- Forum Information Security Data Security CODASPY - ACM Conference on Data and Application Security and Privacy Computer Security Data Security Computer Privacy104 bytes (431 words) - 09:00, 19 October 2022
- Information Security APF 2021 2021-06-17 → 2021-06-18 Information Security Data Security APF 2020 2020-10-22 → 2020-10-23 Information Security Data Security CCS104 bytes (448 words) - 10:24, 20 October 2022
- Information Security Computer Security Communication Security CCS 2018 2019-10-15 → 2019-10-19 Information Security Computer Security Communication Security AsiaCCS104 bytes (2,577 words) - 10:02, 1 September 2022
- Reliability Communication Security CODASPY - ACM Conference on Data and Application Security and Privacy Computer Security Data Security Computer Privacy SACMAT91 bytes (1,235 words) - 12:40, 5 May 2023
- 2022-04-25 → 2022-04-27 Computer Security Data Security Computer Privacy CODASPY 2021 2021-04-26 → 2021-04-28 Computer Security Data Security Computer Privacy CODASPY104 bytes (217 words) - 10:03, 1 September 2022
- 2023-04-24 → 2023-04-26 Computer Security Data Security Computer Privacy CODASPY 2022 2022-04-25 → 2022-04-27 Computer Security Data Security Computer Privacy CODASPY563 bytes (273 words) - 11:33, 30 June 2023
- Financial Cryptography and Data Security Cryptography IMACC - IMA International Conference on Cryptography and Coding Computer Security Cryptography Coding PKC104 bytes (144 words) - 12:52, 19 October 2022
- Information Security Data Security APF 2021 2021-06-17 → 2021-06-18 Information Security Data Security APF 2020 2020-10-22 → 2020-10-23 Information Security Data617 bytes (225 words) - 11:13, 23 February 2023
- Cryptography Data Security FC 2022 2022-05-02 → 2022-05-06 Cryptography Data Security FC 2021 2021-03-01 → 2021-03-05 Cryptography Data Security FC 2020 2622 bytes (122 words) - 08:37, 17 August 2023
- SafettBehavioural SafetyBenchmarksBig DataBig Data AnalyticsBig Data ComputingBig Data ScienceBig Data SystemsBig Social DataBio-InformaticsBio-Inspired Meth305 bytes (1,165 words) - 16:17, 2 February 2023
- Programming Paradigms APF 2015 2015-10-07 → 2015-10-08 Information Security Data Security ICFEM 2014 2014-11-03 → 2014-11-05 Software Engineering87 bytes (75 words) - 06:58, 10 August 2023
- 00wqx6897 Event Series Events List APF 2023 2023-06-01 → 2023-06-02 Data Security89 bytes (21 words) - 09:46, 23 February 2023
- Series Events List APF 2021 2021-06-17 → 2021-06-18 Information Security Data Security88 bytes (23 words) - 10:03, 23 February 2023
- 00w9hey63 Event Series Events List APF 2023 2023-06-01 → 2023-06-02 Data Security89 bytes (21 words) - 09:49, 23 February 2023
- Title Financial Cryptography and Data Security 2023 Ordinal 27 Event Series FC - Financial Cryptography and Data Security Start Date 2023-05-01 End Date585 bytes (159 words) - 08:38, 17 August 2023
- Event Series Events List FC 2023 2023-05-01 → 2023-05-05 Cryptography Data Security90 bytes (22 words) - 07:00, 17 August 2023
- Science Formal Methods APF 2012 2012-10-10 → 2012-10-11 Information Security Data Security FOSSACS 2010 2010-03-20 → 2010-03-28 ETAPS 2010 2010-03-20 → 2010-03-2889 bytes (79 words) - 10:27, 25 November 2022
- E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies104 bytes (99 words) - 08:57, 20 October 2022
- E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies173 bytes (62 words) - 05:58, 20 October 2022
- Title Financial Cryptography and Data Security 2020 Ordinal 24 Event Series FC - Financial Cryptography and Data Security Start Date 2020-02-10 End Date1 KB (171 words) - 08:38, 17 August 2023
- Title Financial Cryptography and Data Security 2018 Ordinal 22 Event Series FC - Financial Cryptography and Data Security Start Date 2018-02-26 End Date915 bytes (164 words) - 07:33, 17 August 2023
- E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies ICETE 2010-07-26 → 2010-07-28 E-Business128 bytes (79 words) - 08:54, 20 October 2022
- E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies177 bytes (47 words) - 14:56, 20 October 2022
- E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies146 bytes (45 words) - 07:10, 20 October 2022
- E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies123 bytes (43 words) - 08:53, 20 October 2022
- E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies104 bytes (41 words) - 10:40, 20 October 2022
- Warsaw Region Mazovia Country Poland (PL) Academic Field Data Security, Information Security Official Website https://2022.privacyforum.eu/ Deadlines organization954 bytes (191 words) - 10:01, 23 February 2023
- Conference on Data and Application Security and Privacy Ordinal 12 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start789 bytes (187 words) - 09:28, 7 July 2023
- Title Financial Cryptography and Data Security 2019 Ordinal 23 Event Series FC - Financial Cryptography and Data Security Start Date 2019-02-18 End Date887 bytes (171 words) - 07:22, 17 August 2023
- Title Financial Cryptography and Data Security 2021 Ordinal 25 Event Series FC - Financial Cryptography and Data Security Start Date 2021-03-01 End Date501 bytes (141 words) - 08:38, 17 August 2023
- Title Financial Cryptography and Data Security 2022 Ordinal 26 Event Series FC - Financial Cryptography and Data Security Start Date 2022-05-02 End Date597 bytes (163 words) - 08:38, 17 August 2023
- Scope Data intelligence and data security are two closely related views, while data management is the base of both data intelligence and data security. In4 KB (618 words) - 14:03, 19 October 2022
- Conference on Data and Application Security and Privacy Ordinal 11 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start694 bytes (165 words) - 09:54, 15 December 2022
- Conference on Data and Application Security and Privacy Ordinal 10 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start694 bytes (165 words) - 10:11, 15 December 2022
- Conference on Data and Application Security and Privacy Ordinal 13 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start744 bytes (201 words) - 11:54, 4 August 2023
- Lumière Lyon 2 City Lyon Country France (FR) Academic Field Data Security, Information Security Official Website https://2023.privacyforum.eu/ Submission982 bytes (214 words) - 11:13, 23 February 2023
- 2019 2019-06-13 → 2019-06-14 Information Security Data Security ACNS 2019 2019-06-05 → 2019-06-07 Computer Security Computer Reliability CNSM 2018 2018-11-05 → 2018-11-0989 bytes (47 words) - 10:13, 2 February 2023
- Conference on Data and Application Security and Privacy Ordinal 4 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start821 bytes (196 words) - 10:40, 15 December 2022
- Conference on Data and Application Security and Privacy Ordinal 3 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start821 bytes (196 words) - 10:41, 15 December 2022
- Conference on Data and Application Security and Privacy Ordinal 7 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start854 bytes (194 words) - 10:21, 15 December 2022
- Conference on Data and Application Security and Privacy Ordinal 2 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start790 bytes (193 words) - 10:42, 15 December 2022
- Conference on Data and Application Security and Privacy Ordinal 5 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start829 bytes (198 words) - 10:38, 15 December 2022
- Conference on Data and Application Security and Privacy Ordinal 6 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start846 bytes (205 words) - 08:03, 10 July 2023
- Conference on Data and Application Security and Privacy Ordinal 1 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start790 bytes (193 words) - 10:46, 15 December 2022
- Conference on Data and Application Security and Privacy Ordinal 9 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start805 bytes (190 words) - 10:15, 15 December 2022
- City Rome Region Lazio Country Italy (IT) Academic Field Data Security, Information Security Official Website https://2019.privacyforum.eu/ Deadlines organization1 KB (215 words) - 10:25, 23 February 2023
- 2021-06-18 Status as scheduled Mode online Academic Field Data Security, Information Security Official Website https://2021.privacyforum.eu/ DOI https://doi789 bytes (178 words) - 09:01, 7 July 2023
- Vienna Region Vienna Country Austria (AT) Academic Field Data Security, Information Security Official Website https://2017.privacyforum.eu/ Deadlines organization916 bytes (193 words) - 10:38, 23 February 2023
- Limassol Region Limassol Country Cyprus (CY) Academic Field Data Security, Information Security Official Website https://2012.privacyforum.eu/ Deadlines organization853 bytes (181 words) - 10:56, 23 February 2023
- City Athens Region Attica Country Greece (GR) Academic Field Data Security, Information Security Official Website https://2014.privacyforum.eu/ Deadlines organization838 bytes (180 words) - 10:52, 23 February 2023
- Region Luxembourg Country Luxembourg (LU) Academic Field Data Security, Information Security Official Website https://2015.privacyforum.eu/ Deadlines organization859 bytes (183 words) - 10:48, 23 February 2023
- Lisbon Region Lisboa Country Portugal (PT) Academic Field Data Security, Information Security Official Website https://2020.privacyforum.eu/ Deadlines organization927 bytes (202 words) - 10:18, 23 February 2023
- Barcelona Region Catalonia Country Spain (ES) Academic Field Data Security, Information Security Official Website https://2018.privacyforum.eu/ Deadlines organization946 bytes (177 words) - 10:29, 23 February 2023
- Securing data/apps on untrusted platforms Securing the semantic web Security and privacy in GIS/spatial data Security and privacy in healthcare Security and6 KB (995 words) - 10:17, 15 December 2022
- Event Acronym FC 2017 Title FC 2017 : Financial Cryptography and Data Security 2017 Start Date 2017-04-03 End Date 2017-04-07 Status as scheduled Mode531 bytes (134 words) - 14:54, 19 October 2022
- theory; concurrency; constraints; data exchange; data integration; data mining; data modeling; data on the Web; data streams; data warehouses; distributed databases;4 KB (614 words) - 06:24, 7 August 2023
- am Main Region Hesse Country Germany (DE) Academic Field Data Security, Information Security Official Website https://2016.privacyforum.eu/ Deadlines organization856 bytes (184 words) - 10:43, 23 February 2023
- Series Events List APF 2022 2022-06-23 → 2022-06-24 Information Security Data Security89 bytes (23 words) - 09:57, 23 February 2023
- Country Austria (AT) Academic Field Machine Learning, Data Mining, Security In Data Science, Data Science Applications Official Website http://www.idsc577 bytes (141 words) - 15:21, 19 October 2022
- Informationization Equipment and its Management Digital Campus Construction and Data Security Management Dates Concerned Submission Due: April 20, 2010 Acceptance2 KB (318 words) - 13:06, 19 October 2022
- Cryptocurrency IoT Security Cloud security Access control Privacy-enhancing technologies Database security Big data security and privacy Biometric Security Network2 KB (321 words) - 12:11, 4 August 2023
- Series Events List APF 2022 2022-06-23 → 2022-06-24 Information Security Data Security89 bytes (23 words) - 09:57, 23 February 2023
- Scientific and Statistical Databases DATA WAREHOUSING AND KNOWLEDGE DISCOVERY § Data Warehouses, Data Marts and OLAP § Data Mining and Knowledge Discovery §3 KB (403 words) - 15:28, 19 October 2022
- Italy (IT) Academic Field Semantic Web, Internet Of Things, Big Data, Information Security Official Website http://www.sitis-conf.org/en/web-computing-and-applications632 bytes (154 words) - 14:55, 19 October 2022
- Operating system security Intrusion detection Big data security and privacy Biometric Security Network security Formal methods for security Digital forensics2 KB (277 words) - 14:19, 19 October 2022
- Ecuador (EC) Academic Field Computer Science, Information Systems, Data Mining, Security Official Website http://ingenieria.ute.edu.ec/inciscos/index.php/en/call-for-papers635 bytes (148 words) - 15:20, 19 October 2022
- to: Security in new paradigms of smart data Cyber monitoring & incident response smart data Digital forensics in intelligent data Big data security, Database3 KB (535 words) - 14:22, 19 October 2022
- following areas, but not limited to: Information Security Management Data Security Application Security Security Policy Authentication & Authorisation Privacy2 KB (322 words) - 14:44, 19 October 2022
- Series Events List APF 2019 2019-06-13 → 2019-06-14 Information Security Data Security89 bytes (23 words) - 10:25, 23 February 2023
- theory and practice Communication theory Compression Cryptography and data security Detection and estimation Information theory and statistics Information2 KB (313 words) - 15:22, 19 October 2022
- Ad Hoc Network Security • Software Security • Secure Data Streams • Security Testing • Smartphone Security • Usable Security • Web Security • Vulnerability5 KB (738 words) - 14:05, 19 October 2022
- Mining data streams and sensor data * Mining multi-media, graph, spatio-temporal and semi-structured data * Security, privacy, and adversarial data mining4 KB (650 words) - 14:45, 19 October 2022
- Rate-Distortion Theory Shannon Theory Stochastic Processes Cryptology and Data Security Data Networks Applications of Information Theory Multi-User Information3 KB (456 words) - 15:22, 19 October 2022
- Series Events List APF 2018 2018-06-13 → 2018-06-14 Information Security Data Security88 bytes (23 words) - 10:30, 23 February 2023
- query optimization; real-time data; recovery; scientific data; security; semi-structured data; spatial data; temporal data; transactions; updates; views;5 KB (780 words) - 14:44, 19 October 2022
- Scale Security Data Threat Detection using Big Data Analytics Privacy Preserving Big Data Collection/Analytics HCI Challenges for Big Data Security & Privacy9 KB (1,351 words) - 06:28, 7 August 2023
- Computing Techniques for Big Data Big Data as a Service Big Data Open Platforms Big Data in Mobile and Pervasive Computing Big Data Persistence and Preservation7 KB (997 words) - 14:08, 19 October 2022
- Interaction APF 2023 2023-06-01 → 2023-06-02 France (FR) Information Security Data Security Tagung der Fachgruppe Computeralgebra 2023 2023-05-31 → 2023-06-02808 bytes (10,171 words) - 10:31, 27 November 2023
- Series Events List APF 2014 2014-05-20 → 2014-05-21 Information Security Data Security88 bytes (23 words) - 10:52, 23 February 2023
- Dataspaces * Data integration and interoperability * Data management for ubiquitous and mobile computing * Data mining and information extraction * Data modelling4 KB (683 words) - 14:45, 19 October 2022
- to: * Data integration and interoperability * Data management for ubiquitous and mobile computing * Data mining and information extraction * Data modelling4 KB (700 words) - 14:45, 19 October 2022
- Scale Security Data Threat Detection using Big Data Analytics Privacy Preserving Big Data Collection/Analytics HCI Challenges for Big Data Security & Privacy5 KB (694 words) - 17:08, 22 November 2023
- Scale Security Data Threat Detection using Big Data Analytics Privacy Preserving Big Data Collection/Analytics HCI Challenges for Big Data Security & Privacy4 KB (683 words) - 17:08, 22 November 2023
- Series Events List APF 2020 2020-10-22 → 2020-10-23 Information Security Data Security35 bytes (17 words) - 10:18, 23 February 2023
- interpretation. Event Acronym Smart-City-IoT-Security 2017 Title Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart5 KB (902 words) - 14:23, 19 October 2022
- computing Cloud and grid computing for big data Security and privacy for big data Smart devices and hardware Big data applications: Bioinformatics, Multimedia3 KB (461 words) - 12:59, 19 October 2022
- Context-aware and data-centric security * Protection and safety of distributed mobile data * Mobile application security * Security for voice and multimedia4 KB (552 words) - 15:28, 19 October 2022
- Acronym Technologies for Security of EHR 2017 Title Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic5 KB (814 words) - 14:24, 19 October 2022
- And Streaming Technologies Data Management, Privacy, Security, And Confidentiality Display And Visualization Of Medical Data E-Commerce In Health Informatics9 KB (1,352 words) - 13:32, 19 October 2022
- Series Events List APF 2017 2017-06-07 → 2017-06-08 Information Security Data Security35 bytes (17 words) - 10:38, 23 February 2023
- reports on big data and smart computing. Relevant Topics Techniques, models and algorithms for big data Tools and systems for big data Data mining, graph3 KB (568 words) - 12:59, 19 October 2022
- computing Big data security, Database security Social engineering, insider threats, advance spear phishing Cyber threat intelligence Security and fault tolerance4 KB (582 words) - 14:24, 19 October 2022
- and Network Security Security Cryptology Network Security DBSEC - IFIP WG 11.3 Working Conference on Data and Applications Security Security ESORICS - European132 bytes (911 words) - 14:53, 20 October 2022
- Blockchain security and privacy Cloud computing security Computer forensics Cyber-physical system security Data and application security Embedded systems security4 KB (557 words) - 09:56, 17 October 2023
- 2017-04-04 → 2017-04-06 Security Big Data Online Social Networks Communication Systems SDABBI 2017 2017-04-03 → 2017-04-05 Data Science Big Data Bioinformatics104 bytes (963 words) - 08:19, 19 October 2022
- research in security and privacy, including but not limited to: System security Operating systems security Web security Mobile systems security Distributed3 KB (459 words) - 14:23, 19 October 2022
- evaluation Data exchange and integration Data quality, cleaning and lineage Database monitoring and tuning Data privacy and security Data warehousing Data mining:5 KB (645 words) - 14:46, 19 October 2022
- Cyberphysical Security • Security in Content Delivery • Secure Distributed Computing • Data and Application Security • Security in Crowdsourcing • Security Architectures2 KB (304 words) - 11:47, 8 December 2023
- change tracking of web data sources cost and benefits of web data quality assessment web data quality assessment benchmarks Web Data Cleansing methods for4 KB (708 words) - 14:13, 19 October 2022
- semi-structured, and unstructured data - Data warehousing and the semantic web - Data warehouse privacy, security, and reliability - Data warehousing applications:8 KB (1,110 words) - 10:01, 4 August 2023
- limited to): Special Session: Big Data and Intelligent Computing Methods and Techniques for Software Development Big data and Cloud Computing Distributed5 KB (807 words) - 14:04, 19 October 2022
- Distributed, P2P Systems Scientific Data and Data Visualization Security, Privacy, Authenticated Query Processing Data Warehouses, OLAP, Business Intelligence5 KB (713 words) - 12:14, 14 December 2022
- Economies - Social Inclusion «« eHealth »» May include issues relating to: - Data Security Issues - eHealth Policy and Practice - eHealthcare Strategies and Provision6 KB (808 words) - 14:55, 19 October 2022
- location-based services * Data management in wireless networks * Data management in sensor and mobile ad hoc networks * Data management in mobile peer-to-peer5 KB (670 words) - 15:27, 19 October 2022
- with unstructured data and semi-structured data (e.g., XML) * Multimedia data warehouses * Biomedical data warehouses * Data warehousing & OLAP in mobile10 KB (1,439 words) - 14:45, 19 October 2022
- Symposium on Big Data Computing Data Mining Machine Learning Data Analytics Big Data Computing BDCAT - IEEE/ACM International Conference on Big Data Computing104 bytes (2,202 words) - 08:59, 19 October 2022
- Systems Networks Network Security DSN - IEEE/IFIP International Conference on Dependable Systems and Networks Computer Security Computer Reliability Networks104 bytes (790 words) - 12:39, 20 October 2022
- Storage Data Integrity, Security, Protection, Privacy Standards and Policies for Data Management Novel Applications Multimedia Forensics and Security Urban5 KB (792 words) - 14:13, 19 October 2022
- Cyber-physical system security Data and application security Embedded systems security Formal methods for security Hardware-based security and applications12 KB (1,651 words) - 06:26, 8 September 2023
- coding-theoretic approaches to data security 6. Network and Information Security Symposium * 3G and 4G security * 802.11 security and 802.11i * Application/network14 KB (1,681 words) - 14:45, 19 October 2022
- Symposium on Big Data Computing Data Mining Machine Learning Data Analytics Big Data Computing BDCAT - IEEE/ACM International Conference on Big Data Computing104 bytes (2,346 words) - 11:38, 20 October 2022
- trustworthiness of web data tracking the provenance of web data profiling and change tracking of web data sources cost and benefits of web data quality assessment7 KB (902 words) - 15:21, 19 October 2022
- Privacy and Security Security USENIX - USENIX Annual Technical Conference Computer Science Events List SOUPS 2023 2023-08-06 → 2023-08-08 Security USENIX ATC89 bytes (389 words) - 13:27, 23 November 2022
- CRIS (2): CRIS - International Conference on Cryptography and Information Security, CRIS - International Conference on Current Research Information Systems221 bytes (219 words) - 14:36, 23 August 2022
- Rendering B.4 Watermarking Techniques Applications in Copyright Control Data Security Digital Watermarking Identification and Certification C. Signal Processing11 KB (1,639 words) - 15:29, 19 October 2022
- rationality. Trust and reputation. Issues of privacy of communication, data security, and jurisdiction for agent-mediated trading. Coalition and team formation9 KB (1,364 words) - 14:45, 19 October 2022
- 2016-12-08 → 2016-12-10 Computer Science Security Big Data Cloud Computing CloudAM 2016 2016-12-06 → 2016-12-09 Big Data Cloud Computing Social Clouds Fog Computing104 bytes (602 words) - 08:25, 19 October 2022
- Interactive data mining Data-mining-ready structures and pre-processing Data mining visualization Information hiding in data mining Security and privacy3 KB (339 words) - 13:00, 19 October 2022
- ICCDM 2017 2017-05-04 → 2017-05-06 Computer Science Software Engineering Data Mining Image Processing CBI 2017 2017-04-27 → 2017-04-29 Artificial Intelligence125 bytes (533 words) - 07:16, 20 October 2022
- 2016-11-14 → 2016-11-16 Network Security IMC 2015 2015-10-28 → 2015-10-30 Network Security IMC 2014 2014-11-05 → 2014-11-07 Network Security IMC 2013 2013-10-23 → 2013-10-25708 bytes (313 words) - 14:18, 14 March 2024
- Conference on Data Engineering Computer Science Database Data Engineering ICDM - IEEE International Conference on Data Mining Computer Science Data Mining ICME88 bytes (6,340 words) - 09:06, 6 March 2023
- 2016 2016-12-23 → 2016-12-24 Security Communication Networking Network Security URoute 2016 2016-12-05 → 2016-12-08 Big Data Networking Software Defined104 bytes (287 words) - 12:40, 20 October 2022
- Workshop on Intelligent Cross-Data Analysis and Retrieval BDBS - International Conference on Big Data, Blockchain and Security SWIB - Semantic Web in Bibliotheken393 bytes (14 words) - 11:24, 24 November 2022
- 2016-11-30 → 2016-12-02 Security Internet Of Things Radio Frequency Identification I-WeCA 2016 2016-11-28 → 2016-12-01 Information Security Semantic Web Internet104 bytes (744 words) - 10:51, 20 October 2022
- And Security IEEE SysCo 2016 2016-11-28 → 2016-11-29 Social Networks Collaborative Systems Collaborative Processes Collaborative Systems Security CTS 2016104 bytes (331 words) - 12:26, 21 October 2022
- Technologies. COMPUTATIONAL INTELLIGENCE AND BIG DATA ANALYTICS: Soft computing, knowledge discovery and data mining, machine learning, computational biology4 KB (490 words) - 14:19, 19 October 2022
- Engineering Data Mining Information Technology Computing ICNCT 2017 2017-02-20 → 2017-02-22 Cloud Computing Networks Computing Network Security ICICA 2017104 bytes (220 words) - 08:49, 19 October 2022
- Web LD4 - LD4 Conference on Linked Data Semantic Web Digital Libraries Library Science Linked Data LDOW - Linked Data on the Web Semantic Web LSWT - Leipziger104 bytes (2,266 words) - 11:56, 21 October 2022
- Events List iDSC 2017 2017-06-12 → 2017-06-13 Data Mining Machine Learning Security In Data Science Data Science Applications145 bytes (38 words) - 14:54, 20 October 2022
- 2016-12-19 → 2016-12-21 Information Systems Big Data Internet of Things Nanoelectronic Systems Cyberphysical Systems Security November 2016 2016-11-09 → 2016-11-11104 bytes (91 words) - 10:52, 20 October 2022
- interfaces, analog signal processing, power management, computation, data storage, security, and communication; non-silicon, carbon, organic, metaloxide-, compound6 KB (818 words) - 07:30, 28 March 2024
- and Semantic Web applications Web of Things applications Big Data and data analytics Security, privacy, and identity on the Web Web standards All submitted6 KB (738 words) - 11:44, 16 January 2024
- 2016-10-09 → 2016-10-13 Cyber Security Assessment Cyber Risk Management Cyber Training Technologies Cyber Security Data Analytics104 bytes (36 words) - 08:54, 19 October 2022
- 2017 2017-02-22 → 2017-02-24 Security Pattern Recognition Biometrics Behavior Analysis ITPF 2016 2016-12-28 → 2016-12-29 Data Mining Pattern Recognition104 bytes (305 words) - 15:19, 20 October 2022
- Optimization BDAS 2017 2017-05-30 → 2017-06-02 Artificial Intelligence Data Mining Databases Data Science CBR@FLAIRS 2017 2017-05-27 → 2017-05-24 Artificial Intelligence104 bytes (4,594 words) - 09:45, 1 September 2022
- integration; semi-structured data; data mining; knowledge discovery; schema migration; digital libraries; data warehousing - Security and Privacy: cryptography;9 KB (1,297 words) - 14:46, 19 October 2022
- 2016-12-19 → 2016-12-21 Information Systems Big Data Internet of Things Nanoelectronic Systems Cyberphysical Systems Security CONFENIS 2016 2016-12-13 → 2016-12-14104 bytes (1,893 words) - 10:24, 20 October 2022
- 2016-12-19 → 2016-12-21 Information Systems Big Data Internet of Things Nanoelectronic Systems Cyberphysical Systems Security104 bytes (36 words) - 08:56, 19 October 2022
- 2017-04-03 → 2017-04-05 Data Science Big Data Bioinformatics Biomedical Informatics ICIT 2016 2016-12-22 → 2016-12-24 Information Security Biomedical Informatics104 bytes (45 words) - 09:47, 1 September 2022
- 10 Distributed Systems Cloud Computing SNTA 2020 2020-06-23 → 2020-06-23 Data Science Machine Learning High-Performance Computing Distributed Systems Network132 bytes (279 words) - 08:13, 20 October 2022
- Engineering Event Series Events List NSysS 2018 2018-12-05 → 2018-01-08 Security Systems Networking SysCon 2017 2017-04-24 → 2017-04-27 Engineering Electrical190 bytes (171 words) - 06:06, 21 October 2022
- 2017-04-04 → 2017-04-06 Security Big Data Online Social Networks Communication Systems OSNT 2016 2016-11-29 → 2016-12-02 Security Big Data Online Social Networks112 bytes (46 words) - 13:11, 20 October 2022
- International Conference on Compute and Data Analysis 2022-02-25 DSDE 2022 DSDE - International Conference on Data Storage and Data Engineering 2022-02-25 AANN 2022372 bytes (12 words) - 11:12, 3 November 2022
- MTAP-1083T 2017 MTAP-1083T 2017 : MTAP Special Issue on Data Preprocessing for Big Multimedia Data Microservices 2017 Microservices 2017 : Microservices141 bytes (0 words) - 10:00, 28 September 2022
- Events List iDSC 2017 2017-06-12 → 2017-06-13 Data Mining Machine Learning Security In Data Science Data Science Applications104 bytes (34 words) - 09:00, 19 October 2022
- 2016-10-09 → 2016-10-13 Cyber Security Assessment Cyber Risk Management Cyber Training Technologies Cyber Security Data Analytics104 bytes (36 words) - 08:54, 19 October 2022
- Events List ICIT 2016 2016-12-22 → 2016-12-24 Information Security Biomedical Informatics Web Data Analytics117 bytes (31 words) - 17:28, 20 October 2022
- International Conference on Big Data, Blockchain and Security 2022-04-23 DMML DMML - International Conference on Data Mining & Machine Learning 2022-04-23378 bytes (12 words) - 11:05, 3 November 2022
- unconventional means Information security management standards Information systems security policies Mobile and cloud computing security Big data analytics for cybersecurity5 KB (630 words) - 12:01, 29 January 2024
- Communications Event Series Events List ICICS 2017 2017-04-04 → 2017-04-06 Security Big Data Online Social Networks Communication Systems PECCS 2013 2013-02-19 → 2013-02-2195 bytes (44 words) - 12:29, 19 October 2022
- construction, data lakes, large-scale analytics) Data and information acquisition and preprocessing (e.g., data crawling, data quality, data privacy, data wrangling)4 KB (608 words) - 12:37, 4 August 2023
- Engineering IEEE-CGVIS 2017 2017-02-20 → 2017-02-21 Computer Vision Information Security Image Processing Computer Graphics CMVIT 2017 2017-02-17 → 2017-02-19 Computer104 bytes (656 words) - 08:47, 19 October 2022
- Privacy-preserving solutions Security models and threats Security and privacy properties and policies Verification and enforcement of security properties Trust and5 KB (717 words) - 14:19, 2 February 2024
- 2016-12-19 → 2016-12-21 Information Systems Big Data Internet of Things Nanoelectronic Systems Cyberphysical Systems Security159 bytes (40 words) - 12:41, 20 October 2022
- means • Information security management standards • Information systems security policies • Mobile and cloud computing security • Big data analytics for cybersecurity4 KB (525 words) - 12:04, 29 January 2024
- 2016-10-09 → 2016-10-13 Cyber Security Assessment Cyber Risk Management Cyber Training Technologies Cyber Security Data Analytics104 bytes (36 words) - 08:54, 19 October 2022
- 2016-10-09 → 2016-10-13 Cyber Security Assessment Cyber Risk Management Cyber Training Technologies Cyber Security Data Analytics104 bytes (36 words) - 08:53, 19 October 2022
- twork mining Big data visualization analytics Large scale optimization Privacy and security Security, trust and risk in big data Data integrity, matching4 KB (596 words) - 14:27, 24 August 2022
- Acronym DBSEC Title IFIP WG 11.3 Working Conference on Data and Applications Security Academic Field Security Related Identifiers CORE Rankings Year 2018 Rank342 bytes (38 words) - 14:27, 24 August 2022
- unconventional means Information security management standards Information systems security policies Mobile and cloud computing security Big data analytics for cybersecurity9 KB (1,152 words) - 12:02, 29 January 2024
- SOA * Information Filtering, Data Mining & Knowledge from Data * Privacy, Traceability, and Anonymity * National Security and Public Safety * Trust and4 KB (596 words) - 14:18, 19 October 2022
- the security of borders, and the evolution of inter-jurisdictional conflicts, “There has never been a greater need to interpret the haystack of data in4 KB (685 words) - 14:44, 19 October 2022
- Unmanned/Unattended Sensors and Systems Sensor Data Analysis Sensor Data Exploitation and Target Recognition · Information Fusion, Data Mining, and Information Networks1 KB (253 words) - 14:46, 19 October 2022
- integration Management of large-scale data systems Streaming data analysis Data models and query languages Scalable data analysis and analytics Database monitoring3 KB (430 words) - 07:43, 10 July 2023
- not limited to: 1. Big Data Science - Big Data Analytics - Data Science Models and Approaches - Algorithms for Big Data - Big Data Search and Information4 KB (711 words) - 13:01, 19 October 2022
- anomaly detection - Data Stream Mining for Security - Deep Learning for cyber security - Big Data architectures for network security - Identify theft detection4 KB (731 words) - 13:06, 19 October 2022
- Economic theory and game theory Mathematical logic and reasoning Data mining and (big) data analysis Monitoring and measurements Computer simulation experiments3 KB (423 words) - 14:37, 24 July 2023
- Networks and Data Communications �?� Security and Cryptography �?� Computers Architecture �?� Operating Systems �?� Databases, Data Warehouses and Data Mining13 KB (1,786 words) - 14:45, 19 October 2022
- Technologies Economics of Data, Data Services and Data Ecosystems Special Track (please check appropriate topic in submission system) Data Science Following the6 KB (883 words) - 14:20, 19 October 2022
- Research, "Protecting Private Data with Data Masking," 35 percent of corporations will start using data masking for private data by 2010. To be able to do5 KB (819 words) - 15:28, 19 October 2022
- "imageLayers":[],"locations":[],"imageoverlays":null} Big data platforms with applications to network management, security, measurements Content distribution and caching3 KB (353 words) - 14:10, 18 November 2022
- Biocomputing, Quantum computing, etc. + Dependable big data foundation and management + Big data privacy and security + Dependable IoT supporting technologies + Social12 KB (1,630 words) - 13:06, 19 October 2022
- "imageLayers":[],"locations":[],"imageoverlays":null} Big Data platforms with applications to network management, security, measurements Content distribution and caching3 KB (394 words) - 15:36, 15 December 2022
- privacy and security perspectives such as mining of imbalanced data, bioinformatics data, streaming data, ubiquitous computing data, grid computing data etc.7 KB (1,004 words) - 14:45, 19 October 2022
- Interest Group on Data Communication, Association for Computing Machinery Metrics Organizer Organization Special Interest Group on Data Communication, Association4 KB (661 words) - 12:31, 6 June 2023
- techniques may be in place for data-driven and deeper data analysis. In addition to the quantitative and qualitative challenges, data pressure in systems and4 KB (699 words) - 14:22, 19 October 2022
- protocols peer-to-peer security intellectual property protection database security privacy-enhancing technology security in IT outsourcing data protection secure5 KB (728 words) - 15:28, 19 October 2022
- Information Systems Security Start Date 2016-12-08 End Date 2016-12-10 Status as scheduled Mode on site Country Morocco (MA) Academic Field Big Data, Cloud Computing516 bytes (136 words) - 14:45, 19 October 2022
- Mobile/Wireless Security Multimedia Security Network Security OS Security P2P Security Privacy & Data Protection Privilege Management Resilience Security and Privacy3 KB (361 words) - 09:46, 22 February 2023
- systems Business intelligence systems Data analytics and decision support systems Databases for business Big Data for business Application areas Healthcare5 KB (702 words) - 07:56, 3 March 2023
- management - security as quality of service - secure electronic commerce - security administration - security evaluation - security management - security models6 KB (849 words) - 14:55, 19 October 2022
- dimensional data Mining uncertain data Mining imbalanced data Mining dynamic/streaming data Mining behavioral data Mining multi-media data Mining scientific3 KB (360 words) - 14:18, 19 October 2022
- dimensional data ● Mining uncertain data ● Mining imbalanced data ● Mining dynamic/streaming data ● Mining behavioral data ● Mining multi-media data ● Mining2 KB (347 words) - 14:17, 19 October 2022
- Virtualization, VoIP & Web security Security modeling, tools & simulation Mobile and wireless security Information systems security Security of personal area networks6 KB (885 words) - 14:08, 19 October 2022
- dynamic/streaming data Mining graph and network data Mining heterogeneous/multi-source data Mining high dimensional data Mining imbalanced data Mining multi-media3 KB (342 words) - 14:18, 19 October 2022
- Steganography and steganalysis. * Data hiding in biometrics, security issues of biometrics, biometric template protection, security in multimodal and multifactor3 KB (388 words) - 15:28, 19 October 2022
- network infrastructure security - operating system security - public safety and emergency management - security architectures - security in heterogeneous and12 KB (1,720 words) - 15:28, 19 October 2022
- secure communication * data confidentiality, data integrity * anonymity, pseudonymity * key management * secure bootstrapping * security issues in forwarding4 KB (538 words) - 15:30, 19 October 2022
- City Irbid Country Jordan (JO) Academic Field Online Social Networks, Security, Big Data, Communication Systems Official Website http://www.icics.info/icics2017/605 bytes (143 words) - 14:55, 19 October 2022
- behaviour data Data privacy and security in physiologic & affective computing Gait-based authentication Human and social factors of security and privacy5 KB (744 words) - 13:00, 19 October 2022
