|
|
InfoSys 2025 Congress March 09, 2025 to March 13, 2025 - Lisbon, Portugal
- ICNS 2025, The Twenty-Second International Conference on Networking and Services
- ICAS 2025, The Twenty-Second International Conference on Autonomic and Autonomous Systems
- ENERGY 2025, The Fifteenth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies
- WEB 2025, The Thirteenth International Conference on Building and Exploring Web Based Environments
- DBKDA 2025, The Seventeenth International Conference on Advances in Databases, Knowledge, and Data Applications
- SIGNAL 2025, The Tenth International Conference on Advances in Signal, Image and Video Processing
- BIOTECHNO 2025, The Seventeenth International Conference on Bioinformatics, Biocomputational Systems and Biotechnologies
- AIHealth 2025, The Second International Conference on AI-Health
InfoWare 2025 Congress March 09, 2025 to March 13, 2025 - Lisbon, Portugal
- ICCGI 2025, The Twentieth International Multi-Conference on Computing in the Global Information Technology
- ICWMC 2025, The Twenty-Second International Conference on Wireless and Mobile Communications
- VEHICULAR 2025, The Fourteenth International Conference on Advances in Vehicular Systems, Technologies and Applications
- INTERNET 2025, The Seventeenth International Conference on Evolving Internet
- COLLA 2025, The Fifteenth International Conference on Advanced Collaborative Networks, Systems and Applications
- INTELLI 2025, The Fourteenth International Conference on Intelligent Systems and Applications
- VISUAL 2025, The Tenth International Conference on Applications and Systems of Visual Paradigms
- HUSO 2025, The Eleventh International Conference on Human and Social Analytics
- BRAININFO 2025, The Tenth International Conference on Neuroscience and Cognitive Brain Information
DataSys 2025 Congress April 06, 2025 to April 10, 2025 - Valencia, Spain
- AICT 2025, The Twenty-Second Advanced International Conference on Telecommunications
- ICIW 2025, The Twentieth International Conference on Internet and Web Applications and Services
- ICIMP 2025, The Twentieth International Conference on Internet Monitoring and Protection
- SMART 2025, The Fourteenth International Conference on Smart Cities, Systems, Devices and Technologies
- IMMM 2025, The Fifteenth International Conference on Advances in Information Mining and Management
- INFOCOMP 2025, The Fifteenth International Conference on Advanced Communications and Computation
- MOBILITY 2025, The Fifteenth International Conference on Mobile Services, Resources, and Users
- SPWID 2025, The Eleventh International Conference on Smart Portable, Wearable, Implantable and Disability-oriented Devices and Systems
- ACCSE 2025, The Tenth International Conference on Advances in Computation, Communications and Services
ComputationWorld 2025 Congress April 06, 2025 to April 10, 2025 - Valencia, Spain
- SERVICE COMPUTATION 2025, The Seventeenth International Conference on Advanced Service Computing
- CLOUD COMPUTING 2025, The Sixteenth International Conference on Cloud Computing, GRIDs, and Virtualization
- FUTURE COMPUTING 2025, The Seventeenth International Conference on Future Computational Technologies and Applications
- COGNITIVE 2025, The Seventeenth International Conference on Advanced Cognitive Technologies and Applications
- ADAPTIVE 2025, The Seventeenth International Conference on Adaptive and Self-Adaptive Systems and Applications
- CONTENT 2025, The Seventeenth International Conference on Creative Content Technologies
- PATTERNS 2025, The Seventeenth International Conference on Pervasive Patterns and Applications
- COMPUTATION TOOLS 2025, The Sixteenth International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking
- BUSTECH 2025, The Fifteenth International Conference on Business Intelligence and Technology
- AIVR 2025, The Second International Conference on Artificial Intelligence and Immersive Virtual Reality
NexComm 2025 Congress May 18, 2025 to May 22, 2025 - Nice, France
- ICDT 2025, The Twentieth International Conference on Digital Telecommunications
- SPACOMM 2025, The Seventeenth International Conference on Advances in Satellite and Space Communications
- ICN 2025, The Twenty-Fourth International Conference on Networks
- ICONS 2025, The Twentieth International Conference on Systems
- MMEDIA 2025, The Seventeenth International Conference on Advances in Multimedia
- PESARO 2025, The Fifteenth International Conference on Performance, Safety and Robustness in Complex Systems and Applications
- CTRQ 2025, The Eighteenth International Conference on Communication Theory, Reliability, and Quality of Service
- ALLDATA 2025, The Eleventh International Conference on Big Data, Small Data, Linked Data and Open Data
- SOFTENG 2025, The Eleventh International Conference on Advances and Trends in Software Engineering
DigitalWorld 2025 Congress May 18, 2025 to May 22, 2025 - Nice, France
