economics * Algorithmic Aspects of Security and Privacy
    4 KB (503 words) - 06:44, 26 August 2020
  • Air, Road, Rail and Waterways Transportation Network and Systems Security, Privacy and Safety Systems
    1 KB (156 words) - 13:41, 10 July 2020
  • ...or, etc.) in social networks; Dynamicity of social event detection; Social network and interaction analysis around places and events; Social media visualizati ...nalized opinions across blogs, social media, news sites; Balancing privacy/security/reliability/utility/usability of personal data; Multiple patterns extractio
    9 KB (1,068 words) - 19:47, 9 July 2020
  • ...DN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality ...and discovery of things on the Internet; Crowd-sourcing and things; Trust, security and privacy in Internet of Things; Lightweight implementations of cryptogra
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ..."Spectrum Allocation and Management", "Wireless and mobile technologies", "Security in wireless and mobile environment" ...ells; Reconfigurable Radio Frequency (RF) receivers; Traffic-aware of NFV (Network Function Virtualization); Energy harvesting; Large-scale array of dense dis
    11 KB (1,335 words) - 02:28, 10 July 2020
  • ...Networking and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deployment" ...ivate organizations; Cybersecurity risks; Smart home security and privacy; Security awareness; Digital forensics; Large e-Commerce; Digital crowdfunding platfo
    18 KB (2,036 words) - 02:36, 10 July 2020
  • ...entric systems; User-centric business models; User-centric requirements in network-centric approaches; User-centric and critical time-centric applications and Machine learning and artificial neural networks; Network control and feedback with man-in-the-loop; Multi-sensor user interfaces (e.
    10 KB (1,232 words) - 16:20, 22 March 2021
  • Text mining and social network analysis Security
    4 KB (422 words) - 08:30, 29 July 2020
  • |Field=Networking, Internet, Security, Sensor, Hardware, Technologies ...Standardization of IoT applications; Flow-based security; Adaptive trust; Security operations centers; Trusted data marketplaces; IoT Cloud-based videoconfere
    7 KB (904 words) - 12:32, 22 January 2021
  • |Title=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies
    15 KB (1,886 words) - 16:16, 25 August 2020
  • ...chronization; Tracking and partial position information; Failure handling; Security and authentication ...ectures; Hierarchical clustering architectures; Group-based Architectures; Network topologies; Mesh networking; Device centric sensor networks; Distributed co
    15 KB (1,880 words) - 14:45, 27 August 2020
  • ** Security, privacy, liability, and dependability of vehicular networks ** Innovative vehicular network applications and their communication requirements
    4 KB (493 words) - 23:17, 12 October 2020
  • * Privacy, security, ethical, and social issues * Fuzzy Logic and Neural Network applications
    9 KB (896 words) - 16:31, 6 August 2020
  • * Network information theory * Privacy and security
    973 bytes (104 words) - 07:27, 13 August 2020
  • * Network Algorithms and Performance Evaluation * Communications and Information Security
    3 KB (482 words) - 08:25, 21 August 2020
  • * Communications and Information Security * Network Algorithms and Performance Evaluation
    3 KB (489 words) - 09:05, 21 August 2020
  • * Communications and Information Security * Network Algorithms and Performance Evaluation
    4 KB (604 words) - 09:59, 21 August 2020
  • |Title=8th International Conference on Availability, Reliability, and Security The 8th International Conference on Availability, Reliability and Security (ARES) 2013
    4 KB (468 words) - 11:39, 21 August 2020
  • |Title=9th International Conference on Availability, Reliability and Security The 9th International Conference on Availability, Reliability and Security (ARES) 2014
    4 KB (538 words) - 11:52, 21 August 2020
  • |Title=14th International Conference on Availability, Reliability, and Security The 14th International Conference on Availability, Reliability, and Security (ARES) 2019
    5 KB (627 words) - 10:49, 25 August 2020
  • ...ty of health data to benefit patient and public health safety, privacy and security; Integrating heterogeneous clinical data into central data warehouses; Pati ..., optimization, and simulation; Real-time emergency situations management; Security and accuracy of emergency communications; Geolocalisation and optimization
    16 KB (2,024 words) - 13:33, 24 August 2020
  • |Title=23rd Annual International Conference on Information Security and Cryptology Cloud Computing Security
    2 KB (169 words) - 10:42, 25 August 2020
  • |Title=13th International Conference on Availability, Reliability and Security The 13th International Conference on Availability, Reliability and Security (ARES) 2018
    3 KB (336 words) - 11:20, 25 August 2020
  • |Title=10th International Conference on Availability, Reliability and Security The 10th International Conference on Availability, Reliability and Security (ARES) 2015
    5 KB (590 words) - 11:54, 25 August 2020
  • * Algorithms for network optimization * Algorithms for information security and privacy
    4 KB (436 words) - 12:06, 25 August 2020
  • |Title=11th International Conference on Availability, Reliability and Security The 11th International Conference on Availability, Reliability and Security (ARES) 2016
    5 KB (581 words) - 12:47, 25 August 2020
  • |Title=13th International Conference on Security and Privacy in Communications Networks Also known as: 13th EAI International Conference on Security and Privacy in Communication Networks (EAI = European Alliance for Innovati
    3 KB (326 words) - 09:35, 10 September 2020
  • |Title=12th International Conference on Security and Privacy in Communications Networks Also known as: 12th EAI International Conference on Security and Privacy in Communication Networks (EAI = European Alliance for Innovati
    3 KB (336 words) - 09:51, 10 September 2020

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)