- management Predictive information systems Big Data and privacy Security and safety management Dark data processing3 KB (477 words) - 13:00, 19 October 2022
- areas of data mining, knowledge discovery, and large-scale data analytics, including, but not limited to: Big Data: Efficient and distributed data mining3 KB (425 words) - 07:45, 7 August 2023
- all areas of data mining, knowledge discovery, and large-scale data analytics, including, but not limited to: - Big Data: Distributed data mining and machine3 KB (442 words) - 07:59, 7 August 2023
- Information Systems, Internet of Things, Big Data, Nanoelectronic Systems, Cyberphysical Systems Security Official Website http://ieee-inis.org/ Deadlines644 bytes (148 words) - 15:23, 19 October 2022
- Knowledge Management A14. Data and Knowledge Visualization B. Data Mining in Specialized Domain B1. High Dimensional Data B2. Temporal Data B3. Biomedical Domains2 KB (386 words) - 15:27, 19 October 2022
- ACNS 2013 2013-06-25 → 2013-06-28 Computer Security Computer Reliability IDEAS 2007 2007-09-06 → 2007-09-08 Data Mining Information System89 bytes (45 words) - 12:41, 14 December 2022
- semi-structured data, and mining temporal, spatial and multimedia data - Mining data streams - Mining spatio-temporal data - Mining with data clouds and Big3 KB (526 words) - 13:22, 2 October 2023
- processing for AI/ML, event processing in big and fast data, publish/subscribe, data stream processing, security and encryption in stream processing, rule-based3 KB (491 words) - 07:35, 23 June 2023
- Interest Group on Data Communication, Association for Computing Machinery Metrics Organizer Organization Special Interest Group on Data Communication, Association699 bytes (175 words) - 14:20, 14 March 2024
- Systems - Peer to Peer Data Management - Interoperability - Mobile Data Management - Data Models for Production Systems and Services - Data Exchange issues and4 KB (673 words) - 14:55, 19 October 2022
- Event Acronym SDM 2008 Title 5th VLDB Workshop on Secure Data Management Start Date 2008-08-25 End Date 2008-08-25 Status as scheduled Mode on site City642 bytes (141 words) - 15:28, 19 October 2022
- privacy-sensitive data for partial answers, and information-oriented security. The aim of this workshop is to discuss and exchange the ideas related to data privacy7 KB (1,038 words) - 13:08, 19 October 2022
- intelligent event processing, event processing in big and fast data, data stream processing, security and encryption in stream processing, complex event forecasting3 KB (443 words) - 07:35, 23 June 2023
- Intelligence and Machine Learning Robotic Process Automation (RPA) Big Data, Data Science and Analytics Blockchain applications in IS Simulation and Digital3 KB (440 words) - 06:56, 18 November 2022
- Non-relational, and other Modern Data Models Information Integration and Data Quality Data Cleaning, Data Discovery and Data Exploration Heterogeneous and3 KB (489 words) - 08:50, 4 August 2023
- Knowledge • Data governance • Knowledge representation and semantic knowledge management • Data modeling • Data quality • Data value assessment • Data integration7 KB (999 words) - 14:07, 18 October 2022
- Services Web‐based Enterprise Systems Web Big Data Techniques and Mining Web Data Integration and Mashups Web Data Models Web engineering, metrics and performance2 KB (340 words) - 15:30, 19 October 2022
- networks Summarization, clustering, classification of Web data Wrapper induction Data integration and data cleaning Information extraction, slot-filling Entity2 KB (335 words) - 08:57, 8 November 2022
- interest include (but are not limited to): Attacks against De-identified Data Data Anonymity Disclosure Control Techniques Disclosure Risk and Information2 KB (280 words) - 15:27, 19 October 2022
- Biocomputing, Quantum computing, etc. + Dependable big data foundation and management + Big data privacy and security + Dependable IoT supporting technologies + Social12 KB (1,614 words) - 13:07, 19 October 2022
- Management and Virtualization Tools Risk Management Security Awareness and Education Security Culture Security Requirements Engineering Standards, Best Practices4 KB (572 words) - 14:23, 19 October 2022
- developers from a wide range of ML related areas, and the recent emergence of Big Data processing brings an urgent need for machine learning to address these new4 KB (525 words) - 12:17, 11 October 2023
- Semantic web Data modeling, mining and data analytics Data modeling, aggregation, integration, and transformation Web and text mining Data mining methods5 KB (597 words) - 14:18, 19 October 2022
- Blockchain applications in IS Application of AI and big data in IS Robotic Process Automation Digital twins Data and business analytics IS for collaboration and3 KB (481 words) - 06:57, 18 November 2022
- involving networking systems and security. The conference values papers, which will take a broad networking and/or security perspective(s) covering contemporary5 KB (691 words) - 14:14, 19 October 2022
- Country India (IN) Academic Field Biomedical Informatics, Information Security, Web Data Analytics Official Website http://www.oits-icit.org Deadlines 2016-09-10565 bytes (139 words) - 14:56, 19 October 2022
- site City Agadir Country Morocco (MA) Academic Field Big Data, Online Social Networks, Security Official Website http://emergingtechnet.org/OSNT2016/default579 bytes (142 words) - 15:27, 19 October 2022
- Distributed Sensing • Security-enhanced Mobile Objects Tracking • Security Enhancement Techniques for Positioning Data Processing • Privacy Preserving LBS • Privacy4 KB (665 words) - 14:23, 19 October 2022
- Conference on Data and Applications Security and Privacy Event Series DBSEC - IFIP WG 11.3 Working Conference on Data and Applications Security Start Date969 bytes (163 words) - 15:36, 15 December 2022
- influence the lifetime of data and data-sets. In many scientific environments, data-driven analyses are now performed on large volumes of data and multiple sources3 KB (513 words) - 15:29, 19 October 2022
- Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1982&venue=eurocrypt Deadlines organization772 bytes (165 words) - 10:11, 11 August 2023
- representation graph databases and (semantic) Web data data mining, information extraction, search data streams data-centric (business) process management, workflows4 KB (602 words) - 14:05, 19 October 2022
- Distributed data platforms, including Cloud data systems, key-value stores, and Big Data systems Information extraction and integration Streaming data analysis4 KB (540 words) - 07:50, 7 August 2023
- Highly-Reliable Systems Machine Learning, Vision and Graphics Chips Data Analytics and Big Data Processing IoT and Always-On Functions Custom Chips for Emerging2 KB (251 words) - 13:33, 19 October 2022
- 2017-06-02 → 2017-06-04 Software Engineering Information Systems Information Technology Big Data XP (Research Papers) 2017 2017-05-22 → 2017-05-26 Software Engineering Agile145 bytes (4,762 words) - 16:53, 20 October 2022
- Linked Data & Data Integration Knowledge Discovery & Intelligent Search Business Models, Governance & Data Strategies Big Data & Text Analytics Data Portals11 KB (1,179 words) - 15:27, 19 October 2022
- Computing - Green Computing - Information and Data Management - Telecommunications - Communication protocols - Security and Access Control - Transmission Techniques4 KB (457 words) - 14:03, 19 October 2022
- performance evaluation Crowd sourcing Data models, semantics, query languages Data provenance Data visualization Data warehousing, OLAP, SQL Analytics Database4 KB (586 words) - 10:35, 4 November 2022
- following: Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks Security & Privacy in the Internet of Things (IoT) Security & Privacy3 KB (398 words) - 08:57, 5 August 2023
- Reliability, Security, Privacy and Risk in the domain of Digital Ecosystems. We solicit papers in the area of trust, reliability, security and privacy assessment4 KB (691 words) - 15:29, 19 October 2022
- Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1989&venue=eurocrypt Deadlines organization783 bytes (177 words) - 09:53, 11 August 2023
- Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1985&venue=eurocrypt Deadlines organization743 bytes (173 words) - 10:01, 11 August 2023
- Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1984&venue=eurocrypt Deadlines organization745 bytes (175 words) - 10:03, 11 August 2023
- Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1990&venue=eurocrypt Deadlines organization816 bytes (181 words) - 09:51, 11 August 2023
- Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1994&venue=eurocrypt Deadlines organization803 bytes (177 words) - 09:40, 11 August 2023
- Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1992&venue=eurocrypt Deadlines organization780 bytes (174 words) - 09:48, 11 August 2023
- Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1986&venue=eurocrypt Deadlines organization756 bytes (173 words) - 10:00, 11 August 2023
- Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1988&venue=eurocrypt Deadlines organization776 bytes (175 words) - 09:56, 11 August 2023
- Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1993&venue=eurocrypt Deadlines organization805 bytes (177 words) - 09:43, 11 August 2023
- Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1987&venue=eurocrypt Deadlines organization751 bytes (174 words) - 09:58, 11 August 2023
- sensors and biometrics to enable security - Security in U-commerce and U-business and other applications - Security in P2P networks and Grid computing6 KB (955 words) - 15:30, 19 October 2022
- Bioinformatics 3-10 Database applications and data mining 3-11 Intelligent computing and neural networks 4. Security and Privacy 4-01 Access control and authorization5 KB (769 words) - 15:28, 19 October 2022
- software, including enterprise data, linked data & open data strategies, methodologies in knowledge modelling and text & data analytics. The SEMANTiCS community12 KB (1,700 words) - 14:19, 19 October 2022
- "Cloud System Security" but also more subjects will be discussed at the conference such as Data Privacy, Cryptology, Information Security, E-Governance3 KB (460 words) - 14:10, 19 October 2022
- for Big Data Intelligence Data Warehouses, Data Lakes Big Data Storage and Indexing Big Data Analytics: Algorithms, Techniques, and Systems Big Data Quality2 KB (370 words) - 08:12, 7 August 2023
- Foundations for Social issues * * Data science meets social science. * Security, trust and risk in big data. * Data integrity, matching and sharing. *3 KB (386 words) - 13:08, 19 October 2022
- Rights Management Systems; Security Policy Analysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies. Networking3 KB (468 words) - 06:52, 21 November 2022
- tests, and deployment Sensor technologies Traffic control and management Security, privacy and safety systems Smart mobility Products and services Modelling2 KB (288 words) - 07:53, 7 August 2023
- - Internet and Router Security - Intrusion Detection and Prevention - Mobile and Wireless Network Security - Multicast Security - Phishing and Online Fraud8 KB (1,051 words) - 14:46, 19 October 2022
- Semantic Web * Web Agents and Web Intelligence * Web Data Integration * Web Data Mashup * Web Data Models * Web Information Retrieval * Web Metrics * Web2 KB (350 words) - 15:29, 19 October 2022
- and Web data * Semi-structured data management * Web Information Extraction * Information retrieval in semi-structured data and the Web * Data integration3 KB (335 words) - 15:30, 19 October 2022
- ICINS-ACM 2016 : 2016 4th International Conference on Information and Network Security (ICINS 2016)--Ei Compendex Start Date 2016-12-28 End Date 2016-12-31 Status590 bytes (147 words) - 14:55, 19 October 2022
- Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1991&venue=eurocrypt Deadlines organization783 bytes (192 words) - 09:50, 11 August 2023
- following areas: Data and information acquisition and preprocessing (e.g., data crawling, IoT data, data quality, data privacy, mitigating biases, data wrangling)36 KB (5,252 words) - 11:51, 4 August 2023
- armoring and patching •Cross-layer IoT security •IoT ecosystem-level security analysis •Clean-slate IoT security design Important Dates Paper submission:4 KB (632 words) - 14:11, 19 October 2022
