Search results

Jump to: navigation, search
  • ...for and publish information on scientific events, as well as universities, information infrastructure institutions, specialised societies, publishers and funding <!--[[:category:Information theory|Information theory]], [[:category:Internet|Internet]], [[:category:World wide web|World
    7 KB (815 words) - 18:03, 14 April 2021
  • '''Business Information Systems''' *Cyber Security and Privacy
    5 KB (663 words) - 11:49, 18 February 2020
  • * Semantic Information Management & Knowledge Integration * Trust, Data Privacy, and Security with Semantic Technologies
    6 KB (872 words) - 14:00, 22 February 2020
  • * Knowledge Graph Population and Information Extraction * Trust, Privacy, and Security for Knowledge Graphs
    4 KB (531 words) - 14:14, 22 February 2020
  • |Title=43rd International ACM SIGIR Conference on Research and Development in Information Retrieval |Field=Information retrieval
    8 KB (1,024 words) - 09:57, 13 May 2020
  • ...ter interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational linguistics. ...ividual stakeholders. They can be use by communities to assemble and share information about applications of AI, to inform approaches to ethical use of AI and the
    6 KB (872 words) - 23:11, 24 February 2020
  • Computer & Network Security Systems Information Theory
    10 KB (1,363 words) - 09:26, 7 May 2012
  • |Title=International Journal of Advances in Computing and Information Technology ...ch results and fundamental advances in all aspects of computer science and Information technology. IJACIT offers wide area of scope and aim that covers almost all
    3 KB (434 words) - 22:46, 30 May 2012
  • *Security and privacy ...formatted according to the [http://www.springer.de/comp/lncs/authors.html information for Springer LNCS authors] and submitted in PDF via [https://easychair.org/
    7 KB (991 words) - 11:15, 12 July 2019
  • * Machine learning and information extraction on the Semantic Web * Trust, privacy, and security on the Semantic Web
    5 KB (663 words) - 14:34, 5 December 2018
  • * Machine learning and information extraction on the Semantic Web * Trust, privacy, and security on the Semantic Web
    5 KB (699 words) - 14:57, 5 December 2018
  • Data Security More information on special sessions is available at www.iasted.org/conferences/specialsessi
    10 KB (1,492 words) - 17:22, 26 June 2012
  • |Title=4th International Conference on Information Visualization Theory and Applications |Field=Information Visualization
    4 KB (466 words) - 16:27, 19 June 2012
  • ...munication Protocols, Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tra 2. WIRELESS INFORMATION NETWORKS
    5 KB (600 words) - 14:41, 20 June 2012
  • Service and Systems Design and QoS Network Security Information and Service Economy
    5 KB (662 words) - 18:50, 20 June 2012
  • |Field=INFORMATION TECHNOLOGIES SUPPORTING LEARNING,LEARNING/TEACHING METHODOLOGIES AND ASSESS 1. INFORMATION TECHNOLOGIES SUPPORTING LEARNING
    5 KB (671 words) - 18:54, 20 June 2012
  • ...rested in the advances and applications in the field of Smart Grids, Green Information and Communication Technologies, Sustainability, Energy Aware Systems and Te Smart Grid Security and Reliability
    5 KB (649 words) - 10:44, 21 June 2012
  • |Field=terrorism, national security, crime, politics, law |Superevent=secau Security Congress
    4 KB (575 words) - 05:16, 28 June 2012
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • |Title=IPICS Summer School Intensive Program on Information Communication Security |Field=information and communication security
    688 bytes (88 words) - 11:28, 1 August 2019
  • |Title=Intensive Programme on Information and Communications Security |Field=information and communication security
    406 bytes (49 words) - 15:37, 1 August 2019
  • ...atial exploration (telescopes, lenses), telecommunications (fiber optics), information processing (quantum computing), industry (cutting and precision measurement System Reliability and Security
    8 KB (1,102 words) - 17:23, 18 July 2012
  • |Field=Information and Communication Security ...broad coverage of recent developments in “Information and Communication Security”. In 2012 the IPICS will be hosted by the SBA Research, at Vienna, Austri
    2 KB (263 words) - 15:04, 24 July 2012
  • *Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS) *Intelligent Information & Database Systems
    2 KB (274 words) - 18:15, 13 August 2012
  • - Information and Data Management<br /> - Security and Access Control<br />
    3 KB (466 words) - 13:00, 16 August 2012
  • |Title=15th International Conference on Enterprise Information Systems ...y, Systems Integration, Artificial Intelligence, Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce
    5 KB (552 words) - 15:08, 21 August 2012
  • ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. • Information and innovation diffusion
    6 KB (728 words) - 01:01, 25 August 2012
  • |Superevent=World congress on Computing and Information Technology (WCIT) ...heir research activities in the field of Computer Science, Engineering and Information Technology. ICGCTI 2013 provides opportunities for the delegates to share t
    4 KB (491 words) - 22:39, 28 August 2012
  • The 2013 International Conference of Information Engineering The 2013 International Conference of Information Security and Internet Engineering
    7 KB (903 words) - 16:27, 10 September 2020
  • The 2013 International Conference of Information Engineering The 2013 International Conference of Information Security and Internet Engineering
    6 KB (868 words) - 17:21, 29 August 2012
  • |Field=databases, data warehousing, data mining,data management,data security ...ehousing, data mining, data management, data security and other aspects of information systems and technology involving advanced applications of data.
    5 KB (558 words) - 13:27, 27 November 2020
  • |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".
    6 KB (801 words) - 11:04, 14 April 2020
  • |title=International Journal of Science and Applied Information Technology (IJSAIT) |Field=Computer Science, Information Technology
    2 KB (234 words) - 08:25, 26 October 2012
  • Information and Computer Technology Information Security
    2 KB (224 words) - 08:27, 26 October 2012
  • Security and Cryptography Web Information Systems
    2 KB (211 words) - 08:30, 26 October 2012
  • |Title=6th International Conference on Information Security and Cryptology 6th International Conference on Information Security and Cryptology
    3 KB (351 words) - 09:52, 28 October 2012
  • |Title=31st Conference on Advanced Information Systems Engineering ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness.
    3 KB (375 words) - 15:06, 24 September 2020
  • |Title=2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013) 2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013)
    6 KB (764 words) - 02:27, 11 December 2012
  • ...ents, logistics and networking, to complex event processing in finance and security. The DEBS conference brings together researchers and practitioners from the More information about the tracks and submission information can be found on the DEBS 2013 website:
    6 KB (826 words) - 15:44, 29 January 2021
  • ...ternative technologies (e.g. solar, tidal, wind, biofuels); food and water security; lobbying efforts by oil and multi-national companies to counter climate sc ...iters to visit www.alternateroutes.ca for author guidelines and additional information. Submissions must be sent directly to editor@alternateroutes.ca. Publicatio
    3 KB (404 words) - 15:10, 10 December 2020
  • |Title=The Second Asian Conference on Information Systems ...the Institute of Electrical Engineers of Japan (IEEJ) and the Electronics, Information and Systems Society under IEEJ and supported by SIIT, OPU, JAIST, NECTEC, P
    3 KB (408 words) - 11:39, 5 January 2013
  • |Title=International Conference on Information Society |Field=Information and communication technologies
    4 KB (535 words) - 14:38, 17 January 2013
  • |Title=5th International Conference on Knowledge Management and Information Sharing ...tures. Although standardization is indeed an essential element for sharing information, IS effectiveness requires going beyond the syntactic nature of IT and delv
    3 KB (441 words) - 14:52, 1 October 2020
  • - Information systems and people in organizations - Information and communications technologies and development
    5 KB (702 words) - 10:02, 5 March 2013
  • Privacy, Security and Neuroethics award and a best poster award. Please check the website for further information.
    5 KB (571 words) - 11:33, 26 March 2013
  • ...munication Protocols, Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tra 2. WIRELESS INFORMATION NETWORKS
    5 KB (647 words) - 19:06, 5 April 2013
  • information from content and the connection of semantics to knowledge, Please refer to the conference website for further information:
    5 KB (609 words) - 11:08, 26 July 2016
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • ...SCI indexed journals, including International Journal on Semantic Web and Information Systems (IJSWIS). More journals will be added soon. ** Machine learning and information extraction on the Web
    5 KB (711 words) - 19:02, 7 March 2020
  • *Cyber Security *Data Mining & Information Retrieval
    3 KB (308 words) - 17:30, 26 May 2016
  • |Title=3rd International Conference on Digital Information Processing, Data Mining, and Wireless Communications *Digital Information Processing
    2 KB (227 words) - 11:30, 21 June 2016
  • ...istributed platforms, middleware, embedded- and cyber-physical-systems and security infrastructures. *Quality Aspects: Functionality, interoperability, performance, conformance, security, reliability, robustness, etc.
    3 KB (405 words) - 10:56, 24 April 2016
  • ...achine learning, computational biology, agent-based systems, semantic web, information extraction and retrieval, text and web mining, health care and public servi ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.
    3 KB (422 words) - 12:09, 24 April 2016
  • |Title=Computational Intelligence in Information Systems The main goals of Computational Intelligence in Information Systems (CIIS) are to understand better these technologies and their applic
    3 KB (309 words) - 17:11, 18 February 2021
  • * Semantic Information Management * Semantics for IT Safety & Security
    10 KB (1,347 words) - 15:01, 26 September 2016
  • * Information extraction and content analysis * Semantic-based information retrieval
    6 KB (898 words) - 14:42, 24 September 2016
  • Faculty of Information Technology, Le Quy Don Technical University Information Security
    3 KB (359 words) - 22:34, 30 September 2016
  • |Title=17th International Conference on Web Information Systems Engineering WISE 2016 welcomes all submissions that fall in the domain of Web, information systems, data analytics, and knowledge and data engineering. The decision o
    2 KB (230 words) - 00:37, 28 May 2016
  • ...ntegration, and information extraction, as well as papers that examine the information needs of various applications. ...ication of semantics and semantic modelling to enable co-operation between information systems. This year, we would also welcome additional submissions on the cha
    9 KB (1,131 words) - 23:18, 24 February 2020
  • |Title=25th European Conference on Information Systems |Field=Information Systems
    1 KB (177 words) - 10:04, 26 July 2016
  • * Information systems and Network security
    2 KB (197 words) - 16:16, 10 November 2016
  • ...IEICE Transactions Special Section on Information and Communication System Security (August 2017) |Field=security, informatioin security, network security, cyber security
    421 bytes (51 words) - 15:56, 15 February 2017
  • ...ter interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational linguistics. ...ividual stakeholders. They can be use by communities to assemble and share information about applications of AI, to inform approaches to ethical use of AI and the
    6 KB (877 words) - 23:06, 24 February 2020
  • ...ACM 2016 : 2016 6th International Conference on Communication and Network Security(ICCNS 2016)--ACM, EI and Scopus |Field=information technology, multimedia, wireless, information systems
    451 bytes (56 words) - 16:17, 8 July 2016
  • |Field=information security, anti-virus
    358 bytes (42 words) - 16:18, 8 July 2016
  • |Title=Ekoparty 2016 : Ekoparty Security Conference |Field=hacking, information security, offensive security
    384 bytes (45 words) - 16:18, 8 July 2016
  • |Field=information security, hacking
    321 bytes (39 words) - 16:18, 8 July 2016
  • |Field=information security, hacking
    282 bytes (29 words) - 18:24, 8 July 2016
  • |Field=information security, hacking, it security
    386 bytes (48 words) - 16:18, 8 July 2016
  • |Title=FC 2017 : Financial Cryptography and Data Security 2017 |Field=cryptography, information security
    364 bytes (45 words) - 16:19, 8 July 2016
  • |Title=ICIT 2016 : 15th International Conference on Information Technology |Field=information security, biomedical informatics, text and web-data analytics
    426 bytes (51 words) - 16:19, 8 July 2016
  • |Title=CISSI 2016 : International Symposium on Information Systems Security |Field=computer sciences, security, big data, cloud computing
    329 bytes (35 words) - 17:36, 8 July 2016
  • ...rnational Conference on Semantic Technology for Intelligence, Defense, and Security ...chnology and ontology relevant to the fields of Intelligence, Defense, and Security. We are especially interested in papers on the following topics:
    4 KB (506 words) - 11:39, 8 October 2020
  • |Title=ICISSP 2017 : 3rd International Conference on Information Systems Security and Privacy |Field=security systems, privacy
    385 bytes (48 words) - 16:21, 8 July 2016
  • |Title=9th Asian Conference on Intelligent Information and Database Systems The 9th Asian Conference on Intelligent Information and Database Systems (ACIIDS) 2017
    4 KB (464 words) - 11:38, 4 September 2020
  • |Title=23rd ACM International Conference on Information and Knowledge Management |Field=Information and Knowledge Management
    12 KB (1,565 words) - 04:15, 5 August 2023
  • - Security and Data Protection For further information please visit WCE-2016 at www.worldconedu.org
    6 KB (777 words) - 23:29, 29 July 2016
  • ...e=IEEE iNIS 2016 : 2nd IEEE International Symposium on Nanoelectronic and Information Systems ...ation systems, iot-big data, nanoelectronic systems, cyberphysical systems security
    464 bytes (56 words) - 15:35, 27 August 2016
  • |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things
    870 bytes (100 words) - 18:53, 2 March 2021
  • |Title=INCISCOS 2016 : International Conference on Information Systems and Computer Science |Field=computer science, information systems, data mining, security
    472 bytes (58 words) - 15:36, 27 August 2016
  • |Title=ICISE 2017 : 2017 2nd International Conference on Information Systems Engineering (ICISE 2017)--IEEE, Ei |Field=information technology, information systems, information security, signal processing
    454 bytes (53 words) - 15:36, 27 August 2016
  • ...le=International Conference on Research and Practical Issues of Enterprise Information Systems |Field=Information Systems
    925 bytes (116 words) - 11:05, 24 August 2016
  • ...cond International Conference on Computer Graphics, Vision and Information Security (CGVIS) |Field=computer graphics, computer vision, image processing, information security
    1 KB (143 words) - 12:26, 5 November 2020
  • |Title=7th International Conference on Communications Security & Information Assurance |Field=security, communications, information security, cryptography
    370 bytes (37 words) - 06:18, 20 September 2016
  • |Title=ICISC 2016 : The 19th Annual International Conference on Information Security and Cryptology
    402 bytes (52 words) - 11:16, 5 September 2016
  • |Title=The Eleventh International Conference on Advances in Information Mining and Management - IMMM 2021, The Eleventh International Conference on Advances in Information Mining and Management
    10 KB (1,305 words) - 00:29, 12 December 2020
  • |Title=23rd European Conference on Information Systems |Field=Information Systems
    3 KB (434 words) - 10:28, 26 July 2016
  • |Title=2015 International Conference on Information Systems |Field=Information Systems
    2 KB (263 words) - 10:32, 26 July 2016
  • ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (282 words) - 10:48, 8 February 2020
  • ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (270 words) - 10:49, 8 February 2020
  • |Title=International Conference on Information Society |Field=Information Society
    5 KB (641 words) - 22:32, 29 July 2016
  • ...ional Civil Aviation Organization New Technology Working Group Request For Information |Field=technology, biometrics, identity management, security
    467 bytes (59 words) - 13:50, 25 September 2016
  • ...S-ACM 2016 : 2016 4th International Conference on Information and Network Security (ICINS 2016)--Ei Compendex
    452 bytes (54 words) - 10:46, 11 September 2016
  • |Acronym=JIP SI: Computer Security Technologies 2017 ...2017 : Journal of Information Processing, Special issue of “Computer Security Technologies against Sophisticated Cyber Attacks”
    513 bytes (62 words) - 14:44, 6 November 2020
  • * data mining, information extraction, search * data privacy and security
    4 KB (557 words) - 10:14, 15 May 2019
  • ...pers on AI techniques in the context of novel application domains, such as security, sustainability, health care, transportation, and commerce. A special theme ...re allowed as long as the deadline date is not past anywhere in the world. Information about camera ready deadlines will be provided to authors at a later date.
    10 KB (1,466 words) - 15:17, 7 March 2021
  • |Field=semantic web, internet of things, big data, information security
    431 bytes (45 words) - 21:01, 26 November 2016
  • |Title=ICICS 2017 : The 8th International Conference on Information and Communication Systems |Field=online social networks, security, big data, communication systems
    441 bytes (55 words) - 13:49, 25 September 2016
  • |Title=7th Asian Conference Intelligent Information and Database Systems |Field=Intelligen Information and Database Systems
    3 KB (340 words) - 11:27, 4 September 2020
  • ...ssing, neuroscience, bioinformatics, privacy and security, machine vision, information retrieval
    2 KB (240 words) - 15:50, 21 May 2019
  • * Software & System Security ** Software and system security and privacy
    18 KB (2,288 words) - 12:48, 27 October 2016
  • |Title=20th International Conference on Business Information Systems BIS 2017 |Field=[[Category:Business Information Systems]]
    9 KB (1,190 words) - 10:12, 5 June 2019
  • |Title=8th Asian Conference Intelligent Information and Database Systems |Field=Intelligent Information and Database Systems
    3 KB (361 words) - 10:38, 4 September 2020
  • Communication Security, Trust, Protocols and Applications Communication Network Security
    5 KB (588 words) - 18:00, 21 January 2017
  • |Title=21st European Conference on Advances in Databases and Information Systems ...ents and to promote interaction and collaboration between the database and information system research communities from European countries and the rest of the wor
    3 KB (421 words) - 20:37, 11 February 2021
  • |Title=2017 4th IEEE ICIIP - International Conference on Image Information Processing ...ocused on all aspect of Image Processing, Computer Vision, and Information security. Like previous conferences, ICIIP 2017 will feature world class speakers, t
    2 KB (323 words) - 13:36, 6 March 2017
  • Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –
    5 KB (631 words) - 15:09, 10 April 2017
  • |Title=Twelfth International Conference on Digital Information Management Twelfth International Conference on Digital Information Management (ICDIM 2017)
    4 KB (528 words) - 18:46, 29 August 2017
  • * Information extraction and content analysis * Semantic-based information retrieval
    7 KB (988 words) - 09:50, 14 August 2019
  • |Title=The 21st International Conference on Business Information Systems |Field=Business Information Systems
    10 KB (1,309 words) - 10:29, 5 June 2019
  • *Security, privacy, and identity on the Web *All submitted papers must be formatted in accordance to the information for Springer LNCS authors at http://www.springer.de/comp/lncs/authors.html
    5 KB (671 words) - 11:07, 12 July 2019
  • ...to cross-fertilize their ideas on the development of Web-based intelligent information management solutions across different domains. *Indexing and Information Extraction from the (Semantic) Deep Web
    18 KB (2,394 words) - 16:28, 29 January 2018
  • the 22nd European Symposium on Research in Computer Security (ESORICS information that they manage (as witnessed, for example, by lawsuits
    7 KB (887 words) - 15:22, 15 July 2017
  • Large Scale Information Systems (ODBASE'17) provides a forum on the use of systems, information retrieval, knowledge discovery, and computational
    6 KB (798 words) - 23:16, 24 February 2020
  • * Geographical Information Systems/ Global Navigation Satellite Systems * Intelligent Information & Database Systems
    10 KB (1,396 words) - 13:30, 28 July 2017
  • |Title=IJAIT 2017 : International Journal of Advanced Information Technology ...ai Li, IT Technical Analyst, AustraliaBhupendra Gupta, Indian Institute of Information Technology, IndiaC. Gomathy, Sathyabama University, IndiaChin-Chih Chang, C
    3 KB (403 words) - 09:15, 12 July 2017
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • ...IJCSEIT 2017 : International Journal of Computer Science, Engineering and Information Technology INTERNATIONAL JOURNAL OF COMPUTER SCIENCE, ENGINEERING AND INFORMATION
    5 KB (679 words) - 13:28, 28 July 2017
  • - Wireless network security and privacy (e.g. access networks, exchanged and shared medical data) ...-Health data exchange and distributions (e.g. HL7 norms, electronic health information exchange-HIE, Health Record-HER)
    4 KB (509 words) - 11:36, 8 August 2017
  • *Semantics for Safety, Security & Privacy *Semantic Information Management
    6 KB (759 words) - 15:52, 5 December 2018
  • -Managing personal information disclosure in semantic environments -Shinsaku Kiyomoto, Information Security Laboratory, KDDI Research Inc.,
    7 KB (901 words) - 11:13, 16 July 2017
  • - Information and Service Economy - Services Security and Reliability
    7 KB (1,009 words) - 13:39, 3 September 2017
  • |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)
    4 KB (562 words) - 12:05, 3 September 2017
  • contributions to all major fields of the Computer Science and Information * Geographical Information Systems/ Global Navigation Satellite Systems
    5 KB (651 words) - 11:34, 8 August 2017
  • |Title=CODASPY 2018 : Conference on Data and Application Security and Privacy 8th ACM Conference on Data and Application Security and Privacy will be held on
    6 KB (807 words) - 13:40, 3 September 2017
  • |Title=9th International Conference on Information Visualization Theory and Applications ...ization. The conference will be structured along several topics related to Information Visualization.
