Conferences related to Viruses

Back to Top

2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2018 19th International Conference of Young Specialists on Micro/Nanotechnologies and Electron Devices (EDM)

EDM 2018 is a significant event aimed at development of scientific schools working on foreground areas of Russian science and technology. The main areas are research, design and implementation of micro/nanostructures, radio and telecommunication devices, power electronicand mechatronic systems which are now related to the development of scientific and technological progress. The conference aims to gather young specialists of the differentuniversities of Russia, CIS and other countries. Invited Russian and foreign specialists will report about the development of science and technologies, perspectives of further development of modern electronics. This conference is focused primarily on the discussion of the fundamental theoretical and technological problems of designing and implementing products of micro- and nanoelectronics, simulation methods, and engineering experiments and physical interpretation of the results of these experiments.


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2018 26th Signal Processing and Communications Applications Conference (SIU)

The general scope of the conference ranges from signal and image processing to telecommunication, and applications of signal processing methods in biomedical and communication problems.

  • 2017 25th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing and Communication Applications (SIU) conference is the most prominent scientific meeting on signal processing in Turkey bringing together researchers working in signal processing and communication fields. Topics include but are not limited to the areas of research listed in the keywords.

  • 2016 24th Signal Processing and Communication Application Conference (SIU)

    Signal Processing Theory, Statistical Signal Processing, Nonlinear Signal Processing, Adaptive Signal Processing, Array and Multichannel Signal Processing, Signal Processing for Sensor Networks, Time-Frequency Analysis, Speech / Voice Processing and Recognition, Computer Vision, Pattern Recognition, Machine Learning for Signal Processing, Human-Machine Interaction, Brain-Computer Interaction, Signal-Image Acquisition and Generation, image Processing, video Processing, Image Printing and Presentation, Image / Video / Audio browsing and retrieval, Image / Video / Audio Watermarking, Multimedia Signal Processing, Biomedical Signal Processing and Image Processing, Bioinformatics, Biometric Signal-Image Processing and Recognition, Signal Processing for Security and Defense, Signal and Image Processing for Remote Sensing, Signal Processing Hardware, Signal Processing Education, Radar Signal Processing, Communication Theory, Communication Networks, Wireless Communications

  • 2015 23th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing Theory Statistical Signal Processing Nonlinear Signal Processing Adaptive Signal Processing Array and Multichannel Signal Processing Signal Processing for Sensor Networks Time-Frequency Analysis Speech / Voice Processing and Recognition Computer Vision Pattern Recognition Machine Learning for Signal Processing Human-Machine Interaction Brain-Computer Interaction Signal-Image Acquisition and Generation image Processing video Processing Image Printing and Presentation Image / Video / Audio browsing and retrieval Image / Video / Audio Watermarking Multimedia Signal Processing Biomedical Signal Processing and Image Processing Bioinformatics Biometric Signal-Image Processing and Recognition Signal Processing for Security and Defense Signal and Image Processing for Remote Sensing Signal Processing Hardware Signal Processing Education Radar Signal Processing Communication Theory Communication Networks Wireless Communications

  • 2014 22nd Signal Processing and Communications Applications Conference (SIU)

    SIU will be held in Trabzon, Turkey at the Karadeniz Technical University Convention and Exhibition Centre on April 23, 2014. SIU is the largest and most comprehensive technical conference focused on signal processing and its applications in Turkey. Last year there were 500 hundred participants. The conference will feature renowned speakers, tutorials, and thematic workshops. Topics include but are not limited to: Signal Procesing, Image Processing, Communication, Computer Vision, Machine Learning, Biomedical Signal Processing,

  • 2013 21st Signal Processing and Communications Applications Conference (SIU)

    Conference will discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. Conference will also include invited lectures, tutorials and special sessions.

  • 2012 20th Signal Processing and Communications Applications Conference (SIU)

    Conference will discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. Conference will also include invited lectures, tutorials and special sessions.

  • 2011 19th Signal Processing and Communications Applications Conference (SIU)

    Conference will bring together academia and industry professionals as well as students and researchers to present and discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. The Conference will also include invited lectures, tutorials and special sessions.

  • 2010 IEEE 18th Signal Processing and Communications Applications Conference (SIU)

    S1.Theory of Signal-Processing S2.Statistical Signal-Processing S3.Multimedia Signal-Processing S4.Biomedical Signal-Processing S5.Sensor Networks S6.Multirate Signal-Processing S7.Pattern Recognition S8.Computer Vision S9.Adaptive Filters S10.Image/Video/Speech Browsing, Retrieval S11.Speech/Audio Coding S12.Speech Processing S13.Human-Machine Interfaces S14.Surveillance Signal Processing S15.Bioinformatics S16.Self-Learning S17.Signal-Processing Education S18.Signal-Processing Systems S1

  • 2009 IEEE 17th Signal Processing and Communications Applications Conference (SIU)

    The scope of the conference is to cover recent topics in theory and applications of Signal Processing and Communications.