- database architectures, distributed data management (e.g., data stream management, P2P, replication, and caching) - Data management applications (e.g., Web7 KB (1,001 words) - 11:00, 4 November 2022
- Engineering Computer-Supported Cooperative Work Data cleansing and noise reduction Data streams and incremental mining Data visualization E-Commerce Solutions and6 KB (863 words) - 15:27, 19 October 2022
- ranging from real-time data processing in web environments, logistics and networking, to complex event processing in finance and security. The DEBS conference7 KB (994 words) - 06:08, 4 August 2023
- experiments on human subjects, or that analyze nonpublic data derived from human subjects (even anonymized data), will be asked to certify that their work was vetted6 KB (855 words) - 09:21, 29 August 2023
- query processing * Context-aware Computing * Data or query Dissemination * Data stream processing * Mobile Data and Services * Location-Based Services * Location3 KB (413 words) - 14:46, 19 October 2022
- Semantic web Data modeling, mining and data analytics Data modeling, aggregation, integration, and transformation Web and text mining Data mining methods18 KB (2,436 words) - 14:19, 19 October 2022
- scheduled Mode on site City Coimbra Country Portugal (PT) Academic Field Data Mining, Database, Information System Official Website http://ideas.concordia4 KB (563 words) - 12:39, 14 December 2022
- ‘information security’ and ‘user privacy’ can be ensured. In answer to these concerns, the 7th International Conference on Trust, Privacy and Security in Digital8 KB (1,074 words) - 15:29, 19 October 2022
- range of IoT-related technologies: - Security and privacy in heterogeneous IoT. - Secure and Privacy Preserving Data Mining and Aggregation in IoT applications3 KB (476 words) - 14:23, 19 October 2022
- Extreme Programming 2. Intelligent Database Systems: Data Warehousing, Data Mining, and Big Data Mobile and Peer-to-Peer Databases Spatial, Temporal, Multimedia3 KB (415 words) - 13:25, 18 October 2022
- middleware Management of Semantic Web Data Languages, tools and methodologies for representing and managing Semantic Web data Database, IR and AI technologies6 KB (904 words) - 07:39, 2 February 2024
- limited to: Data governance Knowledge representation and semantic knowledge management Data modeling Data quality Data value assessment Data integration7 KB (981 words) - 14:19, 19 October 2022
- science data integration and management Authenticity, privacy, security, and trust in Big life science data Knowledge graphs from Big life science data Knowledge6 KB (831 words) - 13:07, 19 October 2022
- experiments on human subjects, or that analyze nonpublic data derived from human subjects (even anonymized data), will be asked to certify that their work was vetted5 KB (858 words) - 09:20, 29 August 2023
- Rights Management Systems; Security Policy Analysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies. Networking3 KB (419 words) - 15:47, 15 December 2022
- theft and data falsification -Encryption together with linked and semantic data -Digital signatures together with linked and semantic data -Data transparency7 KB (1,014 words) - 14:19, 19 October 2022
- Networking, Neural networks, Network security, Biometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications4 KB (523 words) - 14:55, 19 October 2022
- Multi-Databases Data and Information Networks Data and Information Semantics Data Integration, Metadata Management, and Interoperability Data Structures and5 KB (661 words) - 12:05, 4 August 2023
- monitoring, extraction) - Security, compliance, and nonfunctional properties - Cloud-enabled applications, migration to/from the Cloud, big data - Applications,7 KB (1,054 words) - 14:26, 19 October 2022
- Privacy and Security in Databases. * Query processing and optimisation. * Semi-structured data. * Spatial data processing/management. * Stream Data Management3 KB (396 words) - 14:44, 19 October 2022
- Performance evaluation - Management of Incomplete information - Data Cleaning XML and Data Integration - XML query translation - XML and P2P - XML and Web3 KB (448 words) - 14:25, 19 October 2022
- and integrating linked data Querying and consuming linked data Facilitating data reuse both technically and legally (Linked Open Data) Information extraction8 KB (981 words) - 14:13, 19 October 2022
- Radar Radar Signal and Data Processing: ● Waveform Design and Optimization ● Digital Beamforming ● Space Time Adaptive Processing ● Data fusion and Resources3 KB (383 words) - 11:58, 4 August 2023
- Cognitive Systems Computational Finance and Economy Computational Intelligence Data Mining and Knowledge Discovery Evolutionary Computation Evolving Systems3 KB (404 words) - 18:22, 20 March 2024
- 2008-10-13 organization Special Interest Group on Mobility of Systems, Users, Data and Computing, Association for Computing Machinery Metrics Organizer Organization2 KB (391 words) - 08:30, 20 September 2023
- assessment approaches for CPS privacy in CPS network security for CPS game theory applied to CPS security security of embedded systems, IoT and real-time systems4 KB (688 words) - 13:06, 19 October 2022
- forms, ranging from signal, image, and multimedia data to traditional structured data and semi structured data found in the web. The expansion of online multimedia5 KB (711 words) - 14:13, 19 October 2022
- Interoperability in SW & Data systems: Design, exploration, and analysis of architectures and software frameworks for interoperability in SW and Data systems. (e.g4 KB (582 words) - 13:32, 19 October 2022
- function, programmable, reconfigurable, near-data and in-memory accelerators, etc. Architectural support for security, side-channel attacks and mitigation, privacy4 KB (605 words) - 11:57, 17 November 2022
- Networking for Quality, Reliability, Security and Robustness Computer Networking SIGCOMM - ACM Special Interest Group on Data Communications Computer Networking104 bytes (3,255 words) - 10:03, 1 September 2022
- Privacy and security in Auto ID systems * Managing access rights of sensitive RFID data in dynamic supply chains * Standards for Auto ID data * Data Management4 KB (574 words) - 15:27, 19 October 2022
- engineering and metadata management • Ontology-based data management, linked data management, semantic big data management • Processes, workflows, roles and responsibilities3 KB (448 words) - 14:19, 19 October 2022
- specific data mining + Domain specific data mining applications, such as web mining, blog mining, security mining, taxation mining, scientific data mining4 KB (604 words) - 14:45, 19 October 2022
- Web Data Extraction, Web Structure Mining -- Formal Models for Web Data and Knowledge Management: Data Models and Meta-data, Semi-structured Data and XML3 KB (530 words) - 15:30, 19 October 2022
- Mining Social Data Start Date 2008-07-21 End Date 2008-07-22 Status as scheduled Mode on site City Patras Country Greece (GR) Academic Field Data Mining Official3 KB (530 words) - 15:28, 19 October 2022
- Biometric Security and Privacy * liveness (spoof) detection * template protection * cancelable templates * encryption and watermarking * security analysis3 KB (412 words) - 15:30, 19 October 2022
- forms, ranging from signal, image, and multimedia data to traditional structured data and semi-structured data found in the web. SITIS spans two inter-related5 KB (786 words) - 15:29, 19 October 2022
- Management Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs Security & Privacy in Peer-to-Peer and Overlay Networks Security & Privacy3 KB (422 words) - 15:55, 15 December 2022
- Management Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs Security & Privacy in Peer-to-Peer and Overlay Networks Security & Privacy3 KB (440 words) - 15:54, 15 December 2022
- Linked Data Integration and mash-up of Linked Data Mining of Linked Data Big Data and Semantics Ontology engineering for big data Ontology based data integration6 KB (818 words) - 14:13, 19 October 2022
- Real-time data management Cloud data management Recommendation systems Data archive and digital library Data mining Search and information retrieval Data model4 KB (561 words) - 15:36, 15 December 2022
- applications Big data Crowdsourcing Cloud data management Data archive and digital library Data mining Data model and query language Data quality and credibility4 KB (529 words) - 13:08, 19 October 2022
- Big Data application studies on large-scale clusters Applications at the boundary of HPC and Big Data New applications for converged HPC/Big Data clusters3 KB (450 words) - 13:16, 28 November 2023
- transaction management Data management in clouds Data mining and knowledge discovery Data quality, curation, and provenance Data warehousing, large-scale3 KB (369 words) - 13:06, 19 October 2022
- Field Network Security Official Website https://conferences.sigcomm.org/imc/2004/ Deadlines organization Special Interest Group on Data Communication,763 bytes (169 words) - 12:28, 14 March 2024
- Field Network Security Official Website https://conferences.sigcomm.org/imc/2007/ Deadlines organization Special Interest Group on Data Communication,672 bytes (167 words) - 11:34, 14 March 2024
- Field Network Security Official Website https://conferences.sigcomm.org/imc/2002/ Deadlines organization Special Interest Group on Data Communication,724 bytes (167 words) - 12:50, 14 March 2024
- Real-time data processing algorithms Real-time data processing architectures and systems Using FPGA, GPU, ASIC technologies for high performance data analytics4 KB (662 words) - 14:18, 19 October 2022
- views of data; since data come from heterogeneous sources, and their structure changes in time, flexible techniques for managing data collected in data warehouses7 KB (1,024 words) - 14:56, 19 October 2022
- replication schemes, optimal data allocation, multidimensional analysis, access patterns, data declustering, Client Caching Data Management Systems, index5 KB (735 words) - 15:27, 19 October 2022
- Search, In-memory Data Management, Hardware Accelerators, Query Processing and Optimization, Storage Management. Privacy and Security in Data Management. Graph6 KB (948 words) - 14:23, 19 October 2022
- experiments on human subjects, or that analyze nonpublic data derived from human subjects (even anonymized data), will be asked to certify that their work was vetted7 KB (1,090 words) - 09:23, 29 August 2023
- Cross-layer design for security ? Formal methods for WSN security ? Resilient revocation mechanism ? Mobile platform and systems security Paper Submission Every3 KB (542 words) - 14:55, 19 October 2022
- distributed data mining algorithms Mining on data streams Graph and subgraph mining Methodologies on large-scale data mining Text, video, multimedia data mining3 KB (336 words) - 12:58, 19 October 2022
- to database systems * Data models, query models, and query languages for networking * Archiving and analysis of network data * Data analysis for network3 KB (412 words) - 15:27, 19 October 2022
- Interest Group on Data Communication, Association for Computing Machinery Metrics Organizer Organization Special Interest Group on Data Communication, Association760 bytes (179 words) - 10:53, 14 March 2024
- Berlin City Berlin Region Berlin Country Germany (DE) Academic Field Network Security Official Website https://conferences.sigcomm.org/imc/2011/ Deadlines organization828 bytes (181 words) - 11:30, 14 March 2024
- Academic Field Network Security Official Website https://www-net.cs.umass.edu/imc2012/ Deadlines organization Special Interest Group on Data Communication, Association739 bytes (182 words) - 11:06, 14 March 2024
- Interest Group on Data Communication, Association for Computing Machinery Metrics Organizer Organization Special Interest Group on Data Communication, Association752 bytes (179 words) - 10:42, 14 March 2024
- Field Network Security Official Website https://www.usenix.org/legacy/events/imc05/ Deadlines organization Special Interest Group on Data Communication736 bytes (172 words) - 12:10, 14 March 2024
- City Vouliagmeni Region Attica Country Greece (GR) Academic Field Network Security Official Website https://conferences.sigcomm.org/imc/2008/ Deadlines organization811 bytes (180 words) - 11:30, 14 March 2024
- Field Network Security Official Website https://conferences.sigcomm.org/imc/2006/ Deadlines organization Special Interest Group on Data Communication,752 bytes (172 words) - 12:23, 14 March 2024
- Field Network Security Official Website https://conferences.sigcomm.org/imc/2003/ Deadlines organization Special Interest Group on Data Communication,762 bytes (177 words) - 12:36, 14 March 2024
- and Education Security and Privacy Issues Cross-Organizational Collaboration Social Media and EIS EIS and Internet of Things Use of Open Data for EIS Semantic1 KB (218 words) - 14:45, 19 October 2022
- Field Network Security Official Website https://conferences.sigcomm.org/imc/2014/ Deadlines organization Special Interest Group on Data Communication,764 bytes (183 words) - 10:45, 14 March 2024
- Field Network Security Official Website https://conferences.sigcomm.org/imc/2009/ Deadlines organization Special Interest Group on Data Communication,821 bytes (188 words) - 11:30, 14 March 2024
- Field Network Security Official Website https://conferences.sigcomm.org/imc/2016/ Deadlines organization Special Interest Group on Data Communication,763 bytes (190 words) - 10:34, 14 March 2024
- to Modern Hardware Data-Centric Programming Abstractions, Comprehensions, Monads Data Integration, Exchange, and Interoperability Data Synchronization and2 KB (256 words) - 13:07, 19 October 2022
- International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of Things (SAM IoT) 2020 Security and Privacy for IoT:6 KB (888 words) - 14:18, 19 October 2022
- Information Retrieval Data Grids, Data and Information Quality Big Data Management Temporal and Spatial Databases Data Warehouses and Data Mining Web Mining4 KB (658 words) - 14:56, 19 October 2022
- Signals & security Securing storage: SAN/NAS security Security ontology, models, protocols & policies Semantics of security Software security and testing16 KB (2,311 words) - 15:30, 19 October 2022
- service composition - RESTful Web services (design aspects, hypermedia, linked data, mashups, conversations) - Microservices and Nanoservices (architecture,4 KB (700 words) - 14:26, 19 October 2022
- and management * context-aware data access and query processing * data caching, replication and view materialization * data publication modes: push, broadcast7 KB (1,021 words) - 11:16, 24 October 2022
- Environment Management of Exceptional Events: Incidents and Evacuation Security, Privacy and Safety Systems Transportation Smartification Deep Learning3 KB (409 words) - 07:51, 7 August 2023
- Event Processing Data Curation, Annotation and Provenance Data Models and Query Languages Data Streams and Publish-Subscribe Systems Data Structures and9 KB (1,011 words) - 13:07, 19 October 2022
- alternative trend of using collaboration and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both local3 KB (515 words) - 15:28, 19 October 2022
- databases: * consistent query answering * data exchange * data mining * data warehousing and OLAP for novel forms of data * database repairing * DB + IR * incomplete5 KB (747 words) - 15:22, 19 October 2022
- Computational Learning Theory * Computational Optimization * Cryptography and Security * Data Structures * Distributed and Parallel Algorithms * Experimental Techniques2 KB (308 words) - 15:27, 19 October 2022
- -Intrusion detection -Keyboard information security -Information security governance -Information security management systems -Risk assessment and management5 KB (710 words) - 14:13, 19 October 2022
- and Incident Management Investigative Case Studies Data Hiding Techniques and Steganography Novel Data Recovery Techniques Digital Evidence Extraction Techniques4 KB (571 words) - 14:26, 19 October 2022
- networks, traffic management, complex graphs, semantic Web, Big Data, and network security. Topics of interest for track LHNA Large Network Analysis - methods4 KB (554 words) - 14:13, 19 October 2022
- function, programmable, reconfigurable, near- data and in-memory accelerators, etc. Architectural support for security, side-channel attacks and mitigation, privacy6 KB (757 words) - 11:53, 17 November 2022
- and Optimization for performance, energy, virtualization, portability, security, or reliability concerns, and architectural support - Efficient execution4 KB (534 words) - 13:44, 2 May 2023
- mining social semantic data * Policies, authentication, security, and trust within collaborative scenarios * Producing Semantic Web data from social software6 KB (795 words) - 15:27, 19 October 2022
- social networks. Data mining and inference helps to extract implicit facts. P2P systems are proper answers to an increasing amount of data that shall be exchanged5 KB (783 words) - 15:20, 19 October 2022
- mechanisms in VANETs Security and privacy metrics Authentication and access control in VANETs User and Data trust issues in VANETs Formal security models for VANET2 KB (304 words) - 14:23, 19 October 2022
- modelling and engineering - Web mining and knowledge extraction - Web Big Data and Web data analytics - Mobile Web applications - Web of Things applications -5 KB (786 words) - 13:02, 16 January 2024
- interworking of wired and wireless networks Security issues of data management in wireless networks QoS issues for data-intensive services in wireless networks5 KB (691 words) - 14:45, 19 October 2022
- provisioning, calibration and deployment Data, information, and signal processing Deployment experience and testbeds Data storage and management Experimental6 KB (894 words) - 15:30, 19 October 2022
- Computational Intelligence Cyber Physical Systems Data Analytics Data/Web Mining and Knowledge Discovery Data Science Deep Learning Evolutionary Computation3 KB (392 words) - 18:22, 20 March 2024
- Networks * Component-Based Software Engineering * Cryptography and Network Security * Data Mining and Knownledge Discovery * E-Commerce and its Applications *2 KB (242 words) - 15:30, 19 October 2022
- Software reliability engineering. * Dependability in data streaming. * Dependability benchmarking. * Security. * Software engineering for dependability. * Fault4 KB (622 words) - 14:46, 19 October 2022
- developments in GPR systems, antennas and observation modalities; Advanced data and image processing algorithms; Forward modelling techniques and inversion1 KB (249 words) - 20:23, 22 September 2022
- to Modern Hardware Data-Centric Programming Abstractions, Comprehensions, Monads Data Integration, Exchange, and Interoperability Data Synchronization and2 KB (347 words) - 13:08, 19 October 2022
- approaches) Multimedia and Semantic Web Semantic Annotation of Data Semantic Web Trust, Privacy, Security and Intellectual Property Rights Query Languages and Optimization2 KB (377 words) - 06:49, 4 August 2023
- wireless multimedia computing (WMC) and security services. - Multimedia indexing, processing and retrieval for WMC - Data mining applications for WMC - Content-aware4 KB (563 words) - 15:29, 19 October 2022
- 2009-05-18 2009-03-02 organization Special Interest Group on Management of Data, Association for Computing Machinery organization Special Interest Group7 KB (1,010 words) - 09:47, 4 August 2023
- Processing Data and Information Modelling Data and Information Integration Data and Information Networks Data and Information Privacy and Security Data and Information4 KB (587 words) - 10:11, 5 August 2023
- containers and virtual machines; system software supporting data management, scalable data analytics, machine learning, and deep learning; specialized5 KB (728 words) - 16:33, 12 March 2024
- enterprise integration �?� Long-term large scale project data archiving, access, concurrent data control for CE �?� Industrial scenarios, case studies of4 KB (569 words) - 09:53, 14 March 2023
- limited to: DATA WAREHOUSING AND DATA MINING -------------------------------- Models and Algorithms in Data Mining Video and Multimedia Data Mining Parallel5 KB (793 words) - 15:26, 19 October 2022
- Internet of things for smart environments and urban networking • Big data and data mining for smart environments and urban networking • Enabling wireless6 KB (813 words) - 14:19, 19 October 2022
- Multi-Databases Data and Information Networks Data and Information Semantics Data Integration, Metadata Management, and Interoperability Data Structures and5 KB (620 words) - 10:24, 4 July 2023
- answering in large volumes of data Annotation, extraction, summarization, and integration of heterogeneous data resources Semantic data mining Semantic social9 KB (1,240 words) - 15:28, 19 October 2022
- Components, Tx/Rx Module Technologies R04 Radar Front-Ends RADAR Signal and Data Processing R05 Beam-Forming, MIMO and Exploiting Diversity R06 Imaging Techniques2 KB (331 words) - 09:14, 5 August 2023
- Computational Neuro Science Computer Vision Content Based Image Retrieval Data mining Decision Support Systems Distributed AI Emerging Applications Evaluation3 KB (448 words) - 15:20, 19 October 2022
- Networks * Mobile Communication Systems * Network Data Mining * Network Management * Network Security and Cooperation * Optical Networks * Orthogonal Frequency3 KB (430 words) - 14:45, 19 October 2022
- discovery; data mining; differential privacy, pattern recognition; complex knowledge - representation and management; foundations and theories for data analysis5 KB (787 words) - 14:12, 19 October 2022
- services Data management in wireless networks Data management in sensor and mobile ad hoc networks Data management in mobile peer-to-peer networks Data mining13 KB (1,346 words) - 15:22, 19 October 2022
- Extreme Programming 2. Intelligent Database Systems: Data Warehousing, Data Mining, and Big Data Mobile and Peer-to-Peer Databases Spatial, Temporal, Multimedia3 KB (420 words) - 12:58, 19 October 2022
- Remote measurements & telemetry MEASUREMENT-DATA PROCESSING Mathematical modeling of signals and systems Data preprocessing & postprocessing Digital signal3 KB (449 words) - 14:55, 19 October 2022
- are not limited to: 1. security in future Internet architectures - role of security in future architectures - integrating security into future protocols4 KB (598 words) - 15:27, 19 October 2022
- Sourcing _ IQ in the Web, Data Integration, and eBusiness _ Scientific Data _ Data Warehousing and Business Intelligence _ Master Data Management SUBMISSION5 KB (801 words) - 14:55, 19 October 2022
- probed or monitored, data privacy and anonymity for all personally identifiable information, and etiquette for using shared measurement data (see Allman and6 KB (907 words) - 15:20, 19 October 2022
- the formation of network of digital technologies. Information and Data Management Data and Network mining Intelligent agent-based systems, cognitive and4 KB (617 words) - 15:26, 19 October 2022
- Processing Techniques (Compressive Sensing, Multi-Aperture, MIMO, … ) (D) SAR Data Evaluation and Modeling D1 Electromagnetic Modeling and Wave Propagation3 KB (441 words) - 12:00, 4 August 2023
- Linked data and semantics enrichment, linking techniques and standards Documents and privacy Secure document workflows, policy, and access, security for mobile4 KB (224 words) - 10:03, 5 August 2023
- Linked data and semantics enrichment, linking techniques and standards Documents and privacy Secure document workflows, policy, and access, security for mobile4 KB (223 words) - 09:24, 5 August 2023
- engineering and metadata management Ontology-based data management, linked data management, semantic big data management Governance aspects such as workflows7 KB (922 words) - 14:20, 19 October 2022
- limited to: 1. AI and Big Data Analytics: Artificial intelligence, Knowledge Representation, Machine Learning, Uncertainty. Big data, Data Mining, Information4 KB (697 words) - 14:22, 19 October 2022
- of XML data * Indexing and retrieval of XML data * Query processing over XML data * Benchmarks and performance using XML/Web-databases * Security and privacy4 KB (564 words) - 13:08, 19 October 2022
- applica>ons. Topics: Novel developments in GPR systems and antennas Advanced data and image processing algorithms Forward modelling techniques and inversion2 KB (281 words) - 14:12, 19 October 2022
- Discovery: Machine Learning Deep Learning Data Mining Process Mining Data Analytics Topic 3: Semantic Web and Linked Open Data: Web Architecture Tools Vocabularies2 KB (348 words) - 13:08, 19 October 2022
- implementations of data mining algorithms Privacy- and anonymity-preserving data analysis Stream Data Mining Mining moving object data, RFID data, and data from sensor5 KB (711 words) - 14:55, 19 October 2022
- ======== Grid computing enables the sharing of distributed computing and data resources such as processing, network bandwidth and storage capacity to create5 KB (651 words) - 14:55, 19 October 2022
- Interaction Privacy and Confidentiality Access Control Big Data and Data Mining Android Security1 KB (186 words) - 13:00, 19 October 2022
- paradigms revisited: object, component, aspect, agent Privacy, Trust, and Security is Distributed Systems Context Awareness and Self-Adaptation Fault-Tolerance2 KB (296 words) - 15:28, 19 October 2022
- XML Repositories - XML Data and Knowledge Management over Grids - XML Data and Knowledge Management in Mobile Settings - XML Data and Knowledge Management7 KB (1,106 words) - 14:46, 19 October 2022
- and Summarization 1.6 Semantic Analysis of Multimedia Data 1.7 Statistical Modeling of Multimedia Data 2. Multimedia Signal Processing and Communications3 KB (514 words) - 10:31, 6 February 2024
- behaviours Impact of big data on the development of Web Science Web Science approaches to data science, data analytics, and the Web of data Detecting, preventing8 KB (1,094 words) - 09:34, 4 August 2023
- of interest include but are not limited to: Scalable Data Access Question Answering Big Linked Data processing Natural Language generation Benchmarks for7 KB (982 words) - 15:22, 19 October 2022
- of interests: # Applications of Semantic Web technologies # Data Semantics and Linked Data # Semantic Social Networks # Semantic Portals # Semantic Web4 KB (544 words) - 15:30, 19 October 2022
- Network, Passive and MIMO Radars, Multi-Sensor and Multi-Static Systems and Data Fusion R13 Over-the-Horizon, Imaging and CW Radars, Innovative Radar Concepts3 KB (416 words) - 12:10, 4 August 2023
- methods. •Track 4: Biometrics, forensics and security, mobile applications, big data, small sample size, data mining and performance evaluation, intelligent2 KB (341 words) - 14:04, 19 October 2022
- structured data image and video audio and speech user-generated content big data natural language deep learning Description and Integration (of data and services)5 KB (616 words) - 09:45, 27 October 2023
- and multi-media Temporal data analysis, prediction, and forecasting; time series analysis Communications and computer networks Data mining and knowledge discovery5 KB (732 words) - 13:23, 8 March 2024
- Applications ◦ Application Methods and Algorithms ◦ Adaptation to Multicore ◦ Data Distribution, Load Balancing & Scaling ◦ MPI/OpenMP Hybrid Computing ◦ Visualization5 KB (642 words) - 11:36, 28 November 2023
- protocols and technologies for WMC - Security, privacy, and cryptographic protocols for WMC - Network security issues and protocols in WMC - Authentication3 KB (551 words) - 15:30, 19 October 2022
- invited. Analytics (from contents to semantics) Structured data image and video audio and speech big data natural language deep learning Description and Integration5 KB (661 words) - 08:13, 27 October 2023
- USA Zhiling Lan, Illinois Institute of Technology, USA Database and data mining, data management Program vice chair: Makoto Takizawa, Seikei University,8 KB (1,222 words) - 14:17, 19 December 2023
- latest research results and to exchange new ideas and practical experience in data and computer communications, optical fiber communications, microwaves, antennas2 KB (345 words) - 14:14, 19 October 2022
- 2022-05-16 → 2022-05-19 Network Security WiSec 2021 2021-06-28 → 2021-07-02 Network Security WiSec 2020 2020-07-08 → 2020-07-10 Network Security WiSec 2019 2019-05-15 → 2019-05-1771 bytes (166 words) - 09:25, 8 November 2022
- embedded systems, socio-technical systems, cloud computing, big data, machine learning, security, open source, and sustainability. In 2021, MODELS has a special2 KB (352 words) - 15:55, 8 September 2023
- and original papers on the following topics: Smart cities Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile technologies; M2M4 KB (640 words) - 14:04, 19 October 2022
- algorithms for information aggregation in networks * Giuseppe Persiano: Security of networks of low capability devices * Christian Scheideler: Algorithms4 KB (644 words) - 14:54, 19 October 2022
- efficiently manage, transfer, and analyze huge volume of data and knowledge. Grid computing, P2P technology, data and knowledge bases, distributed information retrieval4 KB (581 words) - 15:22, 19 October 2022
- Cyber Security Data Modeling for Cloud-Based Networks E-Learning E-Commerce E-Marketing E-Banking Data Mining Data Mining Techniques Ethics of Data Mining2 KB (249 words) - 14:45, 19 October 2022
- application perspective. Here, networks could mean a set of collaborative data processing nodes that serve as application proxies ( e.g., airborne nodes5 KB (786 words) - 14:55, 19 October 2022
- systems Auditing and provenance Big data, analytics, and data sciences Caching, replication, and consistency Cloud storage Data deduplication Database storage5 KB (684 words) - 13:33, 19 October 2022
- - Audio, music, and speech analysis - Data and web mining - Behavior of software, systems, and networks - Security - Privacy - Analysis of social media5 KB (729 words) - 08:36, 27 October 2023
- and performance; Constraint databases; Data exchange, data integration and interoperability; Data mining; Data models; Database programming and query languages;6 KB (798 words) - 14:03, 19 October 2022
- Online communities - Databases / XML / Data mining - Information integration - Information personalization - Security Intelligent Information Processing -5 KB (707 words) - 12:30, 7 November 2023
- Networks - Network Functions Virtualization - Software Define Network - Big Data Management - Content-oriented Infrastructures - Smart Cities and Urban Computing7 KB (976 words) - 09:54, 29 December 2023
- Information Processing - Information and Data Management - Information Content Security - E-Technology - Cryptography and Data Protection - E-Government - E-Learning2 KB (351 words) - 13:08, 19 October 2022
- Analytics (from contents to semantics): Structured data, image and video, audio and speech, big data, natural language, deep learning Description and Integration:3 KB (447 words) - 14:04, 19 October 2022
- Conference on Information Security and Privacy Ordinal 26 Event Series ACISP - Australasian Conference on Information Security and Privacy Start Date 2021-12-01553 bytes (125 words) - 09:39, 6 June 2023
- of interest include (but are not limited to) the following: Algorithms and Data Structures Algorithmic Game Theory Approximation Algorithms and Online Algorithms1 KB (221 words) - 13:06, 19 October 2022
- Topics of particular interest include, but are not limited to: o Data Management and Data Centers o Distributed Algorithms o Distributed Operating Systems2 KB (407 words) - 14:56, 19 October 2022
- Safety and Security User Interface Design Wearable Computing Internet Initiative Technology and Policy Cloud Computing Grid Computing Big-data Analysis Biomedical3 KB (427 words) - 14:13, 19 October 2022
- conference covers optimization for parallelism, performance, power, and security, where that optimization occurs in the mapping from an input (including3 KB (446 words) - 14:45, 19 October 2022
- and Workflow Management Database Indexing and Tuning Data Privacy and Security Data Warehousing, Data Cubes, and Aggregate Processing Digital Library Disk7 KB (1,151 words) - 14:45, 19 October 2022
- many fields such as embedded systems, distributed systems, data management, system security and applications. The conference places emphasis on layers4 KB (604 words) - 15:27, 19 October 2022
- systems o E-commerce and business integration solutions o Architecture o Security o Performance of information systems o Applications in public health o5 KB (657 words) - 15:28, 19 October 2022
- Fuzzy control, robotics, sensors, fuzzy hardware and architectures Fuzzy data analysis, fuzzy clustering, classification and pattern recognition Type-23 KB (518 words) - 08:54, 30 August 2023
- Human-machine interfaces and interaction using multiple modalities 5. Multimedia security (data hiding, authentication, and access control) 6. Multimedia networking4 KB (562 words) - 15:27, 19 October 2022
- research area aiming to offer applications easy and efficient access to sensor data at the scale of billions of sensing devices. While a single sensor network4 KB (555 words) - 14:55, 19 October 2022
- 13.4. Design and CAD for security 13.5. Cyberphysical system security 13.6. Nanoelectronic security 13.7. Supply chain security and anti-counterfeiting7 KB (1,087 words) - 13:40, 23 February 2023
- Conflict resolution. Trust and reputation management. Privacy, safety and security. Scalability, robustness and dependability. Social and organizational structures6 KB (872 words) - 15:21, 19 October 2022
- system and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more. As part of our commitment8 KB (1,233 words) - 06:33, 7 August 2023
- a large set of complex data affected by great level of noise, represented by non-pertinent, untrustworthy or even malicious data. Moreover, the challenge6 KB (891 words) - 15:29, 19 October 2022
- as scheduled Mode on site City Shanghai Country China (CN) Academic Field Data Mining Official Website http://research.microsoft.com/dmx/M3SN Deadlines5 KB (681 words) - 15:22, 19 October 2022
- Intelligence Semantics in Data Science Trust, Data Privacy, and Security with Semantic Technologies Economics of Data, Data Services and Data Ecosystems Special7 KB (1,012 words) - 14:18, 19 October 2022
- the data economy, health futures, political futures Safety, Security & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and7 KB (1,089 words) - 11:48, 4 August 2023
- Database Constraints NoSQL and NewSQL Databases Big Data and Conceptual Modeling Data Warehousing, Data Mining, Business Intelligence and Analytics Spatial5 KB (727 words) - 13:34, 19 October 2022
- systems Auditing and provenance Big data, analytics, and data sciences Caching, replication, and consistency Cloud storage Data deduplication Database storage5 KB (724 words) - 13:33, 19 October 2022
- Web-based user interfaces and services that securely access Grid resource, data, application, and collaboration services for communities of scientists. As3 KB (477 words) - 14:56, 19 October 2022
- computation power, and data storage space to clients with infrastructural needs. These third party service providers can act as data stores as well as entire7 KB (1,027 words) - 15:29, 19 October 2022
- analysis safety and security guidelines, standards and certification of critical systems safety and security assurance cases safety and security issues of applied4 KB (466 words) - 14:23, 19 October 2022
- Chip Dependable and Fault Tolerant System Designs Test, Verification, and Security of Digital Systems Emerging Technologies in VLSI Reconfigurable and FPGA2 KB (281 words) - 13:00, 19 October 2022
- Mobile Computing and Sensor Networks * Data and the Web * Data Mining, Knowledge Discovery and Stream Databases * Data Warehousing and Decision Support * Uncertainty4 KB (626 words) - 15:30, 19 October 2022
- databases Mobile computing XML and semi-structured data Web Interfaces and Applications Information Security Applications Other topics B. Web mining Web content5 KB (730 words) - 15:30, 19 October 2022
- processing, power management, computation, data storage, and communication; analog/mixed-signal techniques for security and machine learning; non-silicon-, carbon-6 KB (862 words) - 07:30, 28 March 2024
- systems (DBMS), data storage services, and database applications is continuously expanding. New trends in hardware architectures, new data storage requirements6 KB (917 words) - 14:45, 19 October 2022
- Management and Dissemination * Fusion and Data Collection * Network Management * Computer and Network Security Systems * Cyber Operations * Network Operations5 KB (653 words) - 15:27, 19 October 2022
