Search results
Jump to navigation
Jump to search
- |Field=Computer security and reliability |Country =IT1 KB (125 words) - 20:30, 1 April 2022
- |Field=Information and Communication Security ...nd broad coverage of recent developments in “Information and Communication Security”. In 2012 the IPICS will be hosted by the SBA Research, at Vienna, Austri2 KB (265 words) - 19:06, 1 April 2022
- |Field=information security, hacking, it security441 bytes (53 words) - 19:11, 1 April 2022
- | Title = IT Management Conference ...e unique opportunity to network and share knowledge with hundreds of other IT leaders, executives and business owners in a dynamic setting in the heart o2 KB (302 words) - 20:51, 1 April 2022
- |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security3 KB (354 words) - 19:02, 1 April 2022
- |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress2 KB (222 words) - 20:07, 1 April 2022
- ...: ACM--2017 the 7th International Conference on Communication and Network Security (ICCNS 2017)--SCOPUS, Ei Compendex |Field=network security2 KB (223 words) - 19:32, 1 April 2022
- |Title=The Fourth International Workshop on Organizational Security Aspects |Field=Computer security and reliability3 KB (370 words) - 19:06, 1 April 2022
- | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability4 KB (509 words) - 20:58, 1 April 2022
- |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)4 KB (569 words) - 19:35, 1 April 2022
- Information security IT and network security2 KB (261 words) - 20:52, 1 April 2022
- ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)2 KB (298 words) - 16:47, 5 July 2020
- |Title=International Workshop on Visualization and Information Security Management |Field=Security Management3 KB (470 words) - 19:04, 1 April 2022
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (436 words) - 19:41, 1 April 2022
- | Title = The First ACM Computer Security Architecture Workshop | Field = Computer security and reliability5 KB (622 words) - 20:37, 1 April 2022
- ...yberIoT 2017 : Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal |Field=security4 KB (554 words) - 19:35, 1 April 2022
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)5 KB (604 words) - 19:33, 1 April 2022
- Computer System, Information Security and Networks • Management and Engineering of IT-Enabled Services3 KB (322 words) - 20:46, 1 April 2022
- |Field=security able to reach the crown-jewels and you have do it in a way that makes your1 KB (172 words) - 19:36, 1 April 2022