Search results
Jump to navigation
Jump to search
- ...Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...t, cyber risk management, cyber training technologies, cyber security data analytics569 bytes (68 words) - 19:09, 1 April 2022
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (436 words) - 19:41, 1 April 2022
- * Algorithms for information security and privacy * Algorithms for big data4 KB (443 words) - 20:04, 1 April 2022
- |Title=IEEE International Conference on Big Data * Big Data Science and Foundations5 KB (550 words) - 19:57, 1 April 2022
- |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability5 KB (582 words) - 19:41, 1 April 2022
- cloud computing, big data, pervasive computing, Internet of Things, and social cyber-physical systems. Enabling a smart life has become a popular research3 KB (419 words) - 19:36, 1 April 2022
- |Title=22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining ..., PAKDD’18 welcomes all submissions on all aspects of knowledge discovery, data mining and machine learning. Suggestive topics of relevance for the confere2 KB (279 words) - 19:58, 1 April 2022
- |Title=IEEE International Conference on Big Data * 1. Big Data Science and Foundations4 KB (570 words) - 20:01, 1 April 2022
- |Title=24th Pacific-Asia Conference on Knowledge Discovery and Data Mining * Anomaly detection and analytics2 KB (268 words) - 19:58, 1 April 2022
- |Title=23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining ...eory, practice, and applications on all aspects of knowledge discovery and data mining. Topics of relevance for the conference include, but not limited to,2 KB (275 words) - 19:58, 1 April 2022
- - The role of Software Architecture in the engineering and testing of data analytics software systems (AKA BigData); - Developing the cybersecurity analytics framework in the context of BigData;1 KB (187 words) - 21:13, 12 July 2020
- * Data modeling, mining and data analytics * Data modeling, aggregation, integration, and transformation4 KB (497 words) - 19:54, 1 April 2022
- * Advanced Analytics * Big Data2 KB (246 words) - 19:57, 1 April 2022
- ...processing, event processing in big and fast data, data stream processing, security and encryption in stream processing, complex event forecasting, in-network ...t processing, information-centric networking, software-defined networking, security, reliability and resilience, distributed ledger and blockchains, programmab2 KB (307 words) - 20:11, 1 April 2022
- |Title=BDCAT 2017 : The 4th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies |Field=data mining4 KB (590 words) - 19:34, 1 April 2022
- ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Customer analytics3 KB (382 words) - 20:03, 1 April 2022
- ...ion of distributed and event-based systems in relevant domains such as Big Data, AI/ML, IoT, and Blockchain. The objectives of the ACM International Confer ...rocessing in big and fast data, publish/subscribe, data stream processing, security and encryption in stream processing, rule-based systems, maintenance of mat3 KB (351 words) - 20:11, 1 April 2022
- * Data modeling, mining and data analytics * Data modeling, aggregation, integration, and transformation5 KB (615 words) - 19:54, 1 April 2022
- Big data and machine learning for networks Business Analytics and Big Data2 KB (242 words) - 11:52, 6 April 2022
- |Field=security emerging topics pertaining to IoT and Big Data Analytics, High Speed6 KB (749 words) - 19:32, 1 April 2022