- ICDS 2025, The Nineteenth International Conference on Digital Society
- ACHI 2025, The Eighteenth International Conference on Advances in Computer-Human Interactions
- GEOProcessing 2025, The Seventeenth International Conference on Advanced Geographic Information Systems, Applications, and Services
- eTELEMED 2025, The Seventeenth International Conference on eHealth, Telemedicine, and Social Medicine
- eLmL 2025, The Seventeenth International Conference on Mobile, Hybrid, and On-line Learning
- eKNOW 2025, The Seventeenth International Conference on Information, Process, and Knowledge Management
- ALLSENSORS 2025, The Tenth International Conference on Advances in Sensors, Actuators, Metering and Sensing
- SMART ACCESSIBILITY 2025, The Tenth International Conference on Universal Accessibility in the Internet of Things and Smart Environments
IARIA Congress 2025, The 2025 IARIA Annual Congress on Frontiers in Science, Technology, Services, and Applications July 06, 2025 to July 10, 2025 - Athens, Greece
DigiTech 2025 Congress July 06, 2025 to July 10, 2025 - Athens, Greece
- DIGITAL 2025, Advances on Societal Digital Transformation
- IoTAI 2025, The Second International Conference on IoT-AI
- GPTMB 2025, The Second International Conference on Generative Pre-trained Transformer Models and Beyond
NexTech 2025 Congress September 28, 2025 to October 02, 2025 - Lisbon, Portugal
- UBICOMM 2025, The Nineteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
- ADVCOMP 2025, The Nineteenth International Conference on Advanced Engineering Computing and Applications in Sciences
- SEMAPRO 2025, The Nineteenth International Conference on Advances in Semantic Processing
- AMBIENT 2025, The Fifteenth International Conference on Ambient Computing, Applications, Services and Technologies
- EMERGING 2025, The Seventeenth International Conference on Emerging Networks and Systems Intelligence
- DATA ANALYTICS 2025, The Fourteenth International Conference on Data Analytics
- GLOBAL HEALTH 2025, The Fourteenth International Conference on Global Health Challenges
- CYBER 2025, The Tenth International Conference on Cyber-Technologies and Cyber-Systems
SoftNet 2025 Congress September 28, 2025 to October 02, 2025 - Lisbon, Portugal
- ICSEA 2025, The Twentieth International Conference on Software Engineering Advances
- ICSNC 2025, The Twentieth International Conference on Systems and Networks Communications
- CENTRIC 2025, The Eighteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
- VALID 2025, The Seventeenth International Conference on Advances in System Testing and Validation Lifecycle
- SIMUL 2025, The Seventeenth International Conference on Advances in System Simulation
- SOTICS 2025, The Fifteenth International Conference on Social Media Technologies, Communication, and Informatics
- INNOV 2025, The Fourteenth International Conference on Communications, Computation, Networks and Technologies
- AISyS 2025, The Second International Conference on AI-based Systems and Services
SocSys 2025 Congress October 26, 2025 to October 30, 2025 - Barcelona, Spain
NetWare 2025 Congress October 26, 2025 to October 30, 2025 - Barcelona, Spain
- SENSORCOMM 2025, The Nineteenth International Conference on Sensor Technologies and Applications
- SENSORDEVICES 2025, The Sixteenth International Conference on Sensor Device Technologies and Applications
- SECURWARE 2025, The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
- AFIN 2025, The Seventeenth International Conference on Advances in Future Internet
- CENICS 2025, The Eighteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
- ICQNM 2025, The Nineteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
- FASSI 2025, The Eleventh International Conference on Fundamentals and Advances in Software Systems Integration
- GREEN 2025, The Tenth International Conference on Green Communications, Computing and Technologies
- HEALTHINFO 2025, The Tenth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing
TechWorld 2025 Congress October 26, 2025 to October 30, 2025 - Barcelona, Spain
|
|
|
|
|
ThinkMind // SECURWARE 2014, The Eighth International Conference on Emerging Security Information, Systems and Technologies
Type: conference Download: SECURWARE 2014 cover page Download: SECURWARE 2014 foreword page Download: SECURWARE 2014 committee page Download: SECURWARE 2014 table of contents Download: SECURWARE 2014 full proceedings Notes: IARIA Conference. Editors: Rainer Falk, Siemens AG - München, Germany Carlos Becker Westphall, Federal University of Santa Catarina, Brazil Event editions: - there are 14 editions. ISSN: 2162-2116 ISBN: 978-1-61208-376-6 Location: Lisbon, Portugal Dates: from November 16, 2014 to November 20, 2014 Articles: there are 34 articles Embedded Web Device Security Michael Riegler and Johannes Sametinger keywords: web; embedded devices; web security; industrial control systems.
