Conferences related to Viruses

Back to Top

2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)

This is a general Electrical and Computer Engineering Conference which encompasses all aspects of these fields.

  • 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)

    On behalf of the organizing committee of the 2012 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), it is with great pleasure to invite you to the 25th anniversary of this conference. CCECE is the annual flagship of IEEE Canada, and over the past 24 years it has been established as a major forum in various areas of electrical and computer engineering for researchers from Canada and around the world. The silver anniversary of CCECE in Montreal is an important milestone in the history of this conference, and the organizing committee members are trying hard to make it a memorable one.

  • 2011 24th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)

    The 2011 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2011) will be held in Niagara Falls, