Search results
Create the page "Information Security" on this wiki! See also the search results found.
- 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.7 KB (897 words) - 17:05, 27 February 2009
- * Security and trustworthy in multi-tenancy service hosting environment Ian Gorton, Computational and Information Sciences at Pacific Northwest National Laboratory, US6 KB (855 words) - 17:06, 27 February 2009
- Official publication of the Information Resources Management Association - Security issues and technologies5 KB (646 words) - 17:06, 27 February 2009
- | Title = The 2009 International Conference on Web Information Systems and Mining (WISM’09) and the 2009 International Conference on Art ...orum for scientists and researchers to present the state of the art of web information systems, web mining, artificial intelligence, computational intelligence, w5 KB (604 words) - 17:06, 27 February 2009
- · Reliability, fault-tolerance, and security Jongsuk Ruth Lee, Korea Institute of Science and Technology Information, Korea8 KB (1,050 words) - 18:04, 5 January 2017
- ...cent developments and research issues on e-commerce, enterprise computing, security and developments in the area of social networks. ADDITIONAL INFORMATION4 KB (528 words) - 17:06, 27 February 2009
- + Middleware solutions for Security, Privacy and Trust (Elsevier's Engineering Information Index), and automatically included6 KB (800 words) - 22:11, 27 February 2009
- * Security and privacy in P2P systems Detailed information on electronic submission are provided on the web site5 KB (623 words) - 17:06, 27 February 2009
- ...erence aims to provide a forum to disseminate, to all branches industries, information on the most recent and relevant innovations, theories and applications in I • Information Processing and Engineering3 KB (399 words) - 17:06, 27 February 2009
- VoIP, NGN and IMS Security * Security models of voice, video and text over IP services4 KB (621 words) - 17:06, 27 February 2009
- transform, and integrate information in a platform-independent manner. * Rule languages for exchanging and processing information through the7 KB (883 words) - 17:06, 27 February 2009
- * Geographic Information Retrieval * Security and Integrity4 KB (534 words) - 17:07, 27 February 2009
- | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability8 KB (967 words) - 17:07, 27 February 2009
- | Title = 14th International Conference on Information Quality 14th International Conference on Information Quality (ICIQ)5 KB (690 words) - 17:07, 27 February 2009
- | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability4 KB (506 words) - 17:07, 27 February 2009
- | Title = Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) | Field = Computer security and reliability4 KB (600 words) - 17:07, 27 February 2009
- | Title = 5th IEEE International Workshop on Wireless and Sensor Networks Security Wireless and Sensor Networks Security (WSNS'09)4 KB (485 words) - 17:07, 27 February 2009
- ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Web Spam - Adversarial Information Retrieval in Digital Ecosystems7 KB (941 words) - 17:07, 27 February 2009
- * Error and erasure correcting codes for information dispersal * Cryptography, Security and trust6 KB (750 words) - 16:50, 27 December 2015
- * Authorization, Privacy and Security * Geographical Information Systems9 KB (1,249 words) - 08:42, 7 October 2011