    5 KB (615 words) - 10:58, 15 May 2020
  • science and services, Web Information Systems and Applications, Computer Network Geographic Information System
    5 KB (673 words) - 09:53, 3 September 2017
  • - Security and privacy, cryptographic protocols names, affiliations and e-mails, an abstract, information about the contact
    7 KB (1,009 words) - 15:54, 3 September 2019
  • |Title=SoICT 2017 : The Eighth International Symposium on Information and Communication Technology Security, Computer Vision. Following the past successful symposium SoICT 2016,
    4 KB (559 words) - 11:58, 8 August 2017
  • drawn much attention from computer science and information technology as well as Institute of Information Scientists and Engineers), is to provide an
    3 KB (436 words) - 10:46, 27 May 2020
  • * Mobile communication security issues and requirements * Privacy and Security in Mobile Computing and Wireless Systems
    6 KB (751 words) - 13:28, 28 July 2017
  • |Title=FoIKS 2018 : 10th International Symposium on Foundations of Information and Knowledge Systems 10th Int’l. Symposium on Foundations of Information and Knowledge Systems
    9 KB (1,118 words) - 13:41, 3 September 2017
  • |Field=security California Institute for Telecommunications and Information Technology, USA
    4 KB (472 words) - 14:34, 10 December 2020
  • |Title=SPDF-Mobile 2017 : Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security
    4 KB (536 words) - 09:59, 21 August 2017
  • * Information access in wireless networks * Cryptography, security and privacy of mobile & wireless networks
    6 KB (820 words) - 13:30, 28 July 2017
  • Physical layer security As more information becomes available, it will be published at the RTUWO'17
    3 KB (415 words) - 13:30, 28 July 2017
  • - Service Security and Privacy - Location-based Information Systems
    6 KB (873 words) - 13:30, 28 July 2017
  • 2017. More information about ICTCE 2017, please visit: http://www.ictce.org/ Ruidong Li (National Institute of Information and Communications Technology
    4 KB (524 words) - 13:30, 28 July 2017
  • * Computer Science / Information Technology Education * Cryptography and Information security
    3 KB (347 words) - 10:20, 20 November 2020
  • increasingly process information digitally. This has led to the study of informatics to solve privacy, security, healthcare, education, poverty, and
    4 KB (570 words) - 13:30, 28 July 2017
  • * Computer Science / Information Technology Education * Cryptography and Information security
    3 KB (346 words) - 17:32, 18 February 2021
  • - Database and Information Retrieval - IT Architecture and Security
    1 KB (136 words) - 11:52, 8 August 2017
  • |Title=SKIMA 2017 : 11th International Conference on Software, Knowledge, Information Management & Applications Management, Software Engineering and Information Systems to share their ideas,
    4 KB (497 words) - 11:58, 8 August 2017
  • |Title=ICTS 2017 : The 11th International Conference on Information & Communication Technology and System The 11th International Conference on Information & Communication Technology and
    6 KB (814 words) - 09:03, 3 September 2017
  • Security and privacy in heterogeneous IoT Information Technology,Wah Cantt,
    4 KB (483 words) - 10:00, 21 August 2017
  • |Field=security Wireless Networks, Data Communication Technologies, and Network Security. The
    4 KB (486 words) - 11:57, 8 August 2017
  • |Title=IJNSA 2017 : International Journal of Network Security & Its Applications -- UGC, ERA Indexed |Field=security
    4 KB (628 words) - 13:34, 28 July 2017
  • |Field=security Wireless Networks, Data communication Technologies, and Network Security. The
    4 KB (546 words) - 11:35, 8 August 2017
  • |Title=ICISS 2017 : International Conference on Information Systems Security |Field=security
    5 KB (626 words) - 12:02, 3 September 2017
  • |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
    5 KB (722 words) - 10:00, 21 August 2017
  • |Title=DMCS 2017 : DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17) |Field=security
    4 KB (626 words) - 09:30, 3 September 2017
  • |Title=ICNS - Ei 2017 : 2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus |Field=security
    2 KB (308 words) - 11:50, 3 September 2017
  • |Field=security robustness, security, privacy, and ergonomics of EEG-based biometric systems and
    3 KB (450 words) - 15:32, 9 October 2020
  • |Title=ASPMI 2018 : Advances in Security and Privacy of Multimodal Interfaces |Field=security
    4 KB (592 words) - 13:34, 28 July 2017
  • and network security. • Information broadcasting in Social Networks
    4 KB (442 words) - 10:00, 21 August 2017
  • |Field=security information on how to propose a special session.
