Search results

Jump to: navigation, search
  • |Title=Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments |Field=Computer security and reliability
    3 KB (498 words) - 02:52, 22 December 2012
  • - Simulation issues of large-scale VCS and integration of traffic-network simulators - Security, encryption and privacy for vehicular systems
    5 KB (624 words) - 21:14, 4 March 2010
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc * Cloud Security
    4 KB (405 words) - 20:45, 3 November 2010
  • - Security for enabling eCommerce - Trust & Security Issues in e-Commerce
    4 KB (601 words) - 00:22, 28 March 2010
  • |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress
    2 KB (217 words) - 16:50, 19 November 2020
  • |Superevent=2010 secau Security Congress '''INFORMING SECURITY'''
    2 KB (215 words) - 06:52, 13 April 2010
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • - Security of Communication Networks - Network-based Applications (VoIP, streaming)
    5 KB (667 words) - 12:08, 19 May 2010
  • ...eral disciplines and applications (military, industrial, medical, homeland security, etc.) with the aim of collecting and distributing observations of our worl › Sensor/Sensor Network Ontology Engineering
    5 KB (639 words) - 16:17, 20 May 2010
  • 5. WEB SECURITY * › Web Security and Privacy
    5 KB (627 words) - 12:33, 16 June 2010
  • |Field=Network Virtual Environment - Trust and security issues in P2P systems
    6 KB (858 words) - 09:18, 19 August 2010
  • |Title=The Third International Workshop on Systems and Network Telemetry and Analytics (SNTA2020) |Field=systems and network telemetry, Machine learning, data science, High-performance computing, Dist
    4 KB (584 words) - 17:42, 13 March 2020
  • |Title=Usenix Network and Distributed System Security Symposium |Field=Security
    147 bytes (20 words) - 00:56, 28 February 2020
  • *Network and system architectures and protocols *Security and privacy
    3 KB (412 words) - 09:52, 27 February 2020
  • |Title=Usenix Network and Distributed System Security Symposium
    684 bytes (84 words) - 11:33, 10 March 2020
  • * › Database Security and Transaction Support * › Advanced Applications of Neural Network
    19 KB (2,462 words) - 19:10, 26 August 2010
  • * Foundations of Privacy, Trust and Reputation in Network * Network Models for Distributed Computing
    4 KB (602 words) - 06:44, 26 August 2020
  • |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium
    3 KB (343 words) - 16:31, 6 May 2020
  • NEURAL NETWORK MODELS * Neural network approaches to optimization
    5 KB (574 words) - 15:58, 6 March 2020
  • * Security in distributed computing, cryptographic protocols * System-on-chip and network-on-chip architectures
    3 KB (344 words) - 11:30, 21 April 2020
  • Network algorithms • Network architectures
    4 KB (579 words) - 15:24, 13 October 2010
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • ...s a publication vehicle for complete coverage of all topics of interest to network professionals and brings to its readers the latest and most important findi • Network Architectures and Protocols • Network Coding
    3 KB (318 words) - 16:46, 5 July 2020
  • ...practical aspects of health informatics and bioinformatics and a chance to network with others working and researching in this or related areas. Security, Ethics and Privacy
    5 KB (693 words) - 10:44, 14 November 2010
  • * Scale-free network structure of Cyber Physical Systems * System-on-Chip and Network-on-Chip Design
    12 KB (1,378 words) - 21:13, 28 November 2010
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 12:34, 14 October 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (556 words) - 12:33, 14 October 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (552 words) - 08:13, 10 December 2010
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 10:24, 6 July 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 12:33, 14 October 2020
  • |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (217 words) - 16:57, 27 December 2015
  • ...ecial Issue on Smart Protocols and Algorithms of the International Journal Network Protocols and Algorithms (ISSN 1943-3581) ...ng capacity let us include more complex algorithms that can be used by the network device to enhance the communication procedure.
    6 KB (833 words) - 15:16, 24 September 2020
  • |Field=Computer security and reliability `SysSec <http://syssec-project.eu>`_ is a Network of Excellence in the
    5 KB (701 words) - 05:52, 14 April 2011
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev
    3 KB (462 words) - 11:51, 22 March 2020
  • |Title=10th IEEE International Symposium on Network Computing and Applications The IEEE International Symposium on Network Computing and Applications is seeking articles concerning fundamental resea
    3 KB (322 words) - 05:59, 8 March 2011
  • A rational network can be defined as a network in which rational (self interested) participants have no reason to deviate from the actual network intended purposes (critical or not). To this
    7 KB (1,019 words) - 18:29, 8 April 2011
  • * Network Optimization * Security
    3 KB (283 words) - 11:37, 1 July 2011
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc Service and Systems Design and QoS Network Security
    5 KB (677 words) - 11:59, 1 July 2011
  • ...Applications, Society, e-Communities, e-Business, Web Intelligence and Web Security. Web Security and Privacy
    5 KB (612 words) - 12:07, 1 July 2011
  • *Network Interfaces *Network Management
    13 KB (1,774 words) - 18:35, 31 August 2011
  • * What does a network of truly interconnected documents look like? How could interoperability acr ...semantic technologies for HealthCare, Medical Informatics and Computer Security. Projects with high relevance to social networking, low-tech environments
    8 KB (1,106 words) - 15:50, 20 July 2011
  • - Security related issues of satellite communications - Infrastructure and network management
    9 KB (1,218 words) - 16:06, 1 October 2020
  • Network models (mobility models, traffic models, network topology) Security and emergency applications
    6 KB (809 words) - 16:26, 28 September 2011
  • Don't miss out on the opportunity to network with international researchers and practitioners and discuss the latest res *Privacy and Security
    5 KB (669 words) - 14:40, 20 December 2011
  • Information Security Network Management
    8 KB (1,085 words) - 16:28, 6 February 2012
  • - SOFTNETWORKING: Advances in Software Defined Networking and Network Communications modeling; Communications security; Computer
    6 KB (725 words) - 19:58, 22 November 2020
  • Neural network Head of 'Decision Support and Control Systems' Network Research Centre and Director of Postgraduate Admissions,
    11 KB (1,490 words) - 11:59, 27 January 2012
  • |Field=Computer security and reliability * Cyber Security
    2 KB (304 words) - 10:54, 5 March 2012