  • 2008 IEEE 16th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing, Image Processing, Speech Processing, Pattern Recognition, Human Computer Interaction, Communication, Video and Speech indexing, Computer Vision, Biomedical Signal Processing

  • 2007 IEEE 15th Signal Processing and Communications Applications (SIU)

  • 2006 IEEE 14th Signal Processing and Communications Applications (SIU)

  • 2005 IEEE 13th Signal Processing and Communications Applications (SIU)

  • 2004 IEEE 12th Signal Processing and Communications Applications (SIU)


2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID)

This conference is a forum for researchers and designers to present and discuss various aspects of VLSI design, EDA, embedded systems, and enabling technologies. The program will consist of regular paper sessions, special sessions, embedded tutorials, panel discussions, design contest, industrial exhibits and tutorials. This is the premier conference/exhibition in this area in India, attracting designers, EDA professionals, and EDA tool users. The program committee for the conference has a significant representation from the EDA research community and a large fraction of the papers published in this conference are EDA-related


More Conferences

Periodicals related to Viruses

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Computational Biology and Bioinformatics, IEEE/ACM Transactions on

Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals


Xplore Articles related to Viruses

Back to Top

Detection of Hepatitis viruses (HBV, HAV, HCV) in serum using MEMS based Bio-Sensor

[{u'author_order': 1, u'affiliation': u'Department of ECE, KLEF, Vaddeswaram, Guntur, India', u'full_name': u'Nireekshith. Yarraguntla'}, {u'author_order': 2, u'affiliation': u'Department of ECE, KLEF, Vaddeswaram, Guntur, India', u'full_name': u'Naveena Tirumala'}, {u'author_order': 3, u'affiliation': u'Department of ECE, KLEF, Vaddeswaram, Guntur, India', u'full_name': u'Syed. Shameem'}, {u'author_order': 4, u'affiliation': u'Department of ECE, KLEF, Vaddeswaram, Guntur, India', u'full_name': u'K. srinivasa rao'}] 2018 Second International Conference on Computing Methodologies and Communication (ICCMC), None

A biosensor is a device that converts naturally occurring activity into measurable signal. Biosensors stands up for its special features such as miniaturization, easily usable, one-step reagent less analysis etc. that pave a separate way when compared to conventional biological sensing techniques. Most conventional MEMS and NEMS are designed for detecting and sensing. The working principle varies as per application, ...


Laser Excitation of Coherent Gigahertz Vibrations in Plant Viruses

[{u'author_order': 1, u'affiliation': u'A.M. Prokhorov General Physics Institute of the RAS, Moscow, Russia', u'full_name': u'S. M. Pershin'}, {u'author_order': 2, u'affiliation': u'Optical Department, P.N. Lebedev Physical Institute of the RAS, Moscow, Russia', u'full_name': u'N. V. Tcherniega'}, {u'author_order': 3, u'affiliation': u'A.M. Prokhorov General Physics Institute of the RAS, Moscow, Russia', u'full_name': u'A. F. Bunkin'}, {u'author_order': 4, u'affiliation': u'Biological Department, M.V. Lomonosov Moscow State University, Moscow, Russia', u'full_name': u'E. K. Donchenko'}, {u'author_order': 5, u'affiliation': u'Biological Department, M.V. Lomonosov Moscow State University, Moscow, Russia', u'full_name': u'O. V. Karpova'}, {u'author_order': 6, u'affiliation': u'Optical Department, P.N. Lebedev Physical Institute of the RAS, Moscow, Russia', u'full_name': u'A. D. Kudryavtseva'}, {u'author_order': 7, u'affiliation': u'Biological Department, M.V. Lomonosov Moscow State University, Moscow, Russia', u'full_name': u'T. V. Mironova'}, {u'author_order': 8, u'affiliation': u'Optical Department, P.N. Lebedev Physical Institute of the RAS, Moscow, Russia', u'full_name': u'M. A. Strokov'}, {u'author_order': 9, u'affiliation': u'Optical Department, P.N. Lebedev Physical Institute of the RAS, Moscow, Russia', u'full_name': u'M. A. Shevchenko'}, {u'author_order': 10, u'affiliation': u'Optical Department, P.N. Lebedev Physical Institute of the RAS, Moscow, Russia', u'full_name': u'K. I. Zemskov'}] 2018 International Conference Laser Optics (ICLO), None

Stimulated low-frequency Raman scattering has been registered in different plant viruses, placed in water or Tris- HCl pH7.5 buffer. Frequency shifts of the scattered light components have been measured with the help of Fabri-Perot interferometers. High efficiency of the scattering is evidence of the effective excitation of gigahertz vibrations in viruses.