Design Issues in the Construction of a Cryptographically Secure Instant Message Service for Android Smartphones Alexandre Braga and Daniela Schwab keywords: Cryptography; Security; Android; Instant Message.
Resisting Flooding Attacks on AODV Mohamed A. Abdelshafy and Peter J.B. King keywords: MANET, Routing, AODV, Security, Attack, Flooding
The Policy-Based AS_PATH Verification to Monitor AS Path Hijacking Je-Kuk Yun, Beomseok Hong, and Yanggon Kim keywords: border gateway protocol; interdomain routing; network security; networks; AS path hijacking.
A New Property Coding in Text Steganography of Microsoft Word Documents Ivan Stojanov, Aleksandra Mileva, and Igor Stojanovic keywords: Data Hiding; Microsoft Word
Audio Steganograpgy by Phase Modification Fatiha Djebbar and Beghdad Ayad keywords: Information hiding; Phase Coding; Steganalysis
Current Issues in Cloud Computing Security and Management Pedro Artur Figueiredo Vitti, Daniel Ricardo dos Santos, Carlos Becker Westphall, Carla Merkle Westphall, and Kleber Magno Maciel Vieira keywords: cloud computing; security management; monitoring; security metrics
N-Gram-Based User Behavioral Model for Continuous User Authentication Leslie Milton, Bryan Robbins, and Atif Memon keywords: behavioral modeling; continuous authentication; software security; n-grams
GAIA-MLIS: A Maturity Model for Information Security Roger William Coelho, Gilberto Fernandes Junior, and Mario Lemes Proença Junior keywords: Maturity Level; Information Security; IT Governance.
Security of Vehicular Networks: Static and Dynamic Control of Cyber-Physical Objects Vladimir Muliukha, Vladimir Zaborovsky, and Sergey Popov keywords: Security; Vehicular network; Cyber-physics objects; Dynamic access control; Virtual connections
Digital Signature of Network Segment Using Genetic Algorithm and Ant Colony Optimization Metaheuristics Paulo R. G. Hernandes Jr., Luiz F. Carvalho, Gilberto Fernandes Jr., and Mario L. Proença Jr. keywords: Characterization; Traffic Monitoring; Network Management; Genetic Algorithm, sFlow
DeadDrop-in-a-Flash: Information Hiding at SSD NAND Flash Memory Physical Layer Avinash Srinivasan, Jie Wu, Panneer Santhalingam, and Jeffrey Zamanski keywords: Anti-forensics; Covert Communication; Information Hiding; Security; Solid State Drives.
Saving Privacy in Trust-Based User-Centric Distributed Systems Alessandro Aldini keywords: Cooperation incentives; trust; privacy; remuneration; user-centric networks; model checking.
Enhancing Privacy on Identity Providers Rafael Weingärtner and Carla Merkle Westphall keywords: Cloud Computing; Security; Privacy; Federation; Identity providers;
Enforcing Security Policies on Choreographed Services Using Rewriting Techniques Karim Dahmani and Mahjoub Langar keywords: Web Service Composition Security; Instrumentation; Choreography; Formal Verification; End-Point Calculus.