  • Energy-aware network equipments and applications Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability
    10 KB (1,297 words) - 17:49, 24 February 2012
  • ...venth International Workshop on Frontiers in Availability, Reliability and Security |Field=Computer security and reliability
    2 KB (221 words) - 16:12, 29 February 2012
  • ...ques to adjust the multimedia transmission protocols to compliant with the network’s various situations. This workshop will be held in conjunction with the - Intelligent Video Network Engineering with Distributed Optimization
    5 KB (726 words) - 15:28, 2 March 2012
  • ...t-contention protocols; Named data networking; Adaptive contention window; Network mobility models; Spectrum aggregation schemes; Smart meters; Dynamic load; ...rks; Network function virtualization (NFV) of small cells; Self-organizing network functionalities for virtualized small cells; The role of open source softwa
    13 KB (1,580 words) - 19:35, 18 February 2021
  • |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security
    4 KB (581 words) - 18:48, 24 February 2020
  • ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modelling) ...cessing (e.g. graph neural networks, domain adaptation, transfer learning, network architectures, neural ranking, neural recommendation, and neural prediction
    5 KB (653 words) - 13:04, 3 August 2023
  • |Title=19th International Conference on Applied Cryptography and Network Security |Field=computer security
    870 bytes (109 words) - 19:16, 22 January 2021
  • *Security, privacy, and trust *Social network analytics
    4 KB (535 words) - 21:32, 11 February 2020
  • *Security, privacy, and trust *Social network analytics
    4 KB (500 words) - 17:29, 6 January 2021
  • • Semantic social network analysis • Information and data governance, information assurance, security, compliance
    6 KB (872 words) - 23:11, 24 February 2020
  • * Network operations and management * Network security
    5 KB (630 words) - 05:00, 19 April 2012
  • Communication & Network systems: Computer & Network Security Systems
    10 KB (1,363 words) - 09:26, 7 May 2012
  • ...cations, Neural Networks and Applications, Remote Sensing, Self Organizing Network (SON), Project IEEE.802. ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and
    3 KB (434 words) - 22:46, 30 May 2012
  • Neural Network Applications Data Security
    10 KB (1,492 words) - 17:22, 26 June 2012
  • Wireless Network Protocols Network Architecture
    5 KB (600 words) - 14:41, 20 June 2012
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc Service and Systems Design and QoS Network Security
    5 KB (662 words) - 18:50, 20 June 2012
  • Smart Grid Security and Reliability Energy Efficient Network Hardware
    5 KB (649 words) - 10:44, 21 June 2012
  • |Field=terrorism, national security, crime, politics, law |Superevent=secau Security Congress
    4 KB (575 words) - 05:16, 28 June 2012
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • |Title=25th Usenix Network and Distributed System Security Symposium
    638 bytes (81 words) - 11:59, 10 March 2020
  • - Security and Access Control<br /> - Network Systems and Devices <br />
    3 KB (466 words) - 13:00, 16 August 2012
  • Advanced Applications of Neural Network Security
    5 KB (552 words) - 15:08, 21 August 2012
  • Co-sponsorship with International Network of Social Network Analysis (INSNA) ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society.
    6 KB (728 words) - 01:01, 25 August 2012
  • - Energy-efficient network services and operations - Energy-aware network equipments and applications
    4 KB (491 words) - 22:39, 28 August 2012
  • Network Security
    2 KB (234 words) - 08:25, 26 October 2012
  • Information Security Computer & Network Security
    2 KB (224 words) - 08:27, 26 October 2012
  • • Wireless Network Protocols • Network Architecture
    5 KB (647 words) - 19:06, 5 April 2013
  • ...esearchers, academics and practitioners specializing in the area of Mobile Network Management, Service Management, Virtualization and Object Management. ...and cooperation in an environment with a multitude of access technologies, network operators and business actors.
    9 KB (1,145 words) - 16:57, 11 April 2013
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • ** Social network analysis with Semantic Web Technologies ** Representing and reasoning about trust, privacy, and security
    5 KB (711 words) - 19:02, 7 March 2020
  • *Information Security and Cryptography *Network and Cyber Security
    2 KB (227 words) - 11:30, 21 June 2016
  • ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.
    3 KB (422 words) - 12:09, 24 April 2016
  • ...ogy; Computational neuroscience; Cognitive models; Neural hardware; Neural network theory & models; Neurodynamics; Neuroinformatics; Neuroengineering; Computa ...en Computing; Hybrid systems; Self-aware systems; Sensor networks; Network security; Petrochemical; Oil & Gas.
    3 KB (309 words) - 17:11, 18 February 2021
  • ...by people who make things work - just like you. In addition, attendees can network with experts in a variety of fields. These relationships provide great valu * Data Science (Data Mining, Machine Learning, Network Analytics)
    10 KB (1,347 words) - 15:01, 26 September 2016
  • Climate, Energy, Food, Health, Transport, Security, and Social Sciences – are the most important societal challenges tackled * Transport - Streaming sensor network and geospatial data integration
    3 KB (412 words) - 08:53, 24 September 2016
  • * Semantic social network analysis * Information Assurance and Security
    9 KB (1,131 words) - 23:18, 24 February 2020
  • |Field=social networks, complex networks, large networks, network and security
    529 bytes (63 words) - 13:47, 25 September 2016
  • * Information systems and Network security
    2 KB (197 words) - 16:16, 10 November 2016
  • ...IEICE Transactions Special Section on Information and Communication System Security (August 2017) |Field=security, informatioin security, network security, cyber security
    421 bytes (51 words) - 15:56, 15 February 2017
  • * Semantic social network analysis * Information and data governance, information assurance, security, compliance
    6 KB (877 words) - 23:06, 24 February 2020
  • ...ACM 2016 : 2016 6th International Conference on Communication and Network Security(ICCNS 2016)--ACM, EI and Scopus
    451 bytes (56 words) - 16:17, 8 July 2016
  • - Knowledge Base and Semantic Network - Security and Privacy
    12 KB (1,565 words) - 04:15, 5 August 2023
  • ...NCS 2016 : Eighth International Conference on Network and Communications Security |Field=security, networking, communications, network security
    433 bytes (52 words) - 11:17, 5 September 2016
  • |Title=ICNCT 2017 : 5th International Conference on Network and Computing Technologies (ICNCT 2017) |Field=networks, computing, cloud computing, network security
    443 bytes (50 words) - 09:31, 19 July 2019
