ترتيب حسب: تاريخ البداية • أحدث الإضافات • الأكثر شعبية
Zanzibar, Tanzania, 0
علوم الهندسة e‐Infrastructure, e‐Services for Developing Countries
Er.Perumal Manimekalai College of Engineering , الهند
علوم الحاسوب
Braga, Portugal, البرتغال
علوم الحاسوب Privacy-aware or Privacy-preserving computing; Information Security, Secure Intelligent transport and mobility systems; Privacy and Security in cloud/edge/fog computing; Digital Forensics for Smart Cities; Smart Vehicle Forensics; IoT forensics; Mobile Systems Security and Forensics; Cybercrime and Frauds; Cyber Incident Response and Recovery; AI-based security and privacy; Access Control; Identity management; Security of Communication Protocols; Security and privacy for (Industrial) Internet of Things; Embedded Systems Security; Software and Application Security; Malware and Unwanted Software; Side Channel Attacks; Threat scenarios, Attack Models and Security Analysis; Usable Security and Privacy; Trust Management and Reputation; Security and Privacy Metrics and Policies; Security operations and incident management; Intrusion detection and prevention; Digital watermarking; Digital rights management; Cyber threat intelligence; Privacy-Enhancing Technologies and Mechanisms; Blockchain and Cryptocurrencies; Biometrics Security and Privacy.
Zagreb, كرواتيا
علوم الحاسوب Artificial Intelligence
Bahir Dar Institute of Technology (BiT), إثيوبيا
علوم الحاسوب
London, المملكة المتحدة
العلوم الاجتماعية والإنسانية Interdisciplinary studies
Sardar Vallabhbhai National Institute of Technolog, الهند
علوم الحاسوب
VIT University Chennai, الهند
علوم الحاسوب
Seoul, كوريا الجنوبية
علوم الحاسوب Computer software and applications
Sevilla, إسبانيا
علوم الحاسوب Artificial Intelligence
, سنغافورة
علوم الحاسوب Security and Privacy in Communication Networks, Security and Privacy, Network Intrusion Detection and Prevention, Malware Analysis and Detection, Web and Systems Security, Distributed Denial of Service Attacks and Defenses, Communication Privacy and Anonymity, Circumvention and Anti-Censorship Technologies, Network and Internet Forensics Techniques, Authentication Systems