Michele M Jordan

The advances in the Information and Communication Technologies (ICT) have raised new opportunities for the implementation of novel applications and the provision of high quality services over global networks. The aim is to utilise this ?information societ ...

ModifiedNever

Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information inf ...

ModifiedNever
Commercial
Pricing Model

Since 1996, the NordSec workshops have brought together computer security researchers and practitioners from the Nordic countries, Northern Europe, and elsewhere. The workshop is focused on applied computer security and is intended to encourage interchang ...

Modified

Research in pervasive computing continues to gain momentum. The importance of security and privacy in a pervasive computing environment cannot be underestimated. As in previous years, PerSec will bring together the world's experts on this topic and provid ...

ModifiedNever

Computers are now available anytime, anywhere, by different means, and distributed unobtrusively throughout the everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Su ...

ModifiedNever

FIRST conferences promote worldwide coordination and cooperation among Computer Security Incident Response Teams (CSIRTs). The conference provides a forum for sharing goals, ideas, and information on how to improve global computer security. The five-day e ...

ModifiedNever

SACMAT is a successful series of symposiums that continue the tradition, first established by the ACM Workshop on Role-Based Access Control, of being the premier forum for presentation of research results and experience reports on leading edge issues of a ...

ModifiedNever
Commercial
Pricing Model

The Computer Security Foundations Symposium is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was c ...

Modified
Commercial
Pricing Model

The State Key Laboratory of Information Security (SKLOIS) of China is one of the largest research groups in China in the area of Information Security and Cryptology. The SKLOIS conference on information security and cryptology (Inscrypt, formerly CISC) wi ...

Modified

The Asiacrypt Conferences are series of annual International Conference on Theory and Application of Cryptology and Information Security. The conference is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the ...

ModifiedNever
Illinois Institute of Technology
Commercial
Pricing Model

The conference will bring together knowledgeable security practitioners and responsible executives from organizations such as computer and network technology providers and manufacturers, digital forensic practitioners, scientific laboratories, law enforce ...

Modified
Commercial
Pricing Model

XCon is an Information Security Conference organized by the XFocus Security Team which brings together information security enthusiasts and professionals from all parts of China, and the world.

Modified
German Informatics Society
Commercial
Pricing Model

In order to advance the fields of IT-Incident Management and Forensics the special interest-group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) organises an annual conference, bringing together experts from thr ...

Modified
Commercial
Pricing Model

The theme of the conference is the protection of computer networks. The conference will draw participants from academia and industry in Europe and beyond to discuss hot topics in applied network and systems security. Topics include but are not limited to ...

Modified

DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal e ...

ModifiedNever

Summercon is our chance to get together, talk to each other face-to-face, and swap information about innovations, trends, practices, and rumors in the field of computer security. We welcome all walks of life and all sides of the debate to Summercon: hacke ...

ModifiedNever

Welcome to the home of POC. POC is organized by Korean hackers & security experts. It is an international security & hacking conference in Korea. POC concentrates on technical and creative discussion and shows real hacking and security. POC wears both bla ...

ModifiedNever

The 24th Chaos Communication Congress (24C3) is the annual four-day conference organized by the Chaos Computer Club (CCC) in Berlin, Germany. First held in 1984, it since has established itself as ?the European Hacker Conference?. Lectures and workshops o ...

ModifiedNever
Net-Security Training
Commercial
Pricing Model

Hacking involves creativity and thinking 'out-of-the-box', then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organisations have adequately protected their information assets, they must ...

Category Ethical Hacking
Modified
Net-Security Training
Commercial
Pricing Model

This 5-day Penetration Testing course is for those IT professionals who are required to test their own internal networks or the networks of an external client. The Penetration Testing course will cover the principles of penetration testing and ethical hac ...

Category Ethical Hacking
Modified