Search results
Jump to navigation
Jump to search
- ...Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...t, cyber risk management, cyber training technologies, cyber security data analytics514 bytes (63 words) - 13:20, 17 February 2021
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (429 words) - 13:49, 17 February 2021
- * Algorithms for information security and privacy * Algorithms for big data4 KB (436 words) - 14:09, 17 February 2021
- cloud computing, big data, pervasive computing, Internet of Things, and social cyber-physical systems. Enabling a smart life has become a popular research3 KB (412 words) - 13:42, 17 February 2021
- |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability5 KB (575 words) - 13:50, 17 February 2021
- |Title=IEEE International Conference on Big Data * Big Data Science and Foundations5 KB (543 words) - 14:03, 17 February 2021
- |Title=22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining ..., PAKDD’18 welcomes all submissions on all aspects of knowledge discovery, data mining and machine learning. Suggestive topics of relevance for the confere2 KB (272 words) - 14:03, 17 February 2021
- |Title=24th Pacific-Asia Conference on Knowledge Discovery and Data Mining * Anomaly detection and analytics2 KB (261 words) - 14:03, 17 February 2021
- |Title=IEEE International Conference on Big Data * 1. Big Data Science and Foundations4 KB (563 words) - 14:05, 17 February 2021
- |Title=23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining ...eory, practice, and applications on all aspects of knowledge discovery and data mining. Topics of relevance for the conference include, but not limited to,2 KB (268 words) - 14:03, 17 February 2021
- * Data modeling, mining and data analytics * Data modeling, aggregation, integration, and transformation4 KB (490 words) - 14:01, 17 February 2021
- - The role of Software Architecture in the engineering and testing of data analytics software systems (AKA BigData); - Developing the cybersecurity analytics framework in the context of BigData;1 KB (187 words) - 14:07, 17 February 2021
- * Advanced Analytics * Big Data2 KB (239 words) - 14:04, 17 February 2021
- ...processing, event processing in big and fast data, data stream processing, security and encryption in stream processing, complex event forecasting, in-network ...t processing, information-centric networking, software-defined networking, security, reliability and resilience, distributed ledger and blockchains, programmab2 KB (300 words) - 14:15, 17 February 2021
- ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Customer analytics3 KB (375 words) - 14:10, 17 February 2021
- ...ion of distributed and event-based systems in relevant domains such as Big Data, AI/ML, IoT, and Blockchain. The objectives of the ACM International Confer ...rocessing in big and fast data, publish/subscribe, data stream processing, security and encryption in stream processing, rule-based systems, maintenance of mat3 KB (344 words) - 14:15, 17 February 2021
- |Title=BDCAT 2017 : The 4th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies |Field=data mining4 KB (583 words) - 13:42, 17 February 2021
- * Data modeling, mining and data analytics * Data modeling, aggregation, integration, and transformation5 KB (608 words) - 14:00, 17 February 2021
- |Field=security emerging topics pertaining to IoT and Big Data Analytics, High Speed6 KB (743 words) - 13:41, 17 February 2021
- * Big Data, Data Science and Analytics * Big Data architectures3 KB (346 words) - 14:10, 17 February 2021