    3 KB (449 words) - 12:30, 3 September 2017
  • Strategic Information System: Cloud Computing; Knowledge Management; System Embedded Systems and Communication: Computer Networks; Network and Security;
    4 KB (495 words) - 13:34, 28 July 2017
  • ...ICINS 2017 : 2017 5th International Conference on Information and Network Security (ICINS 2017)--Ei Compendex and Scopus |Field=network security
    1 KB (130 words) - 13:34, 28 July 2017
  • assist researchers in extracting useful information from the rapidly growing mining,Pre-processing techniques, Visualization, Security and information hiding
    5 KB (689 words) - 13:34, 28 July 2017
  • Constraint Modelling and ProcessingKnowledge and information processingData and Information Integration & ModellingKnowledge ModellingData and Information
    3 KB (398 words) - 13:34, 28 July 2017
  • |Title=ICAITA 2017 : 6th International Conference on Advanced Information Technologies and Applications 6th International Conference on Advanced Information Technologies and
    5 KB (589 words) - 11:46, 8 August 2017
  • |Title=ACM International Conference on Ubiquitous Information Management and Communication |Field=information management
    4 KB (580 words) - 20:58, 12 November 2020
  • wellness, safety and security, energy and environment, communication and Although Information and Communication Technologies (ICTs) play a critical and
    5 KB (696 words) - 11:36, 8 August 2017
  • information inference associated with identification, embedded signal processing Architectures, Wireless Information Networks, Data Manipulation, Signal
    5 KB (632 words) - 12:30, 3 September 2017
  • - Big Data Search and Information Retrieval Techniques - Big Data Privacy and Security
    4 KB (583 words) - 10:01, 3 September 2017
  • 2. Security and Intelligence 3. Information Security
    4 KB (507 words) - 09:52, 3 September 2017
  • in the areas of communications, computers, control, electronics, information (20) Information Security and Cryptography
    1 KB (157 words) - 13:19, 28 July 2017
  • Cluj-Napoca, Faculty of Electronics, Telecommunications and Information Industrial Electronics, Information Security, Information Theory,
    4 KB (554 words) - 13:19, 28 July 2017
  • ** [[has local chair::Laurent Flory]], Chief Information Officer, Université de Lyon, France * Security and Privacy on the Web
    12 KB (1,422 words) - 10:18, 5 October 2023
  • questions of peace, security and human security abound. In this period of great intersection of security and sustainability, as well as of the continued legacy
    7 KB (1,000 words) - 12:07, 3 September 2017
  • Computer Security SEC Information Access and Retrieval IAR
    5 KB (660 words) - 13:50, 8 April 2020
  • |Title=MIRA 2017 : IEEE-SITIS2017: Multimedia Information Retrieval and Applications Track Multimedia Information Retrieval and Applications (MIRA)
    5 KB (623 words) - 11:57, 8 August 2017
  • |Title=ICCIS 2017 : 2017 2nd International Conference on Communication and Information Systems (ICCIS 2017)--SCOPUS, EI Compendex |Field=information technology
    2 KB (212 words) - 13:19, 28 July 2017
  • * Cryptography, Security and Privacy of Mobile & Wireless Networks * Information Access in Wireless Networks
    5 KB (616 words) - 13:19, 28 July 2017
  • ...=MIPR 2018 : he First (2018) IEEE International Conference on Multimedia Information Processing and Retrieval (MIPR'18) Multimedia Information Processing and Retrieval (MIPR'18)
    5 KB (654 words) - 09:58, 21 August 2017
  • on Semantic Web and Information Systems (IJSWIS), for fast-track publication in - Machine learning and information extraction on the Semantic Web
    7 KB (903 words) - 13:23, 28 July 2017
  • |Title=DIPEWC 2017 : The Second International Conference on Digital Information Processing, Electronics, and Wireless Communications ...epage=http://sdiwc.net/conferences/2nd-international-conference-on-digital-information-processing-electronics-and-wireless-communications/
    2 KB (242 words) - 11:35, 8 August 2017
  • Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile and network infrastructures; Crowd sourcing; Reliability, Security, Privacy and
    4 KB (508 words) - 13:23, 28 July 2017
  • Enterprise Information Systems Homeland Security
    3 KB (324 words) - 13:34, 5 December 2017
  • |Title=International Conference on Ubiquitous Information Management and Communication |Field=information management
    3 KB (346 words) - 19:16, 26 November 2020
  • ...017 : 7th International Conference on Mathematical Aspects of Computer and Information Sciences |Field=information security
    5 KB (670 words) - 13:24, 28 July 2017
  • |Acronym=Technologies for Security of EHR 2017 |Title=Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Cha
    5 KB (650 words) - 13:24, 28 July 2017
  • ...Appr 2018 : Special Section on Formal Approaches at IEICE Transactions on Information and Systems The IEICE Transactions on Information and Systems announces a
    4 KB (593 words) - 13:24, 28 July 2017
  • |Title=ICEIS 2018 : 20th International Conference on Enterprise Information Systems 20th International Conference on Enterprise Information Systems ICEIS
    6 KB (818 words) - 13:40, 3 September 2017
  • |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security
    4 KB (565 words) - 17:27, 18 February 2021
  • ...e=WICS 2017 : 4th International Workshop on Information and Communication Security |Field=security
    3 KB (347 words) - 19:48, 22 November 2017
  • |Field=security Communications Systems, Embedded Systems and Information Security , to attract a
    6 KB (743 words) - 11:45, 8 August 2017
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security
    5 KB (611 words) - 11:47, 8 August 2017
  • |Title=ICISSP 2018 : 4th International Conference on Information Systems Security and Privacy |Field=security
    3 KB (380 words) - 12:30, 3 September 2017
  • |Field=security * Search Engines and Information Retrieval
    7 KB (946 words) - 13:28, 28 July 2017
  • |Field=security challenges brought by the absence of infrastructures and security threats at
    4 KB (500 words) - 09:56, 21 August 2017
  • Big Data Security, Privacy and Trust For more information about international conferences, please visit our
    2 KB (233 words) - 13:21, 3 September 2017
  • ...yberIoT 2017 : Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal |Field=security
    4 KB (547 words) - 09:58, 21 August 2017
  • ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security
    8 KB (1,170 words) - 13:40, 3 September 2017
  • Smart Cities, Green Information and Communication Technologies, Sustainability, - Security and Privacy
    6 KB (825 words) - 13:22, 3 September 2017
  • by numerous physical, financial and information flows, and, as with all systems, pressures ranging from border security and safety to the need to reduce energy
    2 KB (326 words) - 09:58, 21 August 2017
  • |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer
    5 KB (571 words) - 11:53, 3 September 2017
  • ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security Data intelligence and data security are two closely related views, while data
    4 KB (484 words) - 10:00, 21 August 2017
  • |Title=IEEE ITNEC 2017: 2017 IEEE 2nd Information Technology,Networking,Electronic and Automation Control Conference Topic 1: Information Technology and Computer Science
    2 KB (269 words) - 11:57, 3 September 2017
  • Information Security & Computer Forensics More information about ICICC 2018, please visit: http://icicc.org/
    2 KB (246 words) - 12:11, 3 September 2017
  • architectures, protocols, and methodologies for both information management on interconnected world, information can be exchanged easily, tasks can be
    6 KB (876 words) - 09:59, 21 August 2017
  • |Title=International Conference on Computer Science and Information Technology INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (COMIT
    4 KB (478 words) - 08:48, 16 May 2020
  • Recent years have witnessed the rapid growth of scholarly information due to advancements in information and communication technologies. Scholarly big data
    4 KB (566 words) - 10:00, 21 August 2017
  • - Security, compliance, and nonfunctional properties More information
    7 KB (1,046 words) - 10:36, 26 November 2017
  • - Access control and security - Management of Incomplete information
    3 KB (355 words) - 10:36, 26 November 2017
  • |Field=Information Systems ...lated to the temporal and spatial dimensions of the web as a repository of information
    8 KB (1,023 words) - 19:05, 7 March 2020
  • * Database security, privacy, access control * Information extraction
    4 KB (419 words) - 10:40, 23 February 2020
  • ...nce. The ever increasing need to distribute, exchange, and integrate data, information, and knowledge has added further importance to this subject. Advances in th ...to extensively discuss requirements, problems, and solutions in database, information, and knowledge systems. DEXA 2018 will be held in Regensburg, Germany, from
    4 KB (548 words) - 08:05, 13 September 2019
  • ...ions, and workshops. It will cover issues in data management, database and information systems research, since they are the technological cornerstones of the emer Privacy and Security in Data Management.
    6 KB (826 words) - 09:45, 19 February 2021
  • ...ts benefits, and encounter its limitations. Every year, SEMANTiCS attracts information managers, IT-architects, software engineers and researchers from a wide spe ...ar as well as informal settings. SEMANTiCS addresses problems common among information managers, software engineers, IT-architects and various specialist departme
    11 KB (1,487 words) - 13:45, 13 May 2019
  • |Title=27th ACM International Conference on Information and Knowledge Management THEME: FROM BIG DATA AND BIG INFORMATION TO BIG KNOWLEDGE
    4 KB (546 words) - 14:37, 3 August 2023
  • ...ins: Aeronautic & Aerospace, Transport constructors & operators, Defense & security, Electronics & robotics, Energy & environment, Health care & welfare servic * Systems types: Embedded systems, Transportation systems, Software systems, Information systems, Systems of systems, artificial eco-systems.
    3 KB (440 words) - 16:01, 14 February 2018
  • ...ins: Aeronautic & Aerospace, Transport constructors & operators, Defense & security, Electronics & robotics, Energy & environment, Health care & welfare servic * Systems types: Embedded systems, Transportation systems, Software systems, Information systems, Systems of systems, artificial eco-systems.
    3 KB (368 words) - 16:10, 14 February 2018
  • ...ation in the Life Sciences 2018 (DILS2018) will be held by TIB – Leibniz Information Centre for Science and Technology in Hannover (Germany) at Leibnizhaus on N ...esearch Center Leibniz Universität Hannover (L3S in Hannover), ZB MED – Information Centre for Life Sciences (ZB MED in Cologne/Bonn) and MHH - Hannover Medica
    5 KB (751 words) - 11:13, 21 April 2020
  • ...to extensively discuss requirements, problems, and solutions in database, information, and knowledge systems. DEXA 2019 will be held in Linz, Austria from 26 to DEXA 2019 invites research submissions on all topics related to database, information, and knowledge systems including, but not limited to the points in the list
    4 KB (510 words) - 09:37, 21 April 2020
  • ...chine learning, in fields like medicine, biology, industry, manufacturing, security, education, virtual environments, games, are especially encouraged. * machine learning and information retrieval
    3 KB (425 words) - 20:41, 7 September 2019
  • * privacy and security issues * multimedia databases and information systems
    4 KB (436 words) - 11:49, 21 April 2020
  • |Title=26th ACM Conference on Computer and Communications Security |Field=Information Security
    723 bytes (85 words) - 10:47, 10 March 2020
  • |Title=25th Conference on Computer and Communications Security |Field=Information Security
    794 bytes (105 words) - 21:35, 10 March 2020
  • * Privacy, trust and security in databases * Text databases and information retrieval
    2 KB (281 words) - 09:35, 25 March 2020
  • |Field=Information Security
    1 KB (161 words) - 11:10, 22 May 2019
  • |Title=The 22nd International Conference on Business Information Systems |Field=Business Information Systems
    7 KB (917 words) - 18:07, 17 March 2020
  • |Title=40th International Conference on Information Systems |Field=Information Systems
    2 KB (215 words) - 10:18, 12 June 2019
  • |Title=International Conference on Information and Communications Security |Field=Security
    144 bytes (18 words) - 23:02, 3 April 2020
  • |Title=Information Security Practice and Experience Conference |Field=Security
    111 bytes (13 words) - 00:14, 31 March 2020
  • |Title=IFIP Information Security & Privacy Conference |Field=Security
    105 bytes (13 words) - 00:16, 31 March 2020
  • |Title=International Conference on Information Security and Cryptology
    124 bytes (16 words) - 01:07, 18 March 2020
  • |Title=Information Security Conference |Field=Security
    119 bytes (16 words) - 18:06, 25 March 2020
  • ...Systems Association (IFSA) held jointly with the 38th North American Fuzzy Information Processing Society (NAFIPS) Annual Conference''' Fuzzy information processing
    4 KB (401 words) - 07:52, 29 July 2020
  • |Title=11th International Conference on Information Resources Management * Information Security, Privacy, and Risk Management
    1 KB (188 words) - 07:35, 17 April 2020
  • * Information Visualization * Usable Security
    2 KB (200 words) - 08:47, 17 April 2020
  • * Security and privacy in mobile systems ...uthors are instructed to not include their names, affiliations and contact information on the manuscript they submit for review. Authors should also anonymize the
    5 KB (759 words) - 15:21, 18 June 2020
  • |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
    11 KB (1,549 words) - 11:34, 17 April 2020
  • |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (152 words) - 10:13, 17 April 2020
  • * information theoretical foundation for artificial intelligence * privacy and security
    2 KB (192 words) - 08:38, 14 April 2020
  • |Title=34th International Conference on Information Technologies === Information Technologies ===
    3 KB (314 words) - 11:52, 27 March 2020
  • |Title=15th International Conference on Availability, Reliability, and Security The International Conference on Availability, Reliability, and Security (ARES) 2020
    3 KB (313 words) - 17:14, 4 November 2020
  • * Language-Based Security in Data Management * Managing Uncertain and Imprecise Information
    2 KB (255 words) - 10:39, 17 April 2020
  • * Data Privacy and Security * Information Integration and Data Quality
    3 KB (396 words) - 09:53, 19 February 2021
  • |Title=23rd Information Security Conference
    431 bytes (57 words) - 18:06, 25 March 2020
  • |Title=17th International Conference on Trust, Privacy and Security in Digital Business ...lack of trust in electronic procedures and the extent to which information security and user privacy can be ensured.
