Conferences related to System Security

Back to Top

2015 IEEE Power & Energy Society General Meeting

The annual IEEE PES General Meeting will bring together over 2500 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more PLEASE NOTE: Abstracts are not accepted for the 2015 IEEE PES General Meeting, full papers only can be submitted to the submission site 24 October 2014 through 21 November 2014.  The site will be available from the PES home page www.ieee-pes.org

  • 2017 IEEE Power & Energy Society General Meeting

    The annual IEEE Power & Energy Society General Meeting will bring together over 2000 attendees for technical sessions, student program, awards ceremony, committee meetings, and tutorials.

  • 2014 IEEE Power & Energy Society General Meeting

    The annual IEEE PES General Meeting will bring together over 2500 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutotials and more

  • 2013 IEEE Power & Energy Society General Meeting

    The annual IEEE Power & Energy Society General Meeting will bring together over 2000 attendees for technical sessions, student program, awards ceremony, committee meetings, and tutorials.

  • 2012 IEEE Power & Energy Society General Meeting

    The annual IEEE Power & Energy Society General Meeting will bring together over 2000 attendees for technical sessions, student program, awards ceremony, committee meetings, and tutorials.

  • 2011 IEEE Power & Energy Society General Meeting

    IEEE Power & Energy Annual Meeting --Papers --Awards --Plenary --Committee Meetings --Governing Board --Receptions --Tech tours --Tutorials --Companions Program

  • 2010 IEEE Power & Energy Society General Meeting

    IEEE Power & Energy Society Annual Meeting --Technical Sessions --Committee Meetings --Plenary Session --Gove Board Meeting --Awards Banquet --Tutorials --Student Activities --Social Events --Companions Program

  • 2009 IEEE Power & Energy Society General Meeting

    Paper and Panel sessions involving topics of interest to electric power engineers, technical committee meetings, administrative committee meetings, awards luncheon and plenary session.

  • 2008 IEEE Power & Energy Society General Meeting

    This meeting has paper and panel sessions on all areas of interest to electric power engineers.

  • 2007 IEEE Power Engineering Society General Meeting


2014 IEEE International Conference On Cluster Computing (CLUSTER)

IEEE Cluster is the main conference on all aspects of cluster computing for computational science

  • 2013 IEEE International Conference on Cluster Computing (CLUSTER)

    The conference will put special focus on campus clusters as the core of the cyberinfrastructure strategy and also campus bridging. Major topics: Systems design/configuration, tools, software, middleware, alogrithms, applications, storage.

  • 2012 IEEE International Conference on Cluster Computing (CLUSTER)

    Systems Design and Configuration Tools, Systems Software, and Middleware Algorithms, Applications and Performance Storage and File Systems

  • 2011 IEEE International Conference on Cluster Computing (CLUSTER)

    Major topics of interest include, but are not limited to: Systems Design and Configuration; Tools, Systems Software, and Middleware; Algorithms, Applications and Performance; Storage and File Systems

  • 2010 IEEE International Conference on Cluster Computing (CLUSTER)

    Cluster2010 welcomes original unpublished paper and poster submissions from researchers in academia, industry, and government, describing innovative research in the field of cluster and high-performance computing.

  • 2009 IEEE International Conference on Cluster Computing (CLUSTER)

    Cluster 2009 welcomes paper and poster submissions on innovative work from researchers in academia, industry, and government, describing original research in the field of cluster computing.


2014 IEEE Symposium on Security and Privacy (SP)

IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)


2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

DSN is the premier international conference for presenting research results, problem solutions, and insight on new challenges facing the field of dependability and security. DSN explores the fusion between security and dependability, addressing the need to simultaneously fight against cyber attacks, accidental faults, design errors, and unexpected operating conditions.


2013 45th Southeastern Symposium on System Theory (SSST)

SSST invites papers generally focused on the subject of system theory, including topics such as control, modeling, differential and difference equations, computational methods and intelligence, neural systems, and applications of system theory.

  • 2012 Southeastern Symposium on System Theory (SSST)

    Presentation and publication of original papers from all areas of system theory, mathematical modeling design, application, and experiments/field trials. The SSST encourages well-written, high-quality papers by graduate students based on Master s thesis and Ph.D. dissertation results, as well as papers by university faculty, researchers and government/industry personnel from throughout the US and abroad.

  • 2011 IEEE 43rd Southeastern Symposium on System Theory (SSST 2011)

    system theory, mathematical modeling, design, application, and practice of system design

  • 2010 42nd Southeastern Symposium on System Theory (SSST 2010)

    Papers presented at the SSST have focused on system-issues from fields such as: mathematical theory of systems and signals, control of electro-mechanical systems, communications, signal processing, navigation, guidance, robotics, energy and power, electronic devices, computers and networks, optics, aerospace, chemical processing, manufacturing, etc.

  • 2009 41st Southeastern Symposium on System Theory (SSST 2009)

    The conference consists of invited and contributed technical papers on theoretical and applied issues associated with the architecture, modeling, simulation and analysis, control, operation and performance-evaluation of systems. This year s special focus will be on flight systems and ground and flight testing.


More Conferences

Periodicals related to System Security

Back to Top

Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Distributed Systems Online, IEEE

After nine years of publication, DS Online will be moving into a new phase as part of Computing Now (http://computingnow.computer.org), a new website providing the front end to all of the Computer Society's magazines. As such, DS Online will no longer be publishing standalone peer-reviewed articles.


Reliability, IEEE Transactions on

Principles and practices of reliability, maintainability, and product liability pertaining to electrical and electronic equipment.


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...




Xplore Articles related to System Security

Back to Top

Distributed Generation: towards an effective contribution to power system security

Meyer, B. Power Engineering Society General Meeting, 2007. IEEE, 2007

With a continuously increasing penetration in power system, the impact of dispersed generation is getting higher and higher. This paper deals with the contribution of DG to power system security. It focuses more precisely on its behavior in case of severe frequency disturbances and shows how distributed generation can provide an active contribution to power system security. The UCTE represents ...


Implementation of Power System Security and Reliability Considering Risk Under Environment of Electricity Market

Zhang Bao-hui; Wang Li-yong; Zhang Wen-hao; Zhou De-cai; Yao Feng; Ren Jin-feng; Xie Han; Yu Gang-Liang Transmission and Distribution Conference and Exhibition: Asia and Pacific, 2005 IEEE/PES, 2005

From the viewpoint of risk the power system security and reliability under the environment of electricity market were researched. Because in competitive electricity market the power generation companies, power grid companies and load service entities belong to different economic bodies respectively, so that in the system operation, planning and design the consideration of the factors impacting system security and reliability ...


Power system security considerations in competitive electricity market design

Van Acker, V.; Ganugula, V.; Mensah, S.; Jayantilal, A.; Berry, R. Power Engineering Society Inaugural Conference and Exposition in Africa, 2005 IEEE, 2005

Power system security and market liquidity in competitive electricity markets are potentially conflicting objectives. A key aspect in successful market operation is the harmonized co-existence of these two different objectives. Ensuring the security of the system is essential for the reliability of the power system. Security also promotes competition in electricity markets by avoiding market disruption. This paper describes in ...


On the Economics of Power System Security in Multi-Settlement Electricity Markets

Gü ler, T.; Gross, G.; Litvinov, E.; Coutu, R. Power Systems, IEEE Transactions on, 2010

The tight coupling between system and market operations implies that there are strong interrelationships between system security management and market performance. Therefore, the assurance by the regional transmission organization (_RTO_) of secure system operations strongly depends on, and directly impacts, electricity markets. Typically, electricity is traded in a sequence of markets that are cleared at different frequencies and with different ...


A New Bionic Architecture of Information System Security Based on Data Envelopment Analysis

Jianrong Yao; Minxue Wei Management of e-Commerce and e-Government (ICMeCG), 2014 International Conference on, 2014

With the information technology advances in recent years, security problems become significantly important. Known that security is a complex, impressionable and multidimensional property, useful measures to assess the information system security are hard to find. The biological immune system is an expert at recognizing the antigens. After distinguishing it from the 'self', the immune system will combine with its functions ...


More Xplore Articles

Educational Resources on System Security

Back to Top

eLearning

Cyber Security of Substation Control and Diagnostic Systems

Weiss, Joseph Cyber Security of Substation Control and Diagnostic Systems, 2006

This course will familiarize learners with the need to strengthen the protection of the control systems used in the industry against cyber (electronic) threats. The control systems addressed include SCADA systems, IEDs, substation automation systems, and distribution control systems. The course will identify the major threats, and outline practical suggestions about how the security of these systems may be enhanced. ...