  • |Field=cloud computing, multimedia, network security, networking
    416 bytes (48 words) - 10:48, 11 September 2016
  • |Field=communications, software engineering, networks, network security
    467 bytes (58 words) - 10:48, 11 September 2016
  • |Field=data mining, network, mechanisms&methods ...ment for sensors; Data mining and management for wireless systems; Dynamic network discovery; Mining from multiple sources; Mining personal semantic data; Min
    10 KB (1,305 words) - 00:29, 12 December 2020
  • |Title=SMGSSP 2017: Smart Micro-Grid Systems Security and Privacy |Field=privacy, security, smart micro-grids, cyber-physical systems
    2 KB (246 words) - 09:12, 3 September 2017
  • - Data Science: Methods for analyzing scientific data, business data, social network analysis, recommender systems, mining sequences, time series analysis, onli ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (282 words) - 10:48, 8 February 2020
  • * Data Science: Methods for analyzing scientific data, business data, social network analysis, recommender systems, mining sequences, time series analysis, onli ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (270 words) - 10:49, 8 February 2020
  • ...S-ACM 2016 : 2016 4th International Conference on Information and Network Security (ICINS 2016)--Ei Compendex
    452 bytes (54 words) - 10:46, 11 September 2016
  • * security and privacy * social network applications
    9 KB (1,190 words) - 10:12, 5 June 2019
  • Emerging cellular and new network architectures for 5G Communication Security, Trust, Protocols and Applications
    5 KB (588 words) - 18:00, 21 January 2017
  • - Smart city network management and services - Smart city system security and privacy
    4 KB (565 words) - 09:46, 7 February 2017
  • Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –
    5 KB (631 words) - 15:09, 10 April 2017
  • Security and Access Control Information Content Security
    4 KB (528 words) - 18:46, 29 August 2017
  • *security and privacy *social network analytics
    10 KB (1,309 words) - 10:29, 5 June 2019
  • *Web Security, Integrity, Privacy, and Trust *Visualizing Social Network Data
    18 KB (2,394 words) - 16:28, 29 January 2018
  • * Semantic social network analysis * Information/data governance, information assurance, security, compliance
    6 KB (798 words) - 23:16, 24 February 2020
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • ...inals, users’ needs and services (data, content, live streams or complex network services). - Network interoperability in the e-health ecosystems
    4 KB (509 words) - 11:36, 8 August 2017
  • *Semantics for Safety, Security & Privacy *Semantics for IT Safety & Security
    6 KB (759 words) - 15:52, 5 December 2018
  •  Data collection, analytics, security and management  Network techniques for real-time data processing
    4 KB (532 words) - 13:28, 28 July 2017
  • through the global network. Further, the conference considers as essential the - Edge Cloud Network Management
    7 KB (1,009 words) - 13:39, 3 September 2017
  • Management Issues of Social Network Big Data Security Applications of Big Data
    3 KB (461 words) - 13:22, 3 September 2017
  • |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)
    4 KB (562 words) - 12:05, 3 September 2017
  • * Security and Information Assurance * International Journal of Network Security & Its Applications (IJNSA)
    5 KB (651 words) - 11:34, 8 August 2017
  • Big data security, Database security Security and fault tolerance for embedded or ubiquitous systems
    3 KB (464 words) - 09:30, 3 September 2017
  • science and services, Web Information Systems and Applications, Computer Network Computer Network and Application Technology
    5 KB (673 words) - 09:53, 3 September 2017
  • research that includes AI and Big Data Analytics, Network Communication & Security, Computer Vision. Following the past successful symposium SoICT 2016,
    4 KB (559 words) - 11:58, 8 August 2017
  • researchers to extend their research network. Databases; Security and Cryptography; Operating Systems; Networks, Distributed
    3 KB (438 words) - 11:45, 8 August 2017
  • |Title=IJMNCT 2017 : International Journal of Mobile Network Communications & Telematics INTERNATIONAL JOURNAL OF MOBILE NETWORK COMMUNICATIONS & TELEMATICS (IJMNCT)
    6 KB (751 words) - 13:28, 28 July 2017
  • |Title=SPDF-Mobile 2017 : Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security
    4 KB (536 words) - 09:59, 21 August 2017
  • * Cryptography, security and privacy of mobile & wireless networks Network research field.
    6 KB (820 words) - 13:30, 28 July 2017
  • Performance analysis, QoS and network management Advanced wireless network technologies, architectures
    3 KB (415 words) - 13:30, 28 July 2017
  • - Network Functions Virtualization - Software Define Network
    6 KB (873 words) - 13:30, 28 July 2017
  • Network functions virtualization and software defined networking Network coding techniques
    4 KB (524 words) - 13:30, 28 July 2017
  • Network-based computing systems Network management & security
    4 KB (497 words) - 11:58, 8 August 2017
  • - Computer Network and Architecture - Information Security & Risk Management
    6 KB (814 words) - 09:03, 3 September 2017
  • Network architecture and protocols for heterogeneous IoT Network operation and management
    4 KB (483 words) - 10:00, 21 August 2017
  • |Field=security aspects. Original papers are invited on Computer Networks, Network Protocols and
    4 KB (486 words) - 11:57, 8 August 2017
  • |Title=IJNSA 2017 : International Journal of Network Security & Its Applications -- UGC, ERA Indexed |Field=security
    4 KB (628 words) - 13:34, 28 July 2017
  • |Field=security aspects. Original papers are invited on computer Networks, Network Protocols and
    4 KB (546 words) - 11:35, 8 August 2017
  • |Acronym=COMNET SI SDN/NFV Security/Performance 2017 ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV
    4 KB (515 words) - 11:28, 6 November 2020
  • |Title=ICISS 2017 : International Conference on Information Systems Security |Field=security
    5 KB (626 words) - 12:02, 3 September 2017
  • |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
    5 KB (722 words) - 10:00, 21 August 2017
  • |Title=DMCS 2017 : DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17) |Field=security
    4 KB (626 words) - 09:30, 3 September 2017
  • |Title=ICNS - Ei 2017 : 2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus |Field=security
    2 KB (308 words) - 11:50, 3 September 2017
  • |Title=SPIoT 2017 : The 6th International Symposium on Security and Privacy on Internet of Things |Field=security
    3 KB (379 words) - 12:01, 3 September 2017
  • and network security. Large Network Analysis - methods, algorithms, processes, analytic tools
    4 KB (442 words) - 10:00, 21 August 2017
  • Embedded Systems and Communication: Computer Networks; Network and Security; Signal Processing; Sensor Network; Network and Systems.
    4 KB (495 words) - 13:34, 28 July 2017
  • ...: ACM--2017 the 7th International Conference on Communication and Network Security (ICCNS 2017)--SCOPUS, Ei Compendex |Field=network security
    2 KB (216 words) - 13:34, 28 July 2017
  • ...ICINS 2017 : 2017 5th International Conference on Information and Network Security (ICINS 2017)--Ei Compendex and Scopus |Field=network security
    1 KB (130 words) - 13:34, 28 July 2017
  • - Security - Sensor networks / Ad hoc network
    4 KB (580 words) - 20:58, 12 November 2020
  • wellness, safety and security, energy and environment, communication and • Safety, security, data privacy, reputation and trust management in smart
    5 KB (696 words) - 11:36, 8 August 2017
  • - Wireless Network Protocols - Network Performance
    5 KB (632 words) - 12:30, 3 September 2017
  • |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)
    5 KB (640 words) - 13:34, 28 July 2017
  • Allocation and Network Optimization in C-RAN" - Security
    4 KB (475 words) - 12:34, 8 August 2017
  • (18) Heterogeneous Network Topologies and Configurations (20) Information Security and Cryptography
    1 KB (157 words) - 13:19, 28 July 2017
  • * Security and Privacy on the Web *Social Network Analysis and Graph Algorithms for the Web
    12 KB (1,422 words) - 10:18, 5 October 2023
  • questions of peace, security and human security abound. In this period of great intersection of security and sustainability, as well as of the continued legacy
    7 KB (1,000 words) - 12:07, 3 September 2017
  • Computer Security SEC Social Network and Media Analysis SONAMA
    5 KB (660 words) - 13:50, 8 April 2020
  • Advanced Machine Learning Technologies for Network Security.
    3 KB (355 words) - 12:33, 3 September 2017
  • Network Security
    2 KB (212 words) - 13:19, 28 July 2017
  • |Title=WiMoA 2017 : 9th International Conference on Wireless, Mobile Network & Applications 9th International Conference on Wireless, Mobile Network & Applications (WiMoA
    5 KB (616 words) - 13:19, 28 July 2017
  • various types of networks, including emerging network function virtualization -Security and privacy for SOCA
    4 KB (494 words) - 13:20, 28 July 2017
  • - Information Content Security - Web Services Security
    2 KB (242 words) - 11:35, 8 August 2017
  • Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile and network infrastructures; Crowd sourcing; Reliability, Security, Privacy and
    4 KB (508 words) - 13:23, 28 July 2017
  • - Security - Sensor networks / Ad hoc network
    3 KB (346 words) - 19:16, 26 November 2020
  • * Test, Verification, and Security of Digital Systems * Network Processor Architectures
    1 KB (178 words) - 10:05, 20 November 2020
  • - Advanced Applications of Neural Network - Security
    6 KB (818 words) - 13:40, 3 September 2017
  • |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security
    4 KB (565 words) - 17:27, 18 February 2021
  • ...e=WICS 2017 : 4th International Workshop on Information and Communication Security |Field=security
    3 KB (347 words) - 19:48, 22 November 2017
  • |Field=security Communications Systems, Embedded Systems and Information Security , to attract a
    6 KB (743 words) - 11:45, 8 August 2017
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security
    5 KB (611 words) - 11:47, 8 August 2017
  • |Field=security * International Journal On Cryptography And Information Security (IJCIS)
    7 KB (946 words) - 13:28, 28 July 2017
  • ...Ei & Scopus 2018 : 2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus |Field=network security
    1 KB (171 words) - 09:58, 21 August 2017
  • scalability, elasticity, availability, reliability, and security. Alma Riska, Network Appliances, USA
    11 KB (1,364 words) - 13:23, 3 September 2017
  • ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security
    8 KB (1,170 words) - 13:40, 3 September 2017
  • - Energy Efficient Network Hardware - Security and Privacy
    6 KB (825 words) - 13:22, 3 September 2017
  • |Field=network security
    1 KB (160 words) - 09:58, 21 August 2017
  • greatly expand on your global network of scholars and professionals. Human Rights and Security
    2 KB (262 words) - 09:58, 21 August 2017
  • |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer
    5 KB (571 words) - 11:53, 3 September 2017
  • ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security Data intelligence and data security are two closely related views, while data
    4 KB (484 words) - 10:00, 21 August 2017
  • Information Security Network Security
    2 KB (269 words) - 11:57, 3 September 2017
  • Network intelligence and network Control Information Security & Computer Forensics
    2 KB (246 words) - 12:11, 3 September 2017
  • |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service
    5 KB (571 words) - 10:51, 3 September 2017
  • and intelligent data processing, as well as enhanced data security and privacy Management Issues of Social Network Big Data
    6 KB (876 words) - 09:59, 21 August 2017
  • * Security and Information Assurance * International Journal of Network Security & Its Applications (IJNSA)
    4 KB (478 words) - 08:48, 16 May 2020
  • * Scientific information network analysis * Privacy and security issues
    4 KB (566 words) - 10:00, 21 August 2017
  • network-based Processing - Security and Privacy aspects of data management in clouds and IoT systems
    6 KB (880 words) - 10:00, 21 August 2017
  • ...he presentation of work in progress, and the establishment of a scientific network between young researchers in the region. ...would like to provide an opportunity for people to establish a scientific network that can be intensely used, including mutual visits at affordable costs. Th
    7 KB (910 words) - 10:36, 26 November 2017
  • ...he presentation of work in progress, and the establishment of a scientific network between young researchers in the region. - Security, compliance, and non-functional requirements and properties
    4 KB (565 words) - 18:34, 4 July 2020
  • progress, and the establishment of a scientific network between young opportunity for people to establish a scientific network that can be intensely
    7 KB (1,046 words) - 10:36, 26 November 2017
  • * Anonymity, security and trust for Web access ** [[has general chair::Hans Akkermans]], Network Institute, VU Amsterdam, The Netherlands
    8 KB (1,023 words) - 19:05, 7 March 2020
  • ...- just like you. In addition, attendees will have a unique opportunity to network with experts in a variety of fields. These relationships provide great valu *Semantics for IT Safety & Security
    11 KB (1,487 words) - 13:45, 13 May 2019
  • * Interconnection network, router and network interface architecture * Architectural support for security or virtualization
    2 KB (315 words) - 11:47, 11 May 2020
  • ...chine learning, in fields like medicine, biology, industry, manufacturing, security, education, virtual environments, games, are especially encouraged. * neural network learning
    3 KB (425 words) - 20:41, 7 September 2019
  • *Big Data platforms with applications to network management, security, measurements *Design, analysis, and evaluation of network architectures
    2 KB (290 words) - 11:16, 6 April 2020
  • |Title=Usenix Network and Distributed System Security Symposium
    601 bytes (76 words) - 12:01, 10 March 2020
  • |Title=16th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    687 bytes (85 words) - 14:17, 6 November 2020
  • |Title=17th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    712 bytes (89 words) - 14:18, 6 November 2020
  • |Title=18th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    923 bytes (110 words) - 14:21, 6 November 2020
  • *Real-Time Age Detection Using a Convolutional Neural Network *A Maturity Model for IT-related Security Incident Management
    7 KB (917 words) - 18:07, 17 March 2020
  • |Title=International Conference on Cryptology and Network Security |Field=Security
    149 bytes (20 words) - 11:09, 22 March 2020
  • |Title=International Conference on network and System Security
    114 bytes (16 words) - 01:25, 18 March 2020
  • Text mining and social network analysis Security
    4 KB (401 words) - 07:52, 29 July 2020
  • |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
    11 KB (1,549 words) - 11:34, 17 April 2020
  • |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (152 words) - 10:13, 17 April 2020
  • * network theory and communication networks * privacy and security
    2 KB (192 words) - 08:38, 14 April 2020
  • === Information Security === ...lysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies.
