Order by: Start date • Recently added • Most popular
Zanzibar, Tanzania, 0
Engineering and Technology e‐Infrastructure, e‐Services for Developing Countries
Er.Perumal Manimekalai College of Engineering , India
Computer science
Braga, Portugal, Portugal
Computer science Privacy-aware or Privacy-preserving computing; Information Security, Secure Intelligent transport and mobility systems; Privacy and Security in cloud/edge/fog computing; Digital Forensics for Smart Cities; Smart Vehicle Forensics; IoT forensics; Mobile Systems Security and Forensics; Cybercrime and Frauds; Cyber Incident Response and Recovery; AI-based security and privacy; Access Control; Identity management; Security of Communication Protocols; Security and privacy for (Industrial) Internet of Things; Embedded Systems Security; Software and Application Security; Malware and Unwanted Software; Side Channel Attacks; Threat scenarios, Attack Models and Security Analysis; Usable Security and Privacy; Trust Management and Reputation; Security and Privacy Metrics and Policies; Security operations and incident management; Intrusion detection and prevention; Digital watermarking; Digital rights management; Cyber threat intelligence; Privacy-Enhancing Technologies and Mechanisms; Blockchain and Cryptocurrencies; Biometrics Security and Privacy.
Zagreb, Croatia
Computer science Artificial Intelligence
Bahir Dar Institute of Technology (BiT), Ethiopia
Computer science
London, United Kingdom
Social Sciences and Humanities Interdisciplinary studies
Sardar Vallabhbhai National Institute of Technolog, India
Computer science
Seoul, Republic of Korea
Computer science Computer software and applications
Sevilla, Spain
Computer science Artificial Intelligence
, Singapore
Computer science Security and Privacy in Communication Networks, Security and Privacy, Network Intrusion Detection and Prevention, Malware Analysis and Detection, Web and Systems Security, Distributed Denial of Service Attacks and Defenses, Communication Privacy and Anonymity, Circumvention and Anti-Censorship Technologies, Network and Internet Forensics Techniques, Authentication Systems