Trojan Horse

View this topic in
The Trojan Horse is a tale from the Trojan War, as told in Virgil's Latin epic poem The Aeneid, also by Dionysius, Apollodorus and Quintus of Smyrna. (Wikipedia.org)






Conferences related to Trojan Horse

Back to Top

2013 Design, Automation & Test in Europe Conference & Exhibition (DATE 2013)

DATE is the complete event for the European electronic and test community. A leading world conference and exhibition, DATE unites 2,000 professionals with approximately 60 exhibiting companies, cutting edge R&D, industrial designers and technical managers from around the world.

  • 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012)

    DATE is the complete event for the European electronic system and test community. A leading world conference and exhibition, DATE unites 2,000 professionals with some 60 exhibiting companies, cutting edge R&D, industrial designers and technical managers from around the world.

  • 2011 Design, Automation & Test in Europe Conference & Exhibition (DATE 2011)

    DATE is the complete event for the European electronic system and test community. A world leading conference and exhibition, DATE unites 2,000 professionals with some 60 exhibiting companies, cutting edge R&D, industrial designers and technical managers from around the world.

  • 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010)

    All aspects of research into technologies for electronic and (embedded) systems engineering. It covers the design process, test, and tools for design automation of electronic products ranging from integrated circuits to distributed large-scale systems.

  • 2009 Design, Automation & Test in Europe Conference & Exhibition (DATE 2009)

    The Design, Automation, and Test in Europe (DATE) conference is the world's premier conference dedicated to electronics system design & test. The technical programme features: Four distinctive and integrated themes, covering all aspects of systems design and engineering. Two special days are focusing on SoC Development Strategies and Multicore Applications.

  • 2008 Design, Automation & Test in Europe Conference & Exhibition (DATE 2008)

    The 11th DATE conference and exhibition is the main European event bringing together designers and design automation users, researchers and vendors, as well as specialists in the hardware and software design, test and manufacturing of electronic circuits and systems. It puts strong emphasis on ICs/SoCs, reconfigurable hardware and embedded systems, including embedded software. The five-day event consists of a conference with plenary invited papers, regular papers, panels, hot-topic sessions, tutorials.


2013 IEEE 10th International Conference on Networking, Sensing and Control (ICNSC)

The main theme of the conference is Technology for efficient green networks . It will provide a remarkable opportunity for the academic and industrial communities to address new challenges and share solutions, and discuss future research directions.

  • 2012 9th IEEE International Conference on Networking, Sensing and Control (ICNSC)

    This conference will provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions in the area of intelligent transportation systems and networks as well other areas of networking, sensing and control. It will feature plenary speeches, industrial panel sessions, funding agency panel sessions, interactive sessions, and invited/special sessions. Contributions are expected from academia, industry, and government agencies.

  • 2011 IEEE International Conference on Networking, Sensing and Control (ICNSC)

    The main theme of the conference is Next Generation Infrastructures . Infrastructures are the backbone of the economy and society. Especially the network bound infrastructures operated by public utilities and network industries provide essential services that are enabling for almost every economic and social activity. The crucial role of the infrastructure networks for energy and water supply, transportation of people and goods, and provision of telecommunication and information services.

  • 2010 International Conference on Networking, Sensing and Control (ICNSC)

    Provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions.

  • 2009 International Conference on Networking, Sensing and Control (ICNSC)

    The main theme of the conference is advanced technologies for safety and functional maintenance. The real challenge is to obtain advanced control technology for safety and management technology and to construct an information system to share information on safetytechnology and on investigated accidents.

  • 2008 IEEE International Conference on Networking, Sensing and Control (ICNSC)

    Provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions.