    3 KB (314 words) - 11:52, 27 March 2020
  • |Title=15th International Conference on Availability, Reliability, and Security The International Conference on Availability, Reliability, and Security (ARES) 2020
    3 KB (313 words) - 17:14, 4 November 2020
  • |Title=International Conference on Cryptology and Network Security
    617 bytes (70 words) - 14:35, 14 January 2021
  • |Title=16th EAI International Conference on Security and Privacy in Communication Networks * Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
    2 KB (299 words) - 13:10, 30 March 2020
  • * Wireless Network Security
    2 KB (192 words) - 14:37, 11 December 2023
  • *Big data platforms with applications to network management, security, measurements *Design, analysis, and evaluation of network architectures
    2 KB (238 words) - 11:18, 6 April 2020
  • |Title=14th International Conference on Provable and Practical Security ...s are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:
    2 KB (208 words) - 10:19, 9 April 2020
  • |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions
    2 KB (195 words) - 11:08, 9 April 2020
  • |Title=11th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (155 words) - 10:20, 17 April 2020
  • |Title=10th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (153 words) - 10:27, 17 April 2020
  • ...power lines) in Smart Grids; Data aggregation, privacy considerations, and network data anonymization; Mobility issues in Smart Grids; Demand - response with Utilities and transportation assets; Smart Grid efficiency, security and reliability; Smart Grids and renewable technologies; Enabling active pa
    10 KB (1,331 words) - 14:52, 19 April 2020
  • ...; Cognitive machine-to-machine networks; Adaptive multiple access schemes; Network service providers; Heterogeneous cellular networks; Caching in mobile cellu ENCOT: Emerging Network Communications and Technologies
    14 KB (1,770 words) - 14:56, 19 April 2020
  • |Title=14-th International Workshop on Advances in Information Security * Security of next generation Operating Systems
    2 KB (200 words) - 12:01, 28 April 2020
  • ...ems, payloads, communications, levels of autonomy, manned-unmanned swarms, network-controlled swarms, as well as challenges related to policies, procedures, r * Security
    3 KB (385 words) - 15:55, 29 April 2020
  • ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc. ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of serv
    4 KB (457 words) - 10:25, 6 May 2020
  • ...omplexity, predictability, quality of service, reliability, dependability, security, scalability, programmer productivity, etc. * Architectures and compilers for embedded processors, DSPs, GPUs, ASIPs (network processors, multimedia, wireless, etc.).
    4 KB (431 words) - 10:40, 6 May 2020
  • ...x effects, which must be controlled to adhere to safety, availability, and security guarantees where needed. This special day will cover the latest trends in a D7 Network on Chip, Click here for details
    12 KB (1,651 words) - 13:30, 27 November 2020
  • * Network Operations and Management * Information Infrastructure and Security
    2 KB (175 words) - 10:44, 7 May 2020
  • * Network Operations and Management * Information Infrastructure and Security
    2 KB (174 words) - 10:43, 7 May 2020
  • ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more. ...s; runtime systems; parallel and distributed systems; storage; networking; security and privacy; virtualization; software-hardware interactions; performance ev
    8 KB (1,078 words) - 09:27, 12 May 2020
  • * Networking (WAN, LAN, and datacenter) and network services * Security, privacy, and trust
    6 KB (729 words) - 09:28, 12 May 2020
  • * 5. Neural Network and Neuromorphic Computing: * 5.1. Hardware and devices for neuromorphic and neural network computing
    6 KB (739 words) - 15:08, 13 May 2020
  • * Visualizing Large Scale Security Data * HCI Challenges for Big Data Security & Privacy
    4 KB (563 words) - 15:55, 23 June 2020
  • * Visualizing Large Scale Security Data * HCI Challenges for Big Data Security & Privacy
    5 KB (543 words) - 21:14, 18 May 2020
  • * Mining graph and network data * Security and intrusion detection
    2 KB (261 words) - 20:06, 20 May 2020
  • ● Mining graph and network data ● Security and intrusion detection
    2 KB (268 words) - 20:28, 20 May 2020
  • * Mining graph and network data * Security and intrusion detection
    2 KB (272 words) - 21:17, 20 May 2020
  • * Web/online/network mining and learning * Structure/group/community/network mining
    4 KB (515 words) - 16:39, 25 May 2020
  • * Web/online/social/network mining and learning. * Structure/group/community/network mining.
