Event | When | Where | Deadline | |
SeceS 2014 |
2nd International Workshop on Security and Privacy Preserving in e-Societies | |
Sep 15, 2014 - Sep 17, 2014 |
Buraidah Al Qassim – Saudi Arabia |
Jun 8, 2014 |
LASER 2014 |
Workshop on Learning from Authoritative Security Experiment Results | |
Oct 15, 2014 - Oct 16, 2014 |
Arlington, VA |
Jul 11, 2014 |
TrustCol 2014 |
The 9th IEEE International Workshop on Trusted Collaboration | |
Oct 22, 2014 - Oct 22, 2014 |
Miami, Florida, USA |
Aug 10, 2014 |
ICACC-2015 |
First International Conference on Anti-Cybercrime | |
Feb 9, 2015 - Feb 11, 2015 |
Riyadh, Saudi Arabia |
Nov 30, 2014 |
W2SP 2015 |
Web 2.0 Security & Privacy 2015 | |
May 21, 2015 - May 21, 2015 |
San Jose, California |
Jan 12, 2015 |
USENIX Security 2015 |
24th USENIX Security Symposium | |
Aug 12, 2015 - Aug 14, 2015 |
Washington, DC |
Feb 23, 2015 (Feb 16, 2015) |
DBDM 2015 |
Third International Conference on Database and Data Mining | |
Apr 24, 2015 - Apr 25, 2015 |
Dubai , UAE |
Mar 20, 2015 |
ICDDM 2015 |
2015 4th International Conference on Database and Data Mining | |
Jul 2, 2015 - Jul 3, 2015 |
Chicago, USA |
Apr 20, 2015 |
ICKD 2015 |
2015 4th International Conference on Knowledge Discovery | |
Jul 2, 2015 - Jul 3, 2015 |
Chicago, USA |
Apr 20, 2015 |
CSET 2015 |
8th Workshop on Cyber Security Experimentation and Test | |
Aug 10, 2015 - Aug 10, 2015 |
Washington, D.C. |
Apr 23, 2015 |
CSS 2015 |
The 7th International Symposium on Cyberspace Safety and Security (CSS 2015) | |
Aug 24, 2015 - Aug 26, 2015 |
New York |
Apr 30, 2015 (Apr 1, 2015) |
CIKM 2015 |
Conference on Information and Knowledge Management | |
Oct 19, 2015 - Oct 23, 2015 |
Melbourne, Australia |
May 8, 2015 (May 1, 2015) |
IJIT 2015 |
International Journal on Information Theory | |
N/A |
N/A |
Jun 30, 2015 |
|