    5 KB (690 words) - 12:02, 26 March 2020
  • |Title=16th International Conference on Information Security Practice and Experience
    1 KB (163 words) - 13:46, 30 March 2020
  • * Security and privacy in mobile systems ...uthors are instructed to not include their names, affiliations and contact information on the manuscript they submit for review. Authors should also anonymize the
    5 KB (732 words) - 15:22, 18 June 2020
  • |Title=22nd International Conference on Information and Communications Security
    2 KB (192 words) - 12:22, 3 April 2020
  • |Title=21st International Conference on Information and Communications Security
    1 KB (196 words) - 06:33, 6 April 2020
  • |Title=20th International Conference on Information and Communications Security
    2 KB (208 words) - 07:02, 6 April 2020
  • ...URWARE 2021]], The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
    2 KB (238 words) - 17:26, 14 January 2021
  • |Title=22nd Information Security Conference
    1 KB (196 words) - 11:22, 8 April 2020
  • |Title=21st Information Security Conference
    1 KB (180 words) - 12:46, 8 April 2020
  • |Title=20th Information Security Conference
    1 KB (198 words) - 13:36, 8 April 2020
  • * Security and privacy in mobile systems ...uthors are instructed to not include their names, affiliations and contact information on the manuscript they submit for review. Furthermore, they are instructed
    6 KB (944 words) - 15:24, 18 June 2020
  • * Security and privacy in mobile systems ...uthors are instructed to not include their names, affiliations and contact information on the manuscript they submit for review. Authors should also anonymize the
    5 KB (721 words) - 10:07, 17 August 2023
  • |Title=15th Information Security Practice and Experience Conference
    2 KB (217 words) - 09:06, 9 April 2020
  • |Title=14th Information Security Practice and Experience Conference
    1 KB (169 words) - 09:32, 9 April 2020
  • ...and web-based applications, embedded and resource-limited computation, and security. See POPL 2019’s Submission and Reviewing FAQ page for more information:
    7 KB (1,057 words) - 10:13, 17 April 2020
  • |Title=12th International Conference on Provable Security <big>General information</big>
    3 KB (445 words) - 11:59, 9 April 2020
  • |Title=27th International Conference on Cooperative Information Systems Topic 1: Data, Information, and Knowledge Engineering:
    2 KB (254 words) - 08:59, 14 April 2020
  • |Title=13th International Conference on Information Resources Management * Information Security, Privacy, and Risk Management
    1 KB (158 words) - 08:18, 17 April 2020
  • ...and web-based applications, embedded and resource-limited computation, and security. See POPL 2018’s Submission and Reviewing FAQ page for more information.
    8 KB (1,080 words) - 10:43, 17 April 2020
  • |Title=11th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (155 words) - 10:20, 17 April 2020
  • |Title=10th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (153 words) - 10:27, 17 April 2020
  • * Language-Based Security in Data Management * Managing Uncertain and Imprecise Information
    1 KB (166 words) - 10:53, 17 April 2020
  • ...rmation processing; Biometric analysis, forensic analysis watermarking and security; Processing signal, image and video collections; Implementation of signal, ...ons Networks and mm-Wave Systems; Cognitive radio networks; Cyber-physical security; Social networks and finance applications, etc.
    10 KB (1,215 words) - 14:46, 19 April 2020
  • ...ced Metering Infrastructure); QoS, latency and reliability in Smart Grids; Security (including wireless, wire-line, broadband over power lines) in Smart Grids; ...s; Wind energy integration in Smart Grids; Disseminating power grid status information in Smart Grids; Solar, wind and energy storage integration in Smart Grids;
    10 KB (1,331 words) - 14:52, 19 April 2020
  • ...Massive beamforming ; Ultra-lean systems; Spectrum-sharing communications; Information retrieval protocols; Multi-access MAC protocols; Multi-user indoor communic ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;
    14 KB (1,770 words) - 14:56, 19 April 2020
  • ...owsers; Tabular Data on the Web; Web linguistic changes; Web-based systems security; Web preferences; Web pattern semantics; Modeling web user activities; Twit Web architectures; Web engineering; Web applications; Web services and information management; Behavioral analysis and personalization; Crowdsourcing systems
    11 KB (1,390 words) - 12:35, 18 May 2020
  • ...rgies and inspire new collaborations between people from computer science, information science, social science, humanities, and everyone interested in understandi * IT security, intellectual property and personal anonymity in open innovation
    6 KB (748 words) - 10:02, 30 April 2020
  • safety and security for mobile MAS deployment security and trust in multi-agent systems
    8 KB (1,092 words) - 12:49, 22 April 2020
  • * Security * Building-, City-, Region-Information Modelling/Management
    1 KB (139 words) - 15:45, 22 April 2020
  • * Security For more information, please go to http://www.uasconferences.com/
    2 KB (265 words) - 15:42, 29 April 2020
  • |Title=14-th International Workshop on Advances in Information Security * Security of next generation Operating Systems
    2 KB (200 words) - 12:01, 28 April 2020
  • ...17 is fully sponsored by the ICUAS Association, a non-profit organization. Information about the organization may be found at www.icuas.com. * Security
    3 KB (385 words) - 15:55, 29 April 2020
  • |Title=11th International Conference on Information Visualization Theory and Applications 11th International Conference on Information Visualization Theory and Applications IVAPP
    3 KB (293 words) - 10:38, 15 May 2020
  • ...rters; embedded and application-specific A/D and D/A converters; analog to information conversion; time-to-digital converters. ...ultimedia, machine-learning, deep-learning, neuromorphism, cryptographics, security and trusted computing, special-function acceleration, processing-in-memory;
    6 KB (673 words) - 09:29, 6 May 2020
  • ...ks that otherwise would not be possible; it provides the ability to access information instantaneously and from any location, helping to shape the world’s event ...eshold and Near-threshold circuits; Circuits for neuro-computing; Hardware-security circuits including PUFs, TRNGs, crypto-circuits, side-channel-attacks mitig
    5 KB (629 words) - 09:36, 6 May 2020
  • ...l events offers a wide variety of extra opportunities to meet and exchange information on relevant issues for the design and test community. Special space will al ...se heterogeneous integration, emerging computation models based on quantum information processing, and emerging application domains such as microfluidics. The spe
    12 KB (1,651 words) - 13:30, 27 November 2020
  • * Information Infrastructure and Security
    2 KB (175 words) - 10:44, 7 May 2020
  • * Information Infrastructure and Security
    2 KB (174 words) - 10:43, 7 May 2020
  • ...and dynamic power, power and clock distribution, yield, manufacturability, security, reliability, and testability. ...gns on FPGAs establishing state-of-the-art in high-performance, low-power, security, or high-reliability. Designs leveraging unique capabilities of FPGA archit
    11 KB (1,541 words) - 15:35, 18 June 2020
  • |Title=10th International Conference on Information Visualization Theory and Applications ...ization. The conference will be structured along several topics related to Information Visualization.
    5 KB (630 words) - 10:01, 15 May 2020
  • |Title=12th International Conference on Information Visualization Theory and Applications ...conference will be structured along several topics mainly associated with Information and Data Visualization, but also with related fields such as Visual Analyti
    6 KB (735 words) - 11:44, 15 May 2020
  • * Data and Information Quality for Big Data * Visualizing Large Scale Security Data
    4 KB (563 words) - 15:55, 23 June 2020
  • * Data and Information Quality for Big Data * Visualizing Large Scale Security Data
    5 KB (543 words) - 21:14, 18 May 2020
  • * Information infrastructure, management and processing * Heterogeneous data/information integration
    4 KB (515 words) - 16:39, 25 May 2020
  • * Heterogeneous data/information integration. * Mining multi-source and mixed-source information.