    3 KB (308 words) - 16:50, 16 December 2020
  • * Visualizing Large Scale Security Data * HCI Challenges for Big Data Security & Privacy
    9 KB (1,187 words) - 14:18, 27 May 2020
  • * Fuzzy web engineering, information retrieval, text mining, and social network analysis * Computational intelligence in security
    2 KB (238 words) - 17:30, 6 May 2021
  • ...the Conference on Web and Internet Economics (named Workshop on Internet & Network Economics until 2013), which was held annually from 2005 to present. * Economic Aspects of Security and Privacy
    2 KB (329 words) - 13:48, 23 June 2020
  • ...obile devices and Internet technologies; Mobile IPv6 over Software Defined Network (SDN); Generative Mappings; Intensive mobile data processing; Virtualizatio ...s; Automatic computing for Web services; Web services challenges on trust, security, performance, scalability; Enterprise Web services; Web services discovery,
    14 KB (1,804 words) - 13:49, 5 June 2020
  • ...; Access control in mobile environments; Advanced roaming concepts; Mobile network edge-based service delivery platforms; Mobile content delivery networks; Mo Security and privacy environments; Protection and safety of distributed mobile data;
    7 KB (918 words) - 13:51, 5 June 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    17 KB (2,088 words) - 12:49, 14 June 2020
  • ...ment for sensors; Data mining and management for wireless systems; Dynamic network discovery; Mining from multiple sources; Mining personal semantic data; Min ...igration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques
    11 KB (1,356 words) - 12:56, 14 June 2020
  • * Economic Aspects of Security and Privacy * Social Networks and Network Games
    2 KB (291 words) - 14:12, 23 June 2020
  • * Economic Aspects of Security and Privacy * Network Games
    5 KB (601 words) - 07:58, 24 June 2020
  • * Economic Aspects of Security and Privacy * Network Games
    3 KB (409 words) - 11:05, 24 June 2020
  • * R12 Network, Passive and MIMO Radars, Multi-Sensor and Multi-Static Systems and Data Fu * R18 Defence and Security, Surveillance, Remote Traffi c Monitoring, Sense and Avoid Applications
    2 KB (300 words) - 19:03, 25 June 2020
  • ...nt and control of high speed networks; Performance in high speed networks; Security aspects in high speed networks; QoS/SLA in high speed networks; Diagnosing ...Management and control of sensor networks; Performance in sensor networks; Security and reliability aspects in sensor networks; Information assurance in sensor
    13 KB (1,636 words) - 11:51, 10 July 2020
  • * Network Algorithms and Performance Evaluation * Communications and Information Security
    3 KB (483 words) - 08:08, 21 August 2020
  • * Formal Methods for Network Information Management * Network Economics and Incentive-Based Computing Related to Networks
    4 KB (556 words) - 06:42, 26 August 2020
  • * Algorithmic and Complexity Aspects of Network Economics * Algorithmic Aspects of Security and Privacy
    4 KB (503 words) - 06:44, 26 August 2020
  • Air, Road, Rail and Waterways Transportation Network and Systems Security, Privacy and Safety Systems
    1 KB (156 words) - 13:41, 10 July 2020
  • ...or, etc.) in social networks; Dynamicity of social event detection; Social network and interaction analysis around places and events; Social media visualizati ...nalized opinions across blogs, social media, news sites; Balancing privacy/security/reliability/utility/usability of personal data; Multiple patterns extractio
    9 KB (1,068 words) - 19:47, 9 July 2020
  • ...DN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality ...and discovery of things on the Internet; Crowd-sourcing and things; Trust, security and privacy in Internet of Things; Lightweight implementations of cryptogra
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ..."Spectrum Allocation and Management", "Wireless and mobile technologies", "Security in wireless and mobile environment" ...ells; Reconfigurable Radio Frequency (RF) receivers; Traffic-aware of NFV (Network Function Virtualization); Energy harvesting; Large-scale array of dense dis
    11 KB (1,335 words) - 02:28, 10 July 2020
  • ...Networking and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deployment" ...ivate organizations; Cybersecurity risks; Smart home security and privacy; Security awareness; Digital forensics; Large e-Commerce; Digital crowdfunding platfo
    18 KB (2,036 words) - 02:36, 10 July 2020
  • ...entric systems; User-centric business models; User-centric requirements in network-centric approaches; User-centric and critical time-centric applications and Machine learning and artificial neural networks; Network control and feedback with man-in-the-loop; Multi-sensor user interfaces (e.
    10 KB (1,232 words) - 16:20, 22 March 2021
  • Text mining and social network analysis Security
    4 KB (422 words) - 08:30, 29 July 2020
  • |Field=Networking, Internet, Security, Sensor, Hardware, Technologies ...Standardization of IoT applications; Flow-based security; Adaptive trust; Security operations centers; Trusted data marketplaces; IoT Cloud-based videoconfere
    7 KB (904 words) - 12:32, 22 January 2021
  • |Title=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies
    15 KB (1,886 words) - 16:16, 25 August 2020
  • ...chronization; Tracking and partial position information; Failure handling; Security and authentication ...ectures; Hierarchical clustering architectures; Group-based Architectures; Network topologies; Mesh networking; Device centric sensor networks; Distributed co
    15 KB (1,880 words) - 14:45, 27 August 2020
  • ** Security, privacy, liability, and dependability of vehicular networks ** Innovative vehicular network applications and their communication requirements
    4 KB (493 words) - 23:17, 12 October 2020
  • * Privacy, security, ethical, and social issues * Fuzzy Logic and Neural Network applications
    9 KB (896 words) - 16:31, 6 August 2020
  • * Network information theory * Privacy and security
    973 bytes (104 words) - 07:27, 13 August 2020
  • * Network Algorithms and Performance Evaluation * Communications and Information Security
    3 KB (482 words) - 08:25, 21 August 2020
  • * Communications and Information Security * Network Algorithms and Performance Evaluation
    3 KB (489 words) - 09:05, 21 August 2020
  • * Communications and Information Security * Network Algorithms and Performance Evaluation
    4 KB (604 words) - 09:59, 21 August 2020
  • |Title=8th International Conference on Availability, Reliability, and Security The 8th International Conference on Availability, Reliability and Security (ARES) 2013
    4 KB (468 words) - 11:39, 21 August 2020
  • |Title=9th International Conference on Availability, Reliability and Security The 9th International Conference on Availability, Reliability and Security (ARES) 2014
    4 KB (538 words) - 11:52, 21 August 2020
  • |Title=14th International Conference on Availability, Reliability, and Security The 14th International Conference on Availability, Reliability, and Security (ARES) 2019
    5 KB (627 words) - 10:49, 25 August 2020
  • ...ty of health data to benefit patient and public health safety, privacy and security; Integrating heterogeneous clinical data into central data warehouses; Pati ..., optimization, and simulation; Real-time emergency situations management; Security and accuracy of emergency communications; Geolocalisation and optimization
    16 KB (2,024 words) - 13:33, 24 August 2020
  • |Title=23rd Annual International Conference on Information Security and Cryptology Cloud Computing Security
    2 KB (169 words) - 10:42, 25 August 2020
  • |Title=13th International Conference on Availability, Reliability and Security The 13th International Conference on Availability, Reliability and Security (ARES) 2018