Enhanced Detection of Single Viruses On-Chip via Hydrodynamic Focusing

[{u'author_order': 1, u'affiliation': u'School of Engineering, University of California Santa Cruz, Santa Cruz, CA, USA', u'full_name': u'Jennifer A. Black'}, {u'author_order': 2, u'affiliation': u'Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT, USA', u'full_name': u'Erik Hamilton'}, {u'author_order': 3, u'affiliation': u'School of Engineering, University of California Santa Cruz, Santa Cruz, CA, USA', u'full_name': u'Ra\xfal A. Reyes Hueros'}, {u'author_order': 4, u'affiliation': u'School of Engineering, University of California Santa Cruz, Santa Cruz, CA, USA', u'full_name': u'Joshua W. Parks'}, {u'author_order': 5, u'affiliation': u'Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT, USA', u'full_name': u'Aaron R. Hawkins'}, {u'author_order': 6, u'affiliation': u'School of Engineering, University of California Santa Cruz, Santa Cruz, CA, USA', u'full_name': u'Holger Schmidt'}] IEEE Journal of Selected Topics in Quantum Electronics, 2019

Planar optofluidics provide a powerful tool for facilitating chip-scale light- matter interactions. Silicon-based liquid core waveguides have been shown to offer single molecule sensitivity for efficient detection of bioparticles. Recently, a PDMS based planar optofluidic platform was introduced that opens the way to rapid development and prototyping of unique structures, taking advantage of the positive attributes of silicon dioxide-based optofluidics ...


On the Response of Nanoelectrode Impedance Spectroscopy Measures to Plant, Animal, and Human Viruses

[{u'author_order': 1, u'affiliation': u'Dipartimento Politecnico di Ingegneria ed Architettura, Università degli Studi di Udine, Udine, Italy', u'full_name': u'Andrea Cossettini'}, {u'author_order': 2, u'affiliation': u'Dipartimento Politecnico di Ingegneria ed Architettura, Università degli Studi di Udine, Udine, Italy', u'full_name': u'Luca Selmi'}] IEEE Transactions on NanoBioscience, 2018

A simplified lumped geometrical and electrical model for the high-frequency impedance spectroscopy (HFIS) response of nanoelectrodes to T = 3 capsids and full viruses is developed starting from atomistic descriptions, in order to test the theoretical response of a realistic HFIS CMOS biosensor platform to different viruses. Capacitance spectra are computed for plant (cowpea chlorotic mottle virus), animal (rabbit haemorrhagic ...


Micro-Viruses for Fast System-Level Voltage Margins Characterization in Multicore CPUs

[{u'author_order': 1, u'affiliation': u'Univ. of Athens, Athens, Greece', u'full_name': u'George Papadimitriou'}, {u'author_order': 2, u'affiliation': u'Univ. of Athens, Athens, Greece', u'full_name': u'Athanasios Chatzidimitriou'}, {u'author_order': 3, u'affiliation': u'Univ. of Athens, Athens, Greece', u'full_name': u'Manolis Kaliorakis'}, {u'author_order': 4, u'affiliation': u'Univ. of Athens, Athens, Greece', u'full_name': u'Yannos Vastakis'}, {u'author_order': 5, u'affiliation': u'Univ. of Athens, Athens, Greece', u'full_name': u'Dimitris Gizopoulos'}] 2018 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), None

In this paper, we propose the employment of fast targeted programs (diagnostic micro-viruses) that aim to stress individually the main hardware components of a multicore CPU architecture which most likely determine the limits of voltage scaling, i.e. safe Vmin values. We describe in detail the complex development process for the diagnostic micro-viruses and their comprehensive validation in modern multicore CPU ...


More Xplore Articles

Educational Resources on Viruses

Back to Top

eLearning

No eLearning Articles are currently tagged "Viruses"

IEEE-USA E-Books

  • Computer Viruses as Artificial Life

    There has been considerable interest in computer viruses since they first appeared in 1981, and especially in the past few years as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed computing environment. However, only recently have some scientists begun to ask if computer viruses are not a form of artificial life--a self-replicating organism. Simply because computer viruses do not exist as organic molecules may not be sufficient reason to dismiss the classification of this form of "vandalware" as a form of life. This paper begins with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of artificial life and self-organizing systems. The paper concludes with some comments directed toward the definition of artificially "alive" systems and experimentation.