Cloud Security and Data Protection

Cloud Strategy Partners, LLC Cloud Security and Data Protection, 2015

Security is a complex domain and involves multiple aspects of the infrastructure, systems and applications operation as well as user access management. In this tutorial, we will begin with a review of some basics and next will go with cloud specific security aspects. In the basics we will cover the meanings of Security, and Trust, which are different. We will ...


Biometrics: Solutions for Security and Authentication

Plataniotis, Kostas Biometrics: Solutions for Security and Authentication, 2008

This course will provide an overview of the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. I will present the fundamentals of biometrics and biometric systems. The course will delve into why biometrics is a solution for security and authentication. Face, gait and ECG based biometrics will be covered. Biometrics and ...


Cyber Security of Industrial Control Systems (ICS)

Weiss, Joseph Cyber Security of Industrial Control Systems (ICS), 2009

This course will begin with an introduction to industrial control systems (SCADA, DCS, PLC, RTU, IED, field devices, meters, etc) and will explain what makes control systems different than business IT. Potential mitigation approaches including policies and technologies will be discussed. Example control system cyber events and their ramifications will be presented. Finally, current industry and government activities to secure ...


Advanced Protocols for Wireless Ad-hoc Networks

Sohrabi, Kathy Advanced Protocols for Wireless Ad-hoc Networks, 2006

This is a 2-part course. The Advanced Protocols for Wireless Ad-hoc Networks will illustrate that in Ad-Hoc networks where there is no underlying fixed infrastructure, tasks such as network self-organization, mobility management, adaptive route detection for unicast and multicast applications, and provisioning of Gateway functionality to interconnect the ad-hoc network to the rest of the Internet space must be handled ...


More eLearning Resources

IEEE.tv Videos

ISEC 2013 Special Gordon Donaldson Session: Remembering Gordon Donaldson - 6 of 7 - A high sensitive magnetometer system for natural magnetic field measurements
Skillful Manipulation Based on High-Speed Sensory-Motor Fusion
IMPASS: Intelligent Mobility Platform with Active Spoke System
Rollin' Justin -- Mobile Platform with Variable Base
The DLR MiroSurge, a Robotic System for Surgery
"ITRS 2.0 and Its System Drivers: Focus on Systems Trends and 'MTM' (Rebooting Computing)
Localization Services for Online Common Operational Picture and Situation Awareness
Micro-Apps 2013: Precision RF/MW Cable and Antenna Test in the Field
Micro-Apps 2013: Class F Power Amplifier Design, Including System-to-Circuit-to-EM Simulation
IMS 2012 Microapps - Virtual Flight Testing of Radar System Performance Daren McClearnon, Agilent EEsof
IMS 2012 Microapps - System Simulation Featuring Signal Processing Blocks
GEOSS for BIODIVERSITY -A demonstration of the GEOSS Common Infrastructure capabilities
IMS 2011 Microapps - Remcom's XFdtd and Wireless InSite: Advanced Tools for Advanced Communication Systems Analysis
GEOSS Introduction
Roy Schoenberg AMA EMBS Individualized Healthcare
APEC Speaker Highlights - Doug Hopkins, University of Buffalo, Power Electronics/Smart-Grid
Superconducting MAGLEV in Japan - ASC-2014 Plenary series - 13 of 13 - Friday 2014/8/15
Cryogenics for Applied Superconductivity - ASC-2014 Plenary series - 11 of 13 - Friday 2014/8/15
Laser Communication From Space Using Superconducting Detectors - ASC-2014 Plenary series - 12 of 13 - Friday 2014/8/15
ISEC 2013 Special Gordon Donaldson Session: Remembering Gordon Donaldson - 4 of 7 - MRI at 130 Microtesla

IEEE-USA E-Books

No IEEE-USA E-Books are currently tagged "System Security"



Standards related to System Security

Back to Top

IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


IEEE Standard Specifications for Public-Key Cryptography

Specifications of common public-key cryptographic techniques, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys.


IEEE Standard Specifications for Public-Key Cryptography - Amendment 1: Additional Techniques

Specifications of common public-key cryptographic techniques supplemental to those considered in IEEE Std 1363-2000, including mathematical primitives for secret value (key) derivation, public-key encryption, digital signatures, and identification, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is not restricted.