    3 KB (336 words) - 11:20, 25 August 2020
  • |Title=10th International Conference on Availability, Reliability and Security The 10th International Conference on Availability, Reliability and Security (ARES) 2015
    5 KB (590 words) - 11:54, 25 August 2020
  • * Algorithms for network optimization * Algorithms for information security and privacy
    4 KB (436 words) - 12:06, 25 August 2020
  • |Title=11th International Conference on Availability, Reliability and Security The 11th International Conference on Availability, Reliability and Security (ARES) 2016
    5 KB (581 words) - 12:47, 25 August 2020
  • |Title=13th International Conference on Security and Privacy in Communications Networks Also known as: 13th EAI International Conference on Security and Privacy in Communication Networks (EAI = European Alliance for Innovati
    3 KB (326 words) - 09:35, 10 September 2020
  • |Title=12th International Conference on Security and Privacy in Communications Networks Also known as: 12th EAI International Conference on Security and Privacy in Communication Networks (EAI = European Alliance for Innovati
    3 KB (336 words) - 09:51, 10 September 2020
  • * Social Network Management * Database Privacy and Security
    4 KB (478 words) - 11:05, 11 September 2020
  • |Title=4th International Conference on Networking, Systems and Security (NSysS) |Field=security
    4 KB (587 words) - 12:07, 5 November 2020
  • modeling; Security, privacy, and trust; Radio resource management; IT architectures for cognitive radio; Access schemes; Wireless network
    11 KB (1,377 words) - 20:26, 22 November 2020
  • network analysis, error detection of atmospheric data, exploring urban Model training, inference, and serving; Trust and security for machine
    9 KB (1,239 words) - 14:37, 29 December 2020
  • ...; Cognitive machine-to-machine networks; Adaptive multiple access schemes; Network service providers; Heterogeneous cellular networks; Caching in mobile cellu ENCOT: Emerging Network Communications and Technologies
    13 KB (1,574 words) - 12:11, 24 November 2020
  • ...power lines) in Smart Grids; Data aggregation, privacy considerations, and network data anonymization; Mobility issues in Smart Grids; Demand - response with Utilities and transportation assets; Smart Grid efficiency, security and reliability; Smart Grids and renewable technologies; Enabling active pa
    10 KB (1,235 words) - 18:42, 26 November 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    17 KB (2,035 words) - 14:45, 18 February 2021
  • ...; Access control in mobile environments; Advanced roaming concepts; Mobile network edge-based service delivery platforms; Mobile content delivery networks; Mo Security and privacy environments; Protection and safety of distributed mobile data;
    7 KB (868 words) - 15:11, 18 February 2021
  • ...king; Software defined radio and cognitive radio networking; Content-based network service; Certification, public key infrastructures, data integrity; Privacy ...d management; Denial of service mitigation and prevention; System and data security; Communication visualization
    11 KB (1,325 words) - 15:01, 18 February 2021
  • receivers; Traffic-aware of NFV (Network Function Virtualization); Based Management in wireless LANS and MANs; Wireless and Mobile Network
    12 KB (1,454 words) - 19:21, 30 November 2020
  • Delay-tolerant IoT; IoP and Smart cities; Multi-vendor NVF (Network Network)--based resilience; Policy-based NFV management; Performance of
    13 KB (1,607 words) - 19:32, 30 November 2020
  • ...-driven workflow design and management; Web content performance, accuracy, security, and reliability; Web content modeling; Web content-based applications; (Se ...S-China, HEVC); Video coders and decoders; Video surveillance and privacy; Network video recorders; Video streaming; Video data integrity (error detection, er
    13 KB (1,567 words) - 18:56, 8 December 2020
  • ...Collaborative services; Service business models; Service personalization; Security and trust in services ...or ubiquitous and pervasive services; Energy management and harvesting for network with ubiquitous and pervasive systems; Case studies, lessons learned, exper
    10 KB (1,221 words) - 18:57, 8 December 2020
  • routing; Communications modeling; Communications security; Autonomic security and reliability through linked data in cloud and fog computing;
    8 KB (1,012 words) - 10:45, 9 December 2020
  • OFDMA, MC-CDMA, DFTS-OFDM, IFDMA, OFDM-IDMA; RFID and Sensor Network home network technologies; Deployment, trial experience, business
    19 KB (2,346 words) - 10:51, 9 December 2020
  • networks; Network support for multimedia data; Multimedia data storage; and security in mobile multimedia; Social and regulatory aspects of
    10 KB (1,212 words) - 14:36, 29 December 2020
  • ...obile devices and Internet technologies; Mobile IPv6 over Software Defined Network (SDN); Generative Mappings; Intensive mobile data processing; Virtualizatio ...s; Automatic computing for Web services; Web services challenges on trust, security, performance, scalability; Enterprise Web services; Web services discovery,
    15 KB (1,921 words) - 01:00, 12 December 2020
  • ...etc.; Applications: event-based linked data, large scale multi-dimensional network analysis, error detection of atmospheric data, exploring urban data in smar ...achine learning methods; Model training, inference, and serving; Trust and security for machine learning applications; Testing, debugging, and monitoring of ma
    9 KB (1,229 words) - 03:37, 3 December 2021
  • ...d systems, maintenance of materialized views, dynamic graph processing, in-network processing, logic-based event recognition, event correlation and pattern la ...t processing, information-centric networking, software-defined networking, security, reliability and resilience, programmable hardware, energy management and g
    3 KB (344 words) - 15:54, 29 January 2021
  • ...ecurity and encryption in stream processing, complex event forecasting, in-network processing, logic-based complex event recognition, online relational learni ...t processing, information-centric networking, software-defined networking, security, reliability and resilience, distributed ledger and blockchains, programmab
    2 KB (300 words) - 16:01, 29 January 2021
  • Network Security and Cryptography
    1 KB (183 words) - 13:49, 11 February 2021
  • ...; Cognitive machine-to-machine networks; Adaptive multiple access schemes; Network service providers; Heterogeneous cellular networks; Caching in mobile cellu ENCOT: Emerging Network Communications and Technologies
    13 KB (1,653 words) - 14:44, 10 February 2021
  • ...power lines) in Smart Grids; Data aggregation, privacy considerations, and network data anonymization; Mobility issues in Smart Grids; Demand - response with Utilities and transportation assets; Smart Grid efficiency, security and reliability; Smart Grids and renewable technologies; Enabling active pa
    10 KB (1,237 words) - 14:50, 10 February 2021
  • |Title=International Conference on Cryptology and Network Security * • Embedded System Security
    2 KB (197 words) - 17:40, 11 February 2021
  • | {{OR|ACNS}} || International Conference on Applied Cryptography and Network Security || http://www.wikidata.org/entity/Q4781524 | ICCST || International Carnahan Conference on Security Technology || https://www.wikidata.org/entity/Q85769626
    19 KB (2,518 words) - 09:03, 21 February 2021
  • |Title=International Conference on Network and Service Management ==== Network Management ====
    3 KB (291 words) - 11:57, 25 February 2021
  • ...eployment and assurance, Next Generation Networks and Ubiquitous Services, Network Control and Management, Multi Provider QoS/SLA Internetworking, Software De ...; Cognitive machine-to-machine networks; Adaptive multiple access schemes; Network service providers; Heterogeneous cellular networks; Caching in mobile cellu