  • Host‐Level Threats and Vulnerabilities

    This chapter contains sections titled: Background Malware Eavesdropping Job Faults Resource Starvation Overflow Privilege Escalation Injection Attacks Conclusion References

  • Technologies for Safeguarding Medical Data and Privacy

    **This book brings together a broad range of topics demonstrating how information and wireless technologies can be used in healthcare** In this book, the authors focus on how medical information can be reliably transmitted through wireless communication networks. It explains how they can be optimized to carry medical information in various situations by utilizing readily available traditional wireless local area network (WLAN) and broadband wireless access (BWA) systems. In addition, the authors discuss consumer healthcare technology, which is becoming more popular as reduction in manufacturing cost of electronics products makes healthcare products more affordable to the general public. Finally, the book explores topics such as communication networks and services, patient monitoring, information processing, system deployment, data security and privacy, information technology in alternative medicine, multimedia and health informatics, and caring for the community. **Key F atures**: •Focuses on the transmission of medical information over wireless communication networks, and addresses topics such as communication networks and services, patient monitoring, information processing, system deployment, data security and privacy, and many others •Provides an in-depth introduction to the various factors that need to be considered for supporting healthcare services with information technology •Covers advancements in topics such as RFID in healthcare •Discusses medical signal processing as well as ECG and signal processing techniques This book will be of interest to advanced students and professors in biomedical engineering, bioinformatics, and information engineering. Medical and IT professionals involved in specifying new facilities, healthcare practitioners in telemedicine, researchers in wireless communications and information technology, and network administrators will also find this book insi htful.

  • Hierarchical Artificial Immune Model

    As viruses become more complex, current anti-virus methods are inefficient to detect various forms of viruses, especially new variants and unknown viruses. This chapter proposes a hierarchical artificial immune model (HAIM) for virus detection to overcome three specific shortcomings in traditional artificial immune system (AIS) models: randomly generating the detectors leading to the bad efficiency; poor generalization and poor performance with a big dataset; and ignoring the relevance between different extracted signatures in one virus. The virus gene library generating module works on the training set consisting of legal and virus programs. The model can obtain the frequency information of deoxyribonucleotides (ODN) appearing in the legal and virus programs. Finally, classification decision is an overall behavior that greatly reduces the information loss. The model can effectively and efficiently recognize obfuscated virus, detect new variants of known virus and some unknown viruses.

  • Malware Detection System Using Affinity Vectors

    This chapter proposes an immune-based virus detection system using affinity vectors (IVDS) based on the negative selection and clonal selection algorithms in artificial immune system (AIS). AVDS first generates the detector set from virus files in dataset, negative selection is used to eliminate autoimmunity detectors for the detector set, while clonal selection is exploited to increase the diversity of the detector set in the non-self space. The affinity vectors of the training set and the testing set are used to train and test classifiers, respectively. Finally, based on the affinity vectors, three classic classifiers, that is, Support Vector Machine (SVM), radial basis kernel function (RBF) network and k-nearest neighbor (KNN), are used to verify the performance of the model. Experimental results showed that the IVDS with the rbf-SVM classifier has a strong generalization ability with a low false positive rate in detecting unknown viruses.

  • Immune Principle and Neural Networks-Based Malware Detection

    Detection of unknown malware is one of most important tasks in Computer Immune System (CIS) studies. By using nonself detection, diversity of anti-body (Ab) and artificial neural networks (ANN), this chapter proposes an NN-based malware detection algorithm. A number of experiments illustrate that this algorithm has high detection rate with a very low false positive rate. Aiming at automation detection malicious executables, the chapter proposes a novel malware detection algorithm (MDA) based on the immune principle and ANN. Extensive experiments show that the algorithm has a better detection performance than Schultz's method. The first goal is to verify the detection ability of the malware detection algorithm for malicious executables. The experimental results are all scaled with false positive rate (FPR) and detection rate (DR). The second goal is to calculate the probability of the reducing detection hole with the diversity of detectors.

  • Cache Poisoning Defenses

    The primary attack vector for poisoning domain name system (DNS) cache consists of an attacker manipulating DNS responses by sending numerous answers to a given query with varying IP and DNS header parameters. A high volume of incoming DNS answers disproportionate to outgoing queries could indicate a cache poisoning attack. Upon detection of an attack, user should attempt to identify the source of the attack and if possible, block the sender. Antivirus and anti¿¿¿malware defenses for end user devices can help reduce the incidence of known viruses and malware from instigating a cache poisoning attack against the recursive servers. The definitive solution to cache poisoning attacks requires the authentication of each DNS query answer as having been published by the authoritative domain owner. DNS security extensions (DNSSEC) specifications provide for query answer authentication as well as data integrity validation to assure no manipulation of query answers en route to the validating resolver.

  • Synthetic Biology: Synthesis and Modification of a Chemical Called Poliovirus

  • About the Editor

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Index

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.



Standards related to Viruses

Back to Top

No standards are currently tagged "Viruses"


Jobs related to Viruses

Back to Top