14th European Conference on Cyber Warfare and Security ECCWS |
|
Black Hat USA 2015 |
|
5th Annual Cyber Security Training & Technology Forum (CSTTF) |
|
Converge Information Security Conference |
|
Computing Theory and Privacy, 2014 |
|
Pattern Locks, 2014 |
|
DNA Cryptography, 2014 |
|
Data Deletion, 2014 |
|
User Privacy in the Cloud, 2014 |
|
Analogical Transfer, 2014 |
|
Artificial Intelligence and Privacy, 2014 |
|
Control Theory and Privacy, 2014, Part 1 |
|
Control Theory and Privacy, 2014, Part 2 |
|
Big Data Security Metrics, 2014 |
|
Security Scalability and Big Data, 2014 |
|
Computing Theory and Security Metrics, 2014 |
|
Computing Theory and Security Resilience, 2014 |
|
Computing Theory and Composability, 2014 |
|
Cyber-Physical System Security and Privacy, 2014, Part 1 |
|
Cyber-Physical System Security and Privacy, 2014, Part 2 |
|
Game Theoretic Security, 2014 |
|
Differential Privacy, 2014, Part 1 |
|
Security Congress APAC 2015 |
|
SAC Summer School (S3) |
|
44CON London |
|