- NVRAM, PRAM, etc) - MEMS-based storage - portable storage - security and privacy - data management Important Dates: Papers submission: Jan 27, 2008 Notification4 KB (628 words) - 14:45, 19 October 2022
- scholarly big data from various data sources Methods for storing, indexing, and query processing for scholarly big data Practices for scholarly big data management4 KB (723 words) - 14:10, 19 October 2022
- Image security and forensics - Cryptanalysis, Information Technology Audit, Steganalysis, Data Remanence, Information Privacy, Usable Security, etc..3 KB (429 words) - 14:56, 19 October 2022
- temporal data models and query languages - temporal query processing and indexing - temporal data mining - time series data management - stream data management6 KB (943 words) - 15:30, 19 October 2022
- Collaborative Environments Computer Games Context-aware Systems Cyber Security Data Mining & Information Retrieval Digital Signal & Image Processing Distributed3 KB (375 words) - 14:04, 19 October 2022
- software development process -Visualization of data base schemes -Protocol and log visualization (security, trust) -Source code visualization -Graph algorithms3 KB (437 words) - 15:30, 19 October 2022
- SIGCOMM is the flagship annual conference of the Special Interest Group on Data Communications, a special interest group of the Association for Computing3 KB (464 words) - 15:30, 19 October 2022
- or blemishes Security Documents and privacy Secure document workflows, policy, and access, security for mobile and printing devices Security printing, including4 KB (523 words) - 07:23, 7 August 2023
- computations and data repositories in a distributed environment, they do not meet the newly emerging requirements from scientists to handle streaming data, accommodate6 KB (861 words) - 15:30, 19 October 2022
- the field of MT continues to grow and attract more and more researchers. Data-driven approaches have become particularly fashionable in recent years. These16 KB (2,411 words) - 10:09, 29 December 2022
- measurement or capturing data such as seismic measurements. Middleware is required to integrate such instruments with computation and data resources to allow5 KB (714 words) - 15:29, 19 October 2022
- systems - Data mining and knowledge discovery - Data and information quality control - Data grid - Data migration and integration - Database security - Emerging10 KB (1,472 words) - 15:30, 19 October 2022
- System Software Engineering Information Security Web Technology Topic 2: Networking Computer Networks Network Security Network Communications Biometric Sensors2 KB (380 words) - 14:09, 19 October 2022
- advantages of such data are numerous, still research has not provided a suitable model to collect, represent, process and manage such data. Current advances6 KB (977 words) - 14:45, 19 October 2022
- "imageoverlays":null} Topics of interest include, but are not limited to: Big multimedia data design and creation Deep learning for multimedia Multimedia search and recommendation2 KB (315 words) - 17:20, 9 October 2023
- Radar Systems Architectures, Radar System Military Applications, Signal & Data Processing, Environmental Applications, Active ESAs, Emerging Technologies2 KB (300 words) - 15:28, 19 October 2022
- for Retrieval Applications - Semantic Analysis of Multimedia and Contextual Data - Multimedia Fusion Methods - Media Content Linking and Threading Methods2 KB (308 words) - 14:04, 5 February 2024
- for Retrieval Applications * Semantic Analysis of Multimedia and Contextual Data * Multimedia Fusion Methods * Media Content Linking and Threading Methods2 KB (310 words) - 12:26, 5 February 2024
- Optimization techniques for security and reliability �?� Optimizations for transactional memory �?� Memory management, including data distribution and synchronization2 KB (288 words) - 14:45, 19 October 2022
- for Retrieval Applications Semantic Analysis of Multimedia and Contextual Data Multimedia Fusion Methods Media Content Browsing and Retrieval Tools Multimedia2 KB (317 words) - 13:56, 5 February 2024
- response in network security, as typically the detection of attacks and intrusions requires the analysis of detailed traces. Furthermore, data collection and5 KB (511 words) - 15:30, 19 October 2022
- describing significant research contributions to the field of computer and data communication networks. We invite submissions on various aspects of networking3 KB (477 words) - 15:30, 19 October 2022
- multimedia contents for mobile contexts. * Security issues and solutions for mobile multimedia retrieval. * Multimedia data compression techniques to enable faster5 KB (768 words) - 15:28, 19 October 2022
- networks: protocols, architectures and applications Distributed and concurrent data structures, replication and consistency Distributed computing: Algorithms3 KB (454 words) - 13:07, 12 June 2023
- mobile and ubiquitous computing * Mobile and ubiquitous data management and processing * Data replication, migration and dissemination in ubiquitous environments5 KB (694 words) - 15:26, 19 October 2022
- including large scale data centres, regional data centres, micro data centres - Ownership models in heterogeneous distributed clouds - Security solutions which4 KB (640 words) - 13:33, 19 October 2022
- Business Intelligence and Management: Data Mining; Data Management; Data Communication and Networking; Data Visualization; Data Warehousing; Intelligent Systems;4 KB (630 words) - 13:08, 19 October 2022
- a large set of complex data affected by great level of noise, represented by non-pertinent, untrustworthy or even malicious data. Trust and Recommender5 KB (723 words) - 15:30, 19 October 2022
- semantics) Structured data image and video audio and speech big data natural language deep learning Description and Integration (of data and services) Semantics2 KB (283 words) - 08:36, 27 October 2023
- experiments on human subjects, or that analyze nonpublic data derived from human subjects (even anonymized data), will be asked to certify that their work was vetted6 KB (900 words) - 09:09, 29 August 2023
- distributed platforms, middleware, embedded- and cyber-physical-systems and security infrastructures. ICTSS is the successor of previous (joint) conferences3 KB (475 words) - 14:08, 19 October 2022
- Computer Graphics and Multimedia Computer Vision and Image Processing Cyber Security Data Structure and Algorithm Digital Evolution Distributed and Parallel Computing3 KB (512 words) - 14:55, 19 October 2022
- Distributed and real-time monitoring and control Security and privacy protection mechanisms Safety/security co-engineering and risk assessment Probabilistic5 KB (653 words) - 14:22, 19 October 2022
- research on information and knowledge management, as well as recent advances on data and knowledge bases. The purpose of the conference is to identify challenging29 KB (3,008 words) - 18:17, 15 June 2023
- tolerance * Hardware support for security * Hardware support for virtual machines * Instruction level, thread level, and data level parallelism * Power and2 KB (343 words) - 15:21, 19 October 2022
- for Retrieval Applications Semantic Analysis of Multimedia and Contextual Data Multimedia Fusion Methods Multimedia Hyperlinking Media Content Browsing2 KB (317 words) - 12:01, 5 February 2024
- open collaboration technologies Open Data and Open Science Open data quality, standards, measures and metrics Open data and open science methods, applications6 KB (854 words) - 14:18, 19 October 2022
- Trade-off analysis �?� Traffic scheduling SECURITY �?� Base station security management �?� Encryption algorithm �?� Data aggregation �?� Information processing11 KB (1,661 words) - 15:29, 19 October 2022
- Modeling and Programming 2. Intelligent Database Systems: Data Warehousing, Data Mining, and Big Data Mobile and Peer-to-Peer Databases Spatial, Graph, Temporal4 KB (512 words) - 13:00, 19 October 2022
- Extreme Programming 2. Intelligent Database Systems: Data Warehousing, Data Mining, and Big Data Mobile and Peer-to-Peer Databases Spatial, Temporal, Multimedia4 KB (502 words) - 12:59, 19 October 2022
- performance evaluation * Data quality, semantics and integration * Database monitoring and tuning * Data privacy and security * Data mining and OLAP * Embedded6 KB (944 words) - 15:30, 19 October 2022
- software-defined service middleware -Data analytics and data services in and for SOC-based systems -IoT and data marketplaces -Smart data and service contracts -Cognitive4 KB (634 words) - 14:22, 19 October 2022
- Extreme Programming 2. Intelligent Database Systems: Data Warehousing, Data Mining, and Big Data Mobile and Peer-to-Peer Databases Spatial, Temporal, Multimedia4 KB (525 words) - 14:44, 19 October 2022
- ********** TRACK TOPICS FOUNDATIONS OF COMPUTER SCIENCE * algorithms and data structures including sequential, parallel, distributed, approximation, and6 KB (807 words) - 15:30, 19 October 2022
- Management and Policy Data-driven Society: Balancing Prosperity and Security Development and Measurement of Intelligent Government Index Open Data for Sustainable2 KB (321 words) - 13:07, 19 October 2022
- Messaging Systems o Transmission Systems o Network Security and Security Technologies o Wireless Data Networks o Wireless / Mobile Computing o Mobile Computing8 KB (1,061 words) - 14:45, 19 October 2022
- competing aspects. Integration of security and dependability concepts. Balancing and negotiation of dependability and security properties. * Dependability in8 KB (1,064 words) - 14:45, 19 October 2022
- Bio-informatics * Computational Linguistics * Computer Networks * Data Warehousing and Data Mining * Embedded Systems * Pattern Recognition/Image processing2 KB (271 words) - 14:55, 19 October 2022
- (Semantic) Data Dataset Dynamics and Synchronization Big Data Computing User Interfaces and Visualization for the Web of (Linked Semantic) Data at Scale18 KB (2,163 words) - 15:29, 19 October 2022
- QoI-aware wireless sensor networking - Energy-efficient data fusion, sensor fault analysis, sensor data cleansing - QoS for task mapping and scheduling - Cross-layer5 KB (817 words) - 15:22, 19 October 2022
- disciplines such as databases, artificial intelligence, semantic web, or data extraction. Also, ODBASE'08 encourages the submission of papers that examine8 KB (1,015 words) - 15:27, 19 October 2022
- Ontology and reasoning - Knowledge Graph - Linked Data - Big Data and semantics, exchange and integration - Data streams and the Internet of Things - Machine7 KB (1,008 words) - 14:14, 19 October 2022
- environments - Data mining and knowledge discovery in distributed environments - Semantic and knowledge grids - Intelligent integration of data and processes5 KB (644 words) - 11:28, 14 November 2023
- Engineering * Computer Architecture and Design * Computer Networks and Security * Data Mining and Database Applications * High Performance Networks and Protocols2 KB (368 words) - 14:56, 19 October 2022
- systems Auditing and provenance Big data, analytics, and data sciences Caching, replication, and consistency Cloud storage Data deduplication Database storage5 KB (643 words) - 13:32, 19 October 2022
- (Internet of things), big data analysis and a strong heterogeneity of access technologies, sensors, terminals, users’ needs and services (data, content, live streams4 KB (628 words) - 13:08, 19 October 2022
- Economics of information security and privacy * Social factors, including o Usability of e-commerce systems o Human factors in security and privacy o Human9 KB (1,409 words) - 09:33, 4 August 2023
- These assemble together different resources such as parallel supercomputers, data archives, high-speed storage systems, advanced visualization devices and4 KB (631 words) - 14:44, 19 October 2022
- QoS, security, fault tolerance, messaging, reliability, availability, service discovery, service orchestration/composition, data integration and data retention)4 KB (628 words) - 15:26, 19 October 2022
- scheduled Mode on site City Sydney Country Australia (AU) Academic Field Data Mining Official Website http://icaita.org/2017/ICAITA2017/index.html Deadlines5 KB (608 words) - 14:03, 19 October 2022
- ---------------------------------------------------- Overview As volume of data and knowledge keeps increasing, new methods, modeling paradigms, and structures4 KB (608 words) - 15:22, 19 October 2022