Languages
Covers
Jump To : Overview | Titles | Subjects

Weippl, Edgar.

Overview
Works: 1 works in 2 publications in 1 languages
Titles
Information Systems Security and Privacy = 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020, Revised Selected Papers / by: Mori, Paolo.; Weippl, Edgar.; Furnell, Steven.; Camp, Olivier.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Information Systems Security and Privacy = First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers / by: Aïmeur, Esma.; Weippl, Edgar.; Bidan, Christophe.; SpringerLink (Online service); Camp, Olivier. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Computer Security -- ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I / by: SpringerLink (Online service); Pernul, Günther.; Y A Ryan, Peter.; Weippl, Edgar. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Machine Learning and Knowledge Extraction = 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021, Virtual Event, August 17–20, 2021, Proceedings / by: Weippl, Edgar.; Holzinger, Andreas.; SpringerLink (Online service); Tjoa, A Min.; Kieseberg, Peter. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Security in E-Learning by: Weippl, Edgar.; SpringerLink (Online service) (Language materials, printed)
Computer security - ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015 : proceedings.. Part I / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Weippl, Edgar.; SpringerLink (Online service); Ryan, Peter Y A.; Pernul, Gunther. (Language materials, printed)
Computer Security -- ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II / by: Weippl, Edgar.; Y A Ryan, Peter.; Pernul, Günther.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Computer security - ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015 : proceedings.. Part II / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Weippl, Edgar.; SpringerLink (Online service); Ryan, Peter Y A.; Pernul, Gunther. (Language materials, printed)
Availability, Reliability, and Security in Information Systems = IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings / by: Buccafurri, Francesco.; Holzinger, Andreas.; SpringerLink (Online service); Weippl, Edgar.; Tjoa, A Min.; Kieseberg, Peter. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Machine Learning and Knowledge Extraction = 4th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2020, Dublin, Ireland, August 25–28, 2020, Proceedings / by: Weippl, Edgar.; Holzinger, Andreas.; SpringerLink (Online service); Kieseberg, Peter.; Tjoa, A Min. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Show more
Subjects
IT in Business. Artificial intelligence. Data protection. Software engineering. Information Systems Applications (incl.Internet) Algorithms. Application software. e-Commerce/e-business. Data Structures, Cryptology and Information Theory. Computer Appl. in Social and Behavioral Sciences. Internet of things. Embedded computer systems. Cyber-physical systems, IoT. Machine theory. Computers. Database Management. Mobile and Network Security. Algorithm Analysis and Problem Complexity. Computer networks . Formal Languages and Automata Theory. Natural language processing (Computer science). Information Systems Applications (incl. Internet). Computer Science. Special purpose computers. Management of Computing and Information Systems. Information technology. Database management. Special Purpose and Application-Based Systems. Computer networks—Security measures. Computing Milieux. Computer science. Management information systems. Data encryption (Computer science) E-commerce. Computer security. Computer Imaging, Vision, Pattern Recognition and Graphics. Arithmetic and Logic Structures. Computer engineering. Systems and Data Security. Computers and Education. Education—Data processing. Programming Techniques. Computer-assisted instruction User interfaces (Computer systems). Information storage and retrieval. Business—Data processing. Artificial Intelligence. Data encryption (Computer science). Computer Applications. Information storage and retrieval systems. Natural Language Processing (NLP). Information Storage and Retrieval. Computer Science, general. Software Engineering. Security Services. Software Engineering/Programming and Operating Systems. Software Management. Data Encryption. Information technology Computers and civilization. Computer Engineering and Networks. Computer security Data mining. Computers and Society. Cryptology. Arithmetic and logic units, Computer. User Interfaces and Human Computer Interaction. Optical data processing. Data and Information Security. Cryptography. Data Mining and Knowledge Discovery.
 
 
Change password
Login