    3 KB (308 words) - 16:50, 16 December 2020
  • * Data and Information Quality for Big Data * Visualizing Large Scale Security Data
    9 KB (1,187 words) - 14:18, 27 May 2020
  • ...h fields that have recently drawn much attention from computer science and information technology as well as from social sciences and other disciplines. ...Engineers), is to provide an international forum for exchanging ideas and information on current studies, challenges, research results, system developments, and
    3 KB (389 words) - 06:51, 9 June 2020
  • * Fuzzy information processing, information extraction, and fusion * Fuzzy web engineering, information retrieval, text mining, and social network analysis
    2 KB (238 words) - 17:30, 6 May 2021
  • * Intelligence for Security * Intelligent Information Processing
    2 KB (239 words) - 14:17, 2 June 2020
  • * Robustness/security of electronic circuits and systems information on travel assistance will be included in the student's author kit. Late New
    5 KB (795 words) - 15:37, 2 June 2020
  • * Intelligence for Security * Intelligent Information Processing
    2 KB (146 words) - 17:26, 2 June 2020
  • ...of mobile networks; Personalized services in 5G networks; 5G+ HetHetNets; Information-centric satellite networks; Drone-based services; Internet of self-tunable ...s; Automatic computing for Web services; Web services challenges on trust, security, performance, scalability; Enterprise Web services; Web services discovery,
    14 KB (1,804 words) - 13:49, 5 June 2020
  • ...content; Mobile Web of Things; HCI in mobile applications; Mobile Web and information systems; Adaptive approaches for mobile computing; Mobile software systems; Security and privacy environments; Protection and safety of distributed mobile data;
    7 KB (918 words) - 13:51, 5 June 2020
  • * Information system * Neural information system
    5 KB (691 words) - 11:40, 11 June 2020
  • * Information Utilization * Information security
    6 KB (720 words) - 12:20, 11 June 2020
  • * Information Utilization * Information security
    5 KB (670 words) - 09:42, 12 June 2020
  • * Information Utilization * Information security
    6 KB (784 words) - 12:58, 15 June 2020
  • ...lity attribution in smart workplaces; Cybersecurity, laws and regulations; Information from browsers by online advertising platforms; Predicting social engineerin RTSEC: Security for Internet-based real-time systems
    17 KB (2,088 words) - 12:49, 14 June 2020
  • |Title=The Tenth International Conference on Advances in Information Mining and Management |Field=information mining, information management
    11 KB (1,356 words) - 12:56, 14 June 2020
  • |Title=11th Conference on Decision and Game Theory for Security 2020 Conference on Decision and Game Theory for Security
    3 KB (353 words) - 12:35, 23 June 2020
  • * R08 Robust Detection, Compressive Sensing and Information Extraction * R16 Defence and Security
    2 KB (231 words) - 18:01, 25 June 2020
  • * R06 Digital Beam Forming, MIMO Processing, Waveform Diversity and Information Coding * R18 Defence and Security, Surveillance, Remote Traffi c Monitoring, Sense and Avoid Applications
    2 KB (300 words) - 19:03, 25 June 2020
  • * ● Security Radar * ● SAR information extraction
    2 KB (258 words) - 18:42, 26 June 2020
  • * Information forensics and security
    2 KB (219 words) - 11:01, 22 August 2023
  • ...ls, architectural and design concepts; Design and implementation of mobile information systems; Wireless communications and mechanisms; Antenna and RF subsystems; ...nt and control of high speed networks; Performance in high speed networks; Security aspects in high speed networks; QoS/SLA in high speed networks; Diagnosing
    13 KB (1,636 words) - 11:51, 10 July 2020
  • * Communications and Information Security
    3 KB (483 words) - 08:08, 21 August 2020
  • ...'' Foundations of networks and multi-agent systems: models, algorithms and information management: * Formal Methods for Network Information Management
    4 KB (556 words) - 06:42, 26 August 2020
  • Information and Communication Technologies Security, privacy and safety systems
    1 KB (175 words) - 13:45, 10 July 2020
  • ...t from a vehicular cloud; Wireless degrading communication sensing; Secure information transfer in V2V communication; Coordination of terrestrial vehicles and dro Security
    8 KB (915 words) - 19:45, 9 July 2020
  • Intelligent information extraction Intelligent security systems and applications
    5 KB (599 words) - 19:46, 9 July 2020
  • ...esses and practice for emotionally-oriented systems; Case studies relating information systems and emotions; Ethics in emotion-driven systems ...nalized opinions across blogs, social media, news sites; Balancing privacy/security/reliability/utility/usability of personal data; Multiple patterns extractio
    9 KB (1,068 words) - 19:47, 9 July 2020
  • ...DN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality ...and discovery of things on the Internet; Crowd-sourcing and things; Trust, security and privacy in Internet of Things; Lightweight implementations of cryptogra
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ..."Spectrum Allocation and Management", "Wireless and mobile technologies", "Security in wireless and mobile environment" Security in wireless and mobile environment
    11 KB (1,335 words) - 02:28, 10 July 2020
  • ...le=The Fifteenth International Multi-Conference on Computing in the Global Information Technology ...a systems","Networking and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deploym
    18 KB (2,036 words) - 02:36, 10 July 2020
  • ...plications. This biennial event provides an excellent forum for exchanging information and discussion on a wide variety of SAR topics, representing the latest SAR E7 Surveillance, Security, and Disaster
    2 KB (323 words) - 11:18, 10 July 2020
  • ...ggregation; Personalized seeking and personalized sharing; Contextual user information facets; User-oriented ontology; User empowerment: awareness and control; Us ...Privacy and anonymity in specialized applications /healthcare. databases, information retrieval, social networks, etc./; Legal aspects in privacy and anonymity
    10 KB (1,232 words) - 16:20, 22 March 2021
  • ...ased software development; Service-oriented software development; Software security-based development; Aspect-oriented software development Information modeling; GUI related software; Computer-aided software design; Hierarchica
    13 KB (1,573 words) - 12:00, 10 July 2020
  • ...I and optical mapping; Semantic representation of human body data; Trusted information for personal wellness; Cloud outsourcing of medical image repositories; Web ...ical systems; Scalability evaluation; Mobile clouds in medical scenarios ; Security of medical systems; Privacy for wired and wireless medical devices
    8 KB (970 words) - 16:50, 14 July 2020
  • * Andreas Zeller, CISPA Helmholtz Center for Information Security, Germany
    3 KB (306 words) - 12:12, 16 July 2020
  • ...rtificial societies, chemicals, pharmaceuticals, food industry, geographic information systems, materials and environment engineering and so on.
    3 KB (382 words) - 12:25, 22 July 2020
  • ...e management, artificial societies, chemicals, pharmaceuticals, geographic information systems, materials and environment engineering and so on.
    2 KB (200 words) - 09:20, 24 July 2020
  • ...e management, artificial societies, chemicals, pharmaceuticals, geographic information systems, materials and environment engineering and so on. ...rs.html) (templates are available in http://2019.haisconference.eu/general-information/paper-submission-publication/) and must be no more than twelve (12) pages l
    3 KB (392 words) - 11:02, 24 July 2020
  • ...rtificial societies, chemicals, pharmaceuticals, food industry, geographic information systems, materials and environment engineering and so on. ...eo plus audio) version of the slides. This MP4 file should include all the information the speaker wants to explain about his/her contribution. In addition to the
    6 KB (871 words) - 12:16, 28 July 2020
  • Fuzzy information processing Information fusion
    4 KB (422 words) - 08:30, 29 July 2020
  • |Title=36th Information Systems Education Conference * Globalization and Information Systems
    1 KB (159 words) - 13:38, 29 July 2020
  • |Field=Networking, Internet, Security, Sensor, Hardware, Technologies ...Standardization of IoT applications; Flow-based security; Adaptive trust; Security operations centers; Trusted data marketplaces; IoT Cloud-based videoconfere
    7 KB (904 words) - 12:32, 22 January 2021
  • |Title=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies
    15 KB (1,886 words) - 16:16, 25 August 2020
  • ...chronization; Tracking and partial position information; Failure handling; Security and authentication ...nsor networks and the Web; Integration with other systems (e.g., Web-based information systems, process control, enterprise software, etc.); Target tracking; RFID
    15 KB (1,880 words) - 14:45, 27 August 2020
  • |Title=IEEE Information Theory Workshop 2019 ...Recording Link=https://www.tib.eu/de/suchen/id/TIBKAT:1698826001/2019-IEEE-Information-Theory-Workshop-ITW-?cHash=9ecca06a21bed99f1659c74d5765c586
    1 KB (164 words) - 08:17, 4 August 2020
  • ...ssible conference topics of interest should include Economics, Management, Information Management, Innovation, Entrepreneurship, Education, Marketing, Human Resou * Information and Market Efficiency
    9 KB (896 words) - 16:31, 6 August 2020
  • Fundamental of haptic interactions; Tangible user interfaces; Bidirectional information flow ; Haptography; Haptic feedback and control; Bodyware (embedded sensors ...s; Collaborative systems; Computer-supported cooperative work; Distributed information spaces; Communicators and advisory systems; Interaction through wireless co
    16 KB (1,964 words) - 13:34, 7 January 2021
  • |Title=2015 IEEE Information Theory Workshop - Fall ...Recording Link=https://www.tib.eu/de/suchen/id/TIBKAT:847574032/2015-IEEE-Information-Theory-Workshop-fall-ITW?cHash=916147055fab124118e04a398eed095a
    973 bytes (104 words) - 07:27, 13 August 2020
  • * Communications and Information Security
    3 KB (482 words) - 08:25, 21 August 2020
  • * Communications and Information Security
    3 KB (489 words) - 09:05, 21 August 2020
  • * Communications and Information Security
    4 KB (604 words) - 09:59, 21 August 2020
  • |Title=8th International Conference on Availability, Reliability, and Security The 8th International Conference on Availability, Reliability and Security (ARES) 2013
    4 KB (468 words) - 11:39, 21 August 2020
  • |Title=9th International Conference on Availability, Reliability and Security The 9th International Conference on Availability, Reliability and Security (ARES) 2014
    4 KB (538 words) - 11:52, 21 August 2020
  • |Title=14th International Conference on Availability, Reliability, and Security The 14th International Conference on Availability, Reliability, and Security (ARES) 2019
    5 KB (627 words) - 10:49, 25 August 2020
  • ...cy expectations from hospital information systems; Sharing patient profile information among medical institutions; Big data in medical informatics; Ontologies of ...of individual’s data trends; Data aggregation technologies; Delivery of information governance policies; Tools/systems for automatic document metadata tagging;
    16 KB (2,024 words) - 13:33, 24 August 2020
  • # Security and privacy issues College of Computer Science and Information Engineering, Guangxi Normal University, Guilin, China
    3 KB (327 words) - 10:00, 25 August 2020
  • |Title=23rd Annual International Conference on Information Security and Cryptology Cloud Computing Security
    2 KB (169 words) - 10:42, 25 August 2020
  • |Title=22nd Annual International Conference on Information Security and Cryptology Hyun sook Cho (National Security Research Institute, Korea)
    993 bytes (115 words) - 11:12, 25 August 2020
  • |Title=13th International Conference on Availability, Reliability and Security The 13th International Conference on Availability, Reliability and Security (ARES) 2018
    3 KB (336 words) - 11:20, 25 August 2020
  • |Title=21st Annual International Conference on Information Security and Cryptology
    1,001 bytes (112 words) - 11:36, 25 August 2020
  • |Title=10th International Conference on Availability, Reliability and Security The 10th International Conference on Availability, Reliability and Security (ARES) 2015
    5 KB (590 words) - 11:54, 25 August 2020
  • * Algorithms for information security and privacy * Algorithms for databases and information retrieval
    4 KB (436 words) - 12:06, 25 August 2020
  • |Title=11th International Conference on Availability, Reliability and Security The 11th International Conference on Availability, Reliability and Security (ARES) 2016
    5 KB (581 words) - 12:47, 25 August 2020
  • |Title=20th International Conference on Information Security and Cryptology ...cording Link=https://www.tib.eu/de/suchen/id/TIBKAT:1015040950/Information-security-and-cryptology-ICISC-2017?cHash=50d3fbfc906afa84cbab4307b8c0b4b6
    605 bytes (77 words) - 14:48, 26 August 2020
  • ...Information Technology & Poli 2008]] ||[[:Special Issue of the Journal of Information Technology & Politics on Text Annotation for Political Science Research.]] ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV]] ||43
    24 KB (2,633 words) - 18:53, 15 October 2020
  • |Title=10th Asian Conference Intelligent Information and Database Systems The 10th Asian Conference Intelligent Information and Database Systems (ACIIDS) 2018
    4 KB (447 words) - 12:37, 4 September 2020
  • |Title=11th Asian Conference Intelligent Information and Database Systems The 11th Asian Conference Intelligent Information and Database Systems (ACIIDS) 2019
    4 KB (478 words) - 11:05, 11 September 2020
  • |Title=33rd International Conference on Advanced Information Systems Engineering * Neuro-Information Systems
    3 KB (346 words) - 16:20, 24 September 2020
  • systems; Information collection and dissemination; Mobility and embedded systems; Safety and security in embedded systems; Performance
    10 KB (1,210 words) - 20:17, 22 November 2020
  • Remote sensing technology and geographic information system (GIS); modeling; Security, privacy, and trust; Radio resource management; IT
    11 KB (1,377 words) - 20:26, 22 November 2020
  • ...Massive beamforming ; Ultra-lean systems; Spectrum-sharing communications; Information retrieval protocols; Multi-access MAC protocols; Multi-user indoor commun ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;
    13 KB (1,574 words) - 12:11, 24 November 2020
  • ...ced Metering Infrastructure); QoS, latency and reliability in Smart Grids; Security (including wireless, wire-line, broadband over power lines) in Smart Grids; ...s; Wind energy integration in Smart Grids; Disseminating power grid status information in Smart Grids; Solar, wind and energy storage integration in Smart Grids;
    10 KB (1,235 words) - 18:42, 26 November 2020
  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...ons; Target-oriented keyword search; Filter-based profile matching; Mutual information on data streams; Stream processing; Digitized documents streams; Queries w
    11 KB (1,360 words) - 18:45, 26 November 2020
  • ...ty attribution in smart workplaces; Cybersecurity, laws and regulations; Information from browsers by online advertising platforms; Predicting social engineerin RTSEC: Security for Internet-based real-time systems
    17 KB (2,035 words) - 14:45, 18 February 2021
  • ...content; Mobile Web of Things; HCI in mobile applications; Mobile Web and information systems; Adaptive approaches for mobile computing; Mobile software systems; Security and privacy environments; Protection and safety of distributed mobile data;
    7 KB (868 words) - 15:11, 18 February 2021
  • Developments in information and computing systems; Grid computing; Cloud computing; Pervasive / ubiquit ...d management; Denial of service mitigation and prevention; System and data security; Communication visualization
    11 KB (1,325 words) - 15:01, 18 February 2021
  • Security in wireless and mobile environment Security and robustness in wireless networks; Privacy, Authentication
    12 KB (1,454 words) - 19:21, 30 November 2020
  • sensing; Secure information transfer in V2V communication; Coordination Security
    8 KB (1,014 words) - 19:25, 30 November 2020
  • 5G Edge caching techniques; Performance in 5G networks; Security and things; Trust, security and privacy in Internet of Things; Lightweight
    13 KB (1,607 words) - 19:32, 30 November 2020
  • Intelligent information extraction Intelligent security systems and applications
    6 KB (682 words) - 19:34, 30 November 2020
  • ...rmation processing; Biometric analysis, forensic analysis watermarking and security; Processing signal, image and video collections; Implementation of signal, ...ons Networks and mm-Wave Systems; Cognitive radio networks; Cyber-physical security; Social networks and finance applications, etc.
    9 KB (1,125 words) - 10:54, 8 December 2020
  • ...agement; Scale enterprise computing; Data processing in encrypted domains; Security-intelligent lifecycle management; Portability of SOA applications; Multi-te ...tion in Mobile Cloud computing; Cloud quality assessment; Auditability and Security in Cloud-based services; Legacy application in clouds; Protecting business
    8 KB (919 words) - 18:54, 8 December 2020
  • ...ocial networks, social search; Trust models for self-organizing systems of information (wikis, forums, blogs.); Trust and personalization for enabling adaptation;
    8 KB (931 words) - 15:28, 29 December 2020
  • BRAIN: Brain information processing and informatics ...ral structures and neurobiological process; Cognitive architectures; Brain information storage, collection, and processing; Formal conceptual models of human brai
    8 KB (972 words) - 18:55, 8 December 2020
  • ...-driven workflow design and management; Web content performance, accuracy, security, and reliability; Web content modeling; Web content-based applications; (Se ...ransmission; Wireless image transmission; Computer generated images; Image security, scrambling, and regions of interest; Timing requirements for image transmi
    13 KB (1,567 words) - 18:56, 8 December 2020
  • Information theory on energy efficiency; Smart Grid; Protocols and and smart information storage; Energy-efficient networking; Cross-layer
    19 KB (2,346 words) - 10:51, 9 December 2020
  • Trends in processing multimedia information sensitive information; Dealing with sparsity and distribution of
    10 KB (1,212 words) - 14:36, 29 December 2020
  • |Field=information systems, big data, software design Information Systems and Technologies
    5 KB (640 words) - 21:39, 17 December 2020
  • ...of mobile networks; Personalized services in 5G networks; 5G+ HetHetNets; Information-centric satellite networks; Drone-based services; Internet of self-tunable ...s; Automatic computing for Web services; Web services challenges on trust, security, performance, scalability; Enterprise Web services; Web services discovery,
    15 KB (1,921 words) - 01:00, 12 December 2020
  • ...ECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
    2 KB (257 words) - 12:33, 22 January 2021
  • |Title=Eclipse Research International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of T |Field=Computer and information sciences
    318 bytes (40 words) - 10:35, 28 January 2021
  • ...rocessing in big and fast data, publish/subscribe, data stream processing, security and encryption in stream processing, rule-based systems, maintenance of mat ...t processing, information-centric networking, software-defined networking, security, reliability and resilience, programmable hardware, energy management and g
    3 KB (344 words) - 15:54, 29 January 2021
  • ...processing, event processing in big and fast data, data stream processing, security and encryption in stream processing, complex event forecasting, in-network ...t processing, information-centric networking, software-defined networking, security, reliability and resilience, distributed ledger and blockchains, programmab
    2 KB (300 words) - 16:01, 29 January 2021
  • ...Massive beamforming ; Ultra-lean systems; Spectrum-sharing communications; Information retrieval protocols; Multi-access MAC protocols; Multi-user indoor commun ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;
    13 KB (1,653 words) - 14:44, 10 February 2021
  • ...ced Metering Infrastructure); QoS, latency and reliability in Smart Grids; Security (including wireless, wire-line, broadband over power lines) in Smart Grids; ...s; Wind energy integration in Smart Grids; Disseminating power grid status information in Smart Grids; Solar, wind and energy storage integration in Smart Grids;
    10 KB (1,237 words) - 14:50, 10 February 2021
  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...ons; Target-oriented keyword search; Filter-based profile matching; Mutual information on data streams; Stream processing; Digitized documents streams; Queries w
    11 KB (1,361 words) - 14:52, 10 February 2021
  • |Title=25th European Conference on Advances in Databases and Information Systems * Information extraction and integration
    2 KB (279 words) - 20:35, 11 February 2021
  • : Three Wikidata items updated with extra information and three new items created. | {{OR|ACNS}} || International Conference on Applied Cryptography and Network Security || http://www.wikidata.org/entity/Q4781524
    19 KB (2,518 words) - 09:03, 21 February 2021
  • * Information-centric networks * Security services
    3 KB (291 words) - 11:57, 25 February 2021
  • ...Massive beamforming ; Ultra-lean systems; Spectrum-sharing communications; Information retrieval protocols; Multi-access MAC protocols; Multi-user indoor commun ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;
    14 KB (1,718 words) - 11:30, 3 March 2021
  • ...ced Metering Infrastructure); QoS, latency and reliability in Smart Grids; Security (including wireless, wire-line, broadband over power lines) in Smart Grids; ...s; Wind energy integration in Smart Grids; Disseminating power grid status information in Smart Grids; Solar, wind and energy storage integration in Smart Grids;
    10 KB (1,277 words) - 11:56, 3 March 2021
  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...ons; Target-oriented keyword search; Filter-based profile matching; Mutual information on data streams; Stream processing; Digitized documents streams; Queries w
    12 KB (1,409 words) - 12:01, 3 March 2021
  • |Title=35th International Conference on Advanced Information Networking and Applications * Security, Privacy and Trust
    2 KB (230 words) - 12:18, 4 March 2021
  • Campus information systems Security and confidentiality
    2 KB (258 words) - 10:46, 11 March 2021
  • Data Security Issues More information about the topics, please visit: http://www.icset.org/cfp.html
    2 KB (244 words) - 11:06, 11 March 2021
  • Information Processing and Engineering Safety, Security and Risk Management
    2 KB (199 words) - 11:14, 11 March 2021
  • |Title=2021 2nd Information Communication Technologies Conference Topic about Information Communication Technologies:
    2 KB (318 words) - 09:51, 16 March 2021
  • Communication and Information Theory Computer and Network Security
    2 KB (267 words) - 10:40, 16 March 2021
  • |Title=2021 11th International Conference on Information Communication and Management ● Information Economy and Information Management
    2 KB (314 words) - 04:25, 17 March 2021
  • ...tions, Communication Theory and Techniques, Wireless Networks, Information Security
    1 KB (178 words) - 11:03, 23 March 2021
  • Information and Scientific Visualization Internet, Web and Security Visualization
    2 KB (267 words) - 08:31, 26 March 2021
  • Agent based web mining, text mining and information retrieval Security, privacy and trust methods and solutions for enabling e-business
    2 KB (295 words) - 10:54, 7 April 2021
  • |Title=4th International Conference on Information Hiding and Image Processing Track I: Information Hiding
    2 KB (229 words) - 10:26, 9 April 2021
  • Security and privacy for smart IoT More information about the topics, please visit: http://www.icebi.org/cfp.html
    2 KB (217 words) - 11:21, 9 April 2021
  • |Title=30th ACM International Conference on Information and Knowledge Management = CIKM 2021: The 30th ACM International Conference on Information and Knowledge Management =
    37 KB (5,185 words) - 11:25, 3 August 2023
  • |Title=7th International Conference on Communication and Information Processing Digital Information Processing and Communications
    2 KB (241 words) - 09:07, 13 April 2021
  • |Title=2nd International Conference on Computer Communication and Information Systems Cyber-security, Privacy and Ethics of IS
    2 KB (240 words) - 09:51, 13 April 2021
  • ...pe to see many of you in our virtual conference place in gather.town. More information on the session format and timing will follow soon. ** Security, privacy, liability, and dependability of vehicular networks
    5 KB (680 words) - 16:29, 28 October 2021
  • * security * quantum information and quantum computing
    3 KB (425 words) - 14:12, 22 April 2021
  • For more conference information, please visit the conference website Information Processing and Engineering
    2 KB (319 words) - 05:05, 9 June 2021
  • MSIE 2022 information: For more conference information, please visit the conference website: http://www.msie.org
    2 KB (237 words) - 08:24, 29 September 2021
  • |Title=3rd International Conference on Information Security and Privacy Protection
    1 KB (132 words) - 09:00, 11 May 2022
  • ...l extensions for energy efficient networks; Network load balance and smart information storage; Energy-efficient networking; Cross-layer optimizations to minimize ...ransmission; Wireless image transmission; Computer generated images; Image security, scrambling, and regions of interest; Timing requirements for image transmi
    19 KB (2,317 words) - 02:40, 26 November 2021
  • Remote sensing technology and geographic information system (GIS); Remote sensing computation applications; Optical communicatio ...trial interference; Fade mitigation techniques; Advanced channel modeling; Security, privacy, and trust; Radio resource management; IT application in Space Com
    11 KB (1,294 words) - 02:42, 26 November 2021
  • ...plications; Intelligent human-computer interaction transportation systems; Information collection and dissemination; Mobility and vehicular traffic models; Vehicl ...tems and embedded computation models; Testing embedded systems; Safety and security in embedded systems; Performance analysis of embedded systems; Mission-crit
    10 KB (1,228 words) - 02:46, 26 November 2021
  • Trends in processing multimedia information ...speed and sensitive information; Dealing with sparsity and distribution of information; Classification and semantic of Big Data; Processing Huge data and Deep dat
    10 KB (1,221 words) - 03:35, 3 December 2021
  • * Security, privacy, liability, and dependability of vehicular networks ...d and authors may include their names, affiliations, and other identifying information in the submitted manuscripts. Only Adobe PDF files will be accepted for the
    6 KB (871 words) - 10:16, 31 January 2023
  • |Title=8th International Conference on Intelligent Information Technology Journal of Advances in Information Technology (ISSN: 1798-2340; CiteScore: 2.4): indexed by ESCI (Web of Scien
    1 KB (186 words) - 09:05, 1 December 2022
  • *Information forensics, security, and cryptography
    2 KB (210 words) - 04:49, 17 January 2023
  • |Title=4th International Conference on Information Security and Privacy Protection
    695 bytes (91 words) - 09:03, 11 May 2023
  • |Title=2022 International Conference on Digital Management, Information Science and Technologies |Field=Information Science, Digital Management, Information Technologies
    4 KB (494 words) - 10:28, 27 September 2022
  • |Title=2nd International Conference on Networking, Communications and Information Technology |Field=Networking, Communications, Information Technology
    4 KB (470 words) - 11:06, 27 September 2022
  • Special Issue: Network and Information Security: Threats, Vulnerabilities, Detection and Management Special Issue - Novel Technologies for Systems and Network Security
    2 KB (214 words) - 05:12, 1 June 2023
  • |Title=13th International Conference on Information Communication and Management ● Information Economy and Information Management
    4 KB (504 words) - 08:27, 22 September 2023
  • |Title=13th International Conference on Communication and Network Security * Special Issue - Network and Information Security: Threats, Vulnerabilities, Detection and Management, indexed within Scopus,
    2 KB (288 words) - 05:03, 9 October 2023
  • |Title=20th ACM Conference on Information and Knowledge Management ...ns of high quality papers on all topics in the general areas of databases, information retrieval, and knowledge management. Papers should contain previously unpub
    6 KB (723 words) - 07:11, 16 August 2023
  • Network Security Computer Network and Security & Forensic
    4 KB (501 words) - 04:15, 20 July 2023
  • |Title=International Conference on Cyber Security and Information Engineering |Field=Cyber Security, Information Engineering
    4 KB (517 words) - 04:36, 29 June 2023
  • * Information-centric networking * Network security and privacy
    8 KB (1,137 words) - 11:08, 3 August 2023
  • * COMMUNICATION AND INFORMATION SYSTEM SECURITY
    6 KB (935 words) - 11:18, 3 August 2023
  • |Title=32nd ACM International Conference on Information and Knowledge Management The Conference on Information and Knowledge Management (CIKM) provides a unique venue for industry and ac
    7 KB (951 words) - 04:25, 5 September 2023
  • |Title=The 22nd ACM International Conference on Information and Knowledge Management ...ns of high quality papers on all topics in the general areas of databases, information retrieval, and knowledge management. Topics of interest in the three tracks
    5 KB (690 words) - 13:23, 14 August 2023
  • |Title=5th International Conference on Information Security and Privacy Protection
    698 bytes (91 words) - 09:38, 11 April 2024
  • |Title=2024 International Conference on Communication, Information and Digital Technologies |Field=Communication, Information, Digital Technologies
    4 KB (550 words) - 05:55, 1 November 2023
  • |Title=2024 3rd International Conference on Networks, Communications and Information Technology |Field=computer networks, networks, communications, information technology,
    5 KB (626 words) - 09:32, 27 February 2024

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)