IoT S&P 2017: First Workshop on Internet of Things Security and Privacy
Abstract
Recommendations
IoT S&P 2019: 2nd Workshop on the Internet of Things Security and Privacy
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityThe Second Workshop on Internet of Things Security and Privacy is held in London, UK on November 15, 2019, co-located with the ACM Conference on Computer and Communications Security (CCS). The workshop aims to address the security and privacy challenges ...
IoT 2017: the Seventh International Conference on the Internet of Things
IoT '17: Proceedings of the Seventh International Conference on the Internet of ThingsOver the past years, the IoT conference has become a gathering place for leading experts from industry and academia in the field of the Internet of Things. In addition to the core technical program with 21 accepted paper contributions from 15 countries, ...
Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityIt is our great pleasure to welcome you to the 2014 ACM Workshop Artificial Intelligence and Security (AISec 2014) -- the seventh annual workshop addressing technologies that fuse intelligent systems into computer security applications and the ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chair:
- Bhavani Thuraisingham,
- Program Chairs:
- David Evans,
- Tal Malkin,
- Dongyan Xu
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Abstract
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 596Total Downloads
- Downloads (Last 12 months)11
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in