Order by: Start date • Recently added • Most popular
Zanzibar, Tanzania, 0
Ciências da Engenharia e‐Infrastructure, e‐Services for Developing Countries
Er.Perumal Manimekalai College of Engineering , Índia
Informática
Braga, Portugal, Portugal
Informática Privacy-aware or Privacy-preserving computing; Information Security, Secure Intelligent transport and mobility systems; Privacy and Security in cloud/edge/fog computing; Digital Forensics for Smart Cities; Smart Vehicle Forensics; IoT forensics; Mobile Systems Security and Forensics; Cybercrime and Frauds; Cyber Incident Response and Recovery; AI-based security and privacy; Access Control; Identity management; Security of Communication Protocols; Security and privacy for (Industrial) Internet of Things; Embedded Systems Security; Software and Application Security; Malware and Unwanted Software; Side Channel Attacks; Threat scenarios, Attack Models and Security Analysis; Usable Security and Privacy; Trust Management and Reputation; Security and Privacy Metrics and Policies; Security operations and incident management; Intrusion detection and prevention; Digital watermarking; Digital rights management; Cyber threat intelligence; Privacy-Enhancing Technologies and Mechanisms; Blockchain and Cryptocurrencies; Biometrics Security and Privacy.
Zagreb, Croácia
Informática Artificial Intelligence
Bahir Dar Institute of Technology (BiT), Etiópia
Informática
London, Reino Unido
Ciências sociais e humanas Interdisciplinary studies
Sardar Vallabhbhai National Institute of Technolog, Índia
Informática
VIT University Chennai, Índia
Informática
Seoul, Coreia do Sul
Informática Computer software and applications
Sevilla, Espanha
Informática Artificial Intelligence
, Singapura
Informática Security and Privacy in Communication Networks, Security and Privacy, Network Intrusion Detection and Prevention, Malware Analysis and Detection, Web and Systems Security, Distributed Denial of Service Attacks and Defenses, Communication Privacy and Anonymity, Circumvention and Anti-Censorship Technologies, Network and Internet Forensics Techniques, Authentication Systems