  • 2007 IEEE International Conference on Networking, Sensing and Control (ICNSC)

  • 2006 IEEE International Conference on Networking, Sensing and Control (ICNSC)


2013 International Conference on Machine Learning and Cybernetics (ICMLC)

Statistical Machine Learning, Intelligent & fuzzy control, Pattern Recognition , Ensemble method, Evolutionary computation, Fuzzy & rough set, Data & web mining , Intelligent Business Computing , Biometrics , Bioinformatics , Information retrieval, Cybersecurity, Web intelligence and technology, Semantics & ontology engineering, Social Networks & Ubiquitous Intelligence, Multicriteria decision making, Soft Computing, Intelligent Systems, Speech, Image & Video Processing, Decision Support System

  • 2012 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Pattern Recognition, Biometrics, Inductive learning, Evolutionary computation, Bioinformatics, Data mining, Information retrieval, Intelligent agent, Financial engineering, Rough Set, Applications.

  • 2011 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Neural net and support vector machine, Business intelligence, Hybrid and nonlinear system, Biometrics, Fuzzy set theory, fuzzy control and system, Bioinformatics, Knowledge management, Data and web mining, Information retrieval, Intelligent agent, Intelligent and knowledge based system, Financial engineering, Rough and fuzzy rough set, Inductive learning, Networking and information security, Geoinformatics, Evolutionary computation, Pattern Recognition, Ensemble method, Logistics.

  • 2010 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Neural net and support vector machine, Business intelligence, Hybrid and nonlinear system, Biometrics, Fuzzy set theory, fuzzy control and system, Bioinformatics, Knowledge management, Data and web mining, Information retrieval, Intelligent agent, Intelligent and knowledge based system, Financial engineering, Rough and fuzzy rough set, Inductive learning, Networking and information security, Geoinformatics, Evolutionary computation, Pattern Recognition, Ensemble method, Logistics, Informat


2011 3rd International Conference on Multimedia Information Networking and Security (MINES)

Multimedia computing and intelligence Information networking and communication Service science and Intelligence Multimedia information security Communication and network security

  • 2010 International Conference on Multimedia Information Networking and Security (MINES)

    To provide a platform for worldwide researchers and engineers to exchange the latest research results on multimedia information services, with the focuses on: Multimedia computing and intelligence; Information networking and communication; Service science and Intelligence; Multimedia information security; Communication and network security

  • 2009 International Conference on Multimedia Information Networking and Security (MINES 2009)

    The conference aims to provide a platform for worldwide researchers and engineers to exchange the latest research results on multimedia information services, with the focuses on networking and security.


2011 3rd International Conference on Networking and Digital Society (ICNDS)

The aim of ICNDS 2011 is to provide a platform for researchers and engineers to present their research results and development activities in Networking and Digital Society. It also provides opportunities for the delegates to exchange new ideas and application experiences, to find global partners for future collaboration.


More Conferences

Periodicals related to Trojan Horse

Back to Top

Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...




Xplore Articles related to Trojan Horse

Back to Top

Separating Trojan horses, viruses, and worms - a proposed taxonomy of software weapons

M. Karresand IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

The terms used today to categorise different types of software weapons are not really suitable, because there exist several different definitions of each term, many of them contradicting each other. Therefore we present some methods for solving the problem. All the methods are based on a technical description's model of IT weapons (TEBIT), which is a proposed taxonomy of software ...


Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks

Klimis Ntalianis; Nicolas Tsapatsoulis IEEE Transactions on Emerging Topics in Computing, 2016

In wireless communications, sensitive information is frequently exchanged, requiring remote authentication. Remote authentication involves the submission of encrypted information, along with visual and audio cues (facial images/videos, human voice, and so on). Nevertheless, Trojan horse and other attacks can cause serious problems, especially in the cases of remote examinations (in remote studying) or interviewing (for personnel hiring). This paper proposes ...


Detecting network attacks using behavioural models

Jiří Schäfer; Michal Drozd Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2011

In this paper we're dealing with the problem of detecting malware using behaviour model. For better malware description we have divided this model into two parts - malware spreading model and malware statistical behavioural model. Spreading models are typical epidemiological models like SI model, advanced SIR and SEIR models and empiric file spreading model. In statistical behavioural model we're describing ...


Self Aware SoC Security to Counteract Delay Inducing Hardware Trojans at Runtime

Krishnendu Guha; Debasri Saha; Amlan Chakrabarti 2017 30th International Conference on VLSI Design and 2017 16th International Conference on Embedded Systems (VLSID), 2017

A major issue of present age system on chip (SoC) designing is meeting of stringent time to market deadlines along with the reduction of various challenges faced during design. A significant strategy adopted in tackling such a problem is to procure different components or IPs (intellectual properties) of the SoC from different third party IP vendors (3PIPs). Such a technique ...


Enhancing security properties of Rumor Riding protocol under various attacks scenario in P2P network

Mary Subaja Christo; S. Meenakshi 2016 International Conference on Communication and Signal Processing (ICCSP), 2016

Non Path Anonymous P2P protocol is called Rumor Riding(RR). In RR protocol the initiator sends the key message and cipher text to different neighbors. The key and cipher text takes random walks separately in the system. Each walk is called rumor. Through the random walk rumor automatically constructs the anonymous path. The initiator nor the responder need not be concerned ...


More Xplore Articles

Educational Resources on Trojan Horse

Back to Top

eLearning

Separating Trojan horses, viruses, and worms - a proposed taxonomy of software weapons

M. Karresand IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

The terms used today to categorise different types of software weapons are not really suitable, because there exist several different definitions of each term, many of them contradicting each other. Therefore we present some methods for solving the problem. All the methods are based on a technical description's model of IT weapons (TEBIT), which is a proposed taxonomy of software ...


Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks

Klimis Ntalianis; Nicolas Tsapatsoulis IEEE Transactions on Emerging Topics in Computing, 2016

In wireless communications, sensitive information is frequently exchanged, requiring remote authentication. Remote authentication involves the submission of encrypted information, along with visual and audio cues (facial images/videos, human voice, and so on). Nevertheless, Trojan horse and other attacks can cause serious problems, especially in the cases of remote examinations (in remote studying) or interviewing (for personnel hiring). This paper proposes ...


Detecting network attacks using behavioural models

Jiří Schäfer; Michal Drozd Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2011

In this paper we're dealing with the problem of detecting malware using behaviour model. For better malware description we have divided this model into two parts - malware spreading model and malware statistical behavioural model. Spreading models are typical epidemiological models like SI model, advanced SIR and SEIR models and empiric file spreading model. In statistical behavioural model we're describing ...


Self Aware SoC Security to Counteract Delay Inducing Hardware Trojans at Runtime

Krishnendu Guha; Debasri Saha; Amlan Chakrabarti 2017 30th International Conference on VLSI Design and 2017 16th International Conference on Embedded Systems (VLSID), 2017

A major issue of present age system on chip (SoC) designing is meeting of stringent time to market deadlines along with the reduction of various challenges faced during design. A significant strategy adopted in tackling such a problem is to procure different components or IPs (intellectual properties) of the SoC from different third party IP vendors (3PIPs). Such a technique ...


Enhancing security properties of Rumor Riding protocol under various attacks scenario in P2P network

Mary Subaja Christo; S. Meenakshi 2016 International Conference on Communication and Signal Processing (ICCSP), 2016

Non Path Anonymous P2P protocol is called Rumor Riding(RR). In RR protocol the initiator sends the key message and cipher text to different neighbors. The key and cipher text takes random walks separately in the system. Each walk is called rumor. Through the random walk rumor automatically constructs the anonymous path. The initiator nor the responder need not be concerned ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Trojan Horse"

IEEE-USA E-Books

No IEEE-USA E-Books are currently tagged "Trojan Horse"



Standards related to Trojan Horse

Back to Top

No standards are currently tagged "Trojan Horse"


Jobs related to Trojan Horse

Back to Top