Languages
Covers
Jump To : Overview | Titles | Subjects

Weippl, Edgar.

Overview
Works: 1 works in 2 publications in 1 languages
Titles
Information Systems Security and Privacy = 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020, Revised Selected Papers / by: Weippl, Edgar.; Furnell, Steven.; Camp, Olivier.; Mori, Paolo.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Information Systems Security and Privacy = First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers / by: Weippl, Edgar.; Bidan, Christophe.; Aïmeur, Esma.; SpringerLink (Online service); Camp, Olivier. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Computer Security -- ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I / by: SpringerLink (Online service); Pernul, Günther.; Y A Ryan, Peter.; Weippl, Edgar. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Machine Learning and Knowledge Extraction = 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021, Virtual Event, August 17–20, 2021, Proceedings / by: Tjoa, A Min.; Kieseberg, Peter.; Weippl, Edgar.; Holzinger, Andreas.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Security in E-Learning by: Weippl, Edgar.; SpringerLink (Online service) (Language materials, printed)
Computer security - ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015 : proceedings.. Part I / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Ryan, Peter Y A.; Weippl, Edgar.; Pernul, Gunther.; SpringerLink (Online service) (Language materials, printed)
Computer Security -- ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II / by: Weippl, Edgar.; Y A Ryan, Peter.; Pernul, Günther.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Computer security - ESORICS 2015 = 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015 : proceedings.. Part II / by: Ryan, Peter Y A.; Workshop on the Preservation of Stability under Discretization ((2001 :); Weippl, Edgar.; SpringerLink (Online service); Pernul, Gunther. (Language materials, printed)
Availability, Reliability, and Security in Information Systems = IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings / by: Buccafurri, Francesco.; Holzinger, Andreas.; SpringerLink (Online service); Tjoa, A Min.; Kieseberg, Peter.; Weippl, Edgar. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Machine Learning and Knowledge Extraction = 4th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2020, Dublin, Ireland, August 25–28, 2020, Proceedings / by: Kieseberg, Peter.; Tjoa, A Min.; Weippl, Edgar.; Holzinger, Andreas.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Show more
Subjects
IT in Business. Artificial intelligence. Data protection. Software engineering. Programming Techniques. Information Systems Applications (incl.Internet) Algorithms. Computer-assisted instruction Application software. e-Commerce/e-business. User interfaces (Computer systems). Information storage and retrieval. Business—Data processing. Artificial Intelligence. Data Structures, Cryptology and Information Theory. Data encryption (Computer science). Computer Appl. in Social and Behavioral Sciences. Internet of things. Embedded computer systems. Computer Applications. Cyber-physical systems, IoT. Information storage and retrieval systems. Natural Language Processing (NLP). Machine theory. Information Storage and Retrieval. Computers. Computer Science, general. Database Management. Software Engineering. Mobile and Network Security. Security Services. Software Engineering/Programming and Operating Systems. Algorithm Analysis and Problem Complexity. Software Management. Computer networks . Data Encryption. Formal Languages and Automata Theory. Information technology Natural language processing (Computer science). Information Systems Applications (incl. Internet). Computer Science. Computers and civilization. Special purpose computers. Computer Engineering and Networks. Management of Computing and Information Systems. Computer security Information technology. Data mining. Database management. Computers and Society. Cryptology. Special Purpose and Application-Based Systems. Arithmetic and logic units, Computer. Computer networks—Security measures. Computing Milieux. Computer science. Management information systems. User Interfaces and Human Computer Interaction. Optical data processing. Data encryption (Computer science) E-commerce. Data and Information Security. Computer security. Computer Imaging, Vision, Pattern Recognition and Graphics. Cryptography. Data Mining and Knowledge Discovery. Arithmetic and Logic Structures. Computer engineering. Systems and Data Security. Computers and Education. Education—Data processing.
 
 
Change password
Login