    14 KB (1,718 words) - 11:30, 3 March 2021
  • ...power lines) in Smart Grids; Data aggregation, privacy considerations, and network data anonymization; Mobility issues in Smart Grids; Demand - response with Utilities and transportation assets; Smart Grid efficiency, security and reliability; Smart Grids and renewable technologies; Enabling active pa
    10 KB (1,277 words) - 11:56, 3 March 2021
  • * High-speed Communication and Network * Wireless Communication and Network
    2 KB (230 words) - 12:18, 4 March 2021
  • Blockchain Security Communication and Network Technology
    3 KB (387 words) - 10:31, 11 March 2021
  • - TRACK 3: COMMUNICATION, NETWORK AND HARDWARE - - TRACK 8: CYBER SECURITY ISSUES -
    2 KB (318 words) - 09:51, 16 March 2021
  • Computer and Network Security
    2 KB (267 words) - 10:40, 16 March 2021
  • Network Communication ● Network and System Security
    2 KB (314 words) - 04:25, 17 March 2021
  • |has Keynote speaker=Prof. Masakatsu Fujiwara NTT Network Technology Laboratories, Prof. Chih-Yu Wen National Chung Hsing University, - Streaming, security and privacy for healthcare
    2 KB (246 words) - 10:59, 19 March 2021
  • ==== Area 2: Architecture, Network/Communications, and Management ==== * Cluster security
    3 KB (310 words) - 14:55, 8 April 2021
  • ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modeling, information credibility) ...essing (e.g., graph neural networks, domain adaptation, transfer learning, network architectures, neural ranking, neural recommendation, and neural prediction
    37 KB (5,185 words) - 11:25, 3 August 2023
  • |Title=6th International Conference on Cryptography, Security and Privacy Cloud security
    1 KB (188 words) - 04:26, 13 April 2021
  • ...al processing; Computer Vision & Virtual Reality; Cryptography and Network Security; Design and Implementation of Signal Processing Systems; Digital Signal Pro
    2 KB (282 words) - 08:15, 13 April 2021
  • Topic area 3: Connectivity, Security, and Privacy for IoT • Multiple access IoT access networks and network backhaul with 5G and beyond
    2 KB (269 words) - 08:26, 13 April 2021
  • Cyber-security, Privacy and Ethics of IS Network measurement and analysis
    2 KB (240 words) - 09:51, 13 April 2021
  • ** Security, privacy, liability, and dependability of vehicular networks ** Innovative vehicular network applications and their communication requirements
    5 KB (680 words) - 16:29, 28 October 2021
  • ...Technologies; Personal and body networks, wearable computing; Digital home network technologies; Deployment, trial experience, business models and application ...networking; Cross-layer optimizations to minimize energy consumption on a network scale; Cognitive, cooperative and reconfigurable networks; Harvesting distr
    19 KB (2,317 words) - 02:40, 26 November 2021
  • ...trial interference; Fade mitigation techniques; Advanced channel modeling; Security, privacy, and trust; Radio resource management; IT application in Space Com ...Platforms and architectures for cognitive radio; Access schemes; Wireless network co-existence; Ultra-Wideband cognitive radio system; Interference metric mo
    11 KB (1,294 words) - 02:42, 26 November 2021
  • ...munications switching and routing; Communications modeling; Communications security; Computer communications; Distributed communications; Signal processing in ...ess Network (O-RAN); 5G mmWave; 7G and 8G network and High speed internet. Network slicing market. Networks slicing ROI (Return on Investment); 6-7-8G and ROI
    6 KB (832 words) - 02:47, 26 November 2021
  • ...pects and algorithms for multimedia; Multimedia content delivery networks; Network support for multimedia data; Multimedia data storage; Multimedia meta-model ...and ubiquitous multimedia in ad hoc networks; Personalization, privacy and security in mobile multimedia; Social and regulatory aspects of mobile multimedia; M
    10 KB (1,221 words) - 03:35, 3 December 2021
  • ...munications switching and routing; Communications modeling; Communications security; Autonomic communications; Performance in communications; Computer communic ...; Assessing context correctness for secure mobile collaboration; Assessing security and reliability through linked data in cloud and fog computing; Assessing r
    8 KB (1,021 words) - 03:36, 3 December 2021
  • |Title=12th International Conference on Communication and Network Security
    1 KB (167 words) - 09:01, 8 October 2022
  • |Title=7th International Conference on Network Security
    1 KB (204 words) - 09:01, 7 November 2022
  • * Security, privacy, liability, and dependability of vehicular networks * Innovative vehicular network applications and their communication requirements
    6 KB (871 words) - 10:16, 31 January 2023
  • ...ty, Artificial Intelligence, Digital Signal and Multimedia Technology, New Network Technology and Application, For more information, please visit: http://www.
    1 KB (186 words) - 09:05, 1 December 2022
  • *System-on-chip and network-on-chip *VLSI for sensor network and RF identification systems
    2 KB (210 words) - 04:49, 17 January 2023
  • Information Privacy and Security, Network Technology,
    4 KB (494 words) - 10:28, 27 September 2022
  • ...curity, Virtual Reality and Simulation, MIS Management Information System& Network System Project; ...Information analysis and infrastructure, Net information Security & System Security Technology, Information Warfare Technology, Digital Media Technology & Radi
    4 KB (470 words) - 11:06, 27 September 2022
  • Special Issue: Network and Information Security: Threats, Vulnerabilities, Detection and Management Special Issue - Novel Technologies for Systems and Network Security
    2 KB (214 words) - 05:12, 1 June 2023
  • Network Communication ● Network and System Security
    4 KB (504 words) - 08:27, 22 September 2023
  • |Title=13th International Conference on Communication and Network Security * Special Issue - Network and Information Security: Threats, Vulnerabilities, Detection and Management, indexed within Scopus,
    2 KB (288 words) - 05:03, 9 October 2023
  • |Title=8th International Conference on Network Security
    1 KB (188 words) - 10:00, 12 October 2023
  • |Title=The Sixth Workshop on Systems and Network Telemetry and Analytics The Sixth Workshop on Systems and Network Telemetry and Analytics (ACM SNTA’23)
    4 KB (612 words) - 16:54, 7 March 2023
  • Network Security Computer Network and Security & Forensic
    4 KB (501 words) - 04:15, 20 July 2023
  • |Title=International Conference on Cyber Security and Information Engineering |Field=Cyber Security, Information Engineering
    4 KB (517 words) - 04:36, 29 June 2023
  • * Challenging Network Environments (underwater, underground) * Cyber-physical network systems
    8 KB (1,137 words) - 11:08, 3 August 2023
  • ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modeling, information credibility) ...essing (e.g., graph neural networks, domain adaptation, transfer learning, network architectures, neural ranking, neural recommendation, and neural prediction
    7 KB (951 words) - 04:25, 5 September 2023
  • Authorization, data privacy and security Stream-based processing, real-time and network databases
    5 KB (690 words) - 13:23, 14 August 2023
  • Communication and Information Systems Security Network Provisioning, Monitoring and Management
    4 KB (550 words) - 05:55, 1 November 2023
  • |Title=14th International Conference on Communication and Network Security
    1 KB (183 words) - 10:54, 11 March 2024
  • Vehicular Ad Hoc Network Future Internet and Network
    5 KB (626 words) - 09:32, 27 February 2024

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)