Search results
Create the page "Information Security" on this wiki! See also the search results found.
- Computer System, Information Security and Networks • Security and Privacy in E-Commerce3 KB (319 words) - 17:07, 27 February 2009
- For latest information see: ...ning, Device and Equipment Technology, Production processes and Sequences, Information Technology38 KB (4,832 words) - 17:07, 27 February 2009
- IEEE Computer Society Task Force on Information Assurance by the special interest group Security - Intrusion Detection and8 KB (1,020 words) - 17:07, 27 February 2009
- * Security, data handling, and privacy ...peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the Author Guidelines page5 KB (670 words) - 17:08, 27 February 2009
- | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems11 KB (1,440 words) - 17:08, 27 February 2009
- | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability12 KB (1,690 words) - 17:08, 27 February 2009
- | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability3 KB (480 words) - 17:08, 27 February 2009
- | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability6 KB (828 words) - 17:08, 27 February 2009
- * Network security threats and countermeasures ...xson, IMC '07). If applicable, authors are also urged to notify parties of security flaws in their products or services in advance of publication. Adherence to6 KB (774 words) - 17:08, 27 February 2009
- * Information assurance and security of the Springer LNCS Style (please check the Information for Authors8 KB (1,144 words) - 20:59, 27 February 2009
- ...nal Conference on the Theory and Application of Cryptology and Information Security602 bytes (67 words) - 15:25, 10 March 2020
- ...nal Conference on the Theory and Application of Cryptology and Information Security433 bytes (48 words) - 15:34, 10 March 2020
- * Business Information Technology Alignment * Project, risk and security management4 KB (571 words) - 12:58, 9 March 2020
- ...nal Conference on the Theory and Application of Cryptology and Information Security178 bytes (23 words) - 21:30, 10 March 2020
- |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security5 KB (578 words) - 10:21, 20 November 2020
- 1. Information Technologies Supporting Learning AREA 1: INFORMATION TECHNOLOGIES SUPPORTING LEARNING5 KB (661 words) - 15:49, 8 December 2009
- |Title=International Conference on Web Information Systems and Technologies (WEBIST) |Field=Web Information Systems3 KB (440 words) - 15:25, 9 December 2009
- |Title=International Workshop on Wireless Multimedia Computing and Security Services - Security, privacy, and cryptographic protocols for WMC3 KB (477 words) - 16:54, 8 August 2009
- ...tion Retrieval, HCI) interested in topics like trust, provenance, privacy, security, reputation and spam, in order to address current challenges of their adapt - Privacy and Security in self-organizing and adaptive systems5 KB (642 words) - 20:34, 9 June 2009
- ...d political point of view. It is critical to provide rescue personnel with information technology tools that enable more effective and efficient mitigation during ...arge-scale multi-agent systems that deals with uncertainty and conflicting information during crisis management,6 KB (783 words) - 17:04, 27 December 2015