Obtaining Strong Identifiers Through Attribute Aggregation Walter Priesnitz Filho and Carlos Nuno da Cruz Ribeiro keywords: Privacy; Identity Management Systems; Attribute Aggregation
Wi-Fi Intruder Detection Rui Fernandes, Tiago Varum, Nuno Matos, and Pedro Pinho keywords: Wi-Fi; RF Signature; Wavelet Transform; Intruder Detection; RSSI, Security; Wireless.
Adding Secure Deletion to an Encrypted File System on Android Smartphones Alexandre Braga and Alfredo Colito keywords: secure delete; secure storage; encrypted file system; flash memory; mobile devices; Android
Performance Impacts in Database Privacy-Preserving Biometric Authentication Jana Dittmann, Veit Köppen, Christian Krätzer, Martin Leuckert, Gunter Saake, and Claus Vielhauer keywords: Database Security, Homomorphic Encryption, Privacy, Multi-Computer Scenarios, Database Performance
Data Quality and Security Evaluation Tool for Nanoscale Sensors Leon Reznik and Sergey Lyshevski keywords: data quality; computer security evaluation; data accuracy; data fusion.
AndroSAT: Security Analysis Tool for Android Applications Saurabh Oberoi, Weilong Song, and Amr Youssef keywords: Android Security; Static Analysis; Dynamic Analysis
Involvers’ Behavior-based Modeling in Cyber Targeted Attack Youngsoo Kim and Ikkyun Kim keywords: APT; Targeted Attacks; Behavior-based Modeling; Malicious Codes; 3.20 DarkSeoul
Test Case Generation Assisted by Control Dependence Analysis Puhan Zhang, Qi Wang, Guowei Dong, Bin Liang, and Wenchang Shi keywords: test case generation; control dependence; implicit information flow; symbolic execution
Implementation Issues in the Construction of Standard and Non-Standard Cryptography on Android Devices Alexandre Braga and Eduardo Morais keywords: Cryptography; Surveillance; Security; Android
Threshold Proxy Signature Based on Position Qingshui Xue, Fengying Li, and Zhenfu Cao keywords: position, threshold proxy signature, proxy signature, UC security, model, scheme
Linearity Measures for Multivariate Public Key Cryptography Simona Samardjiska and Danilo Gligoroski keywords: Strong (s, t)-linearity; (s, t)-linearity; MinRank; good keys; separation keys.
Managed Certificate Whitelisting - A Basis for Internet of Things Security in Industrial Automation Applications Rainer Falk and Steffen Fries keywords: Digital certificate, certificate whitelisting, credential management, PKI, device authentication, Internet of Things
Challenges for Evolving Large-Scale Security Architectures Geir Køien keywords: Evolving Security; System Security; Security Architecture; Long-term security planning.
A Backtracking Symbolic Execution Engine with Sound Path Merging Andreas Ibing keywords: static analysis, symbolic execution
Security Extensions for Mobile Commerce Objects Nazri Bin Abdullah, Ioannis Kounelis, and Sead Muftic keywords: mobile commerce; m–commerce; m-objects; security; privacy
Attack Surface Reduction for Web Services based on Authorization Patterns Roland Steinegger, Johannes Schäfer, Max Vogler, and Sebastian Abeck keywords: security pattern, attack surface, authorization, web service, rest
Evaluation of Vehicle Diagnostics Security – Implementation of a Reproducible Security Access Martin Ring, Tobias Rensen, and Reiner Kriesten keywords: security access; safety; diagnostics security; data busses; communication standard.
An AMI Threat Detection Mechanism Based on SDN Networks Po-Wen Chi, Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, and Chin-Laung Lei keywords: AMI; SDN; Specification-based detection
Ghost Map: Proving Software Correctness using Games Ronald Watro, Kerry Moffitt, Talib Hussain, Daniel Wyschogrod, John Ostwald, Derrick Kong, Clint Bowers, Eric Church, Joshua Guttman, and Qinsi Wang keywords: games; static analyses; formal verification; crowd souring; games; model checking
|
|
SERVICES CONTACT
2010 - 2022 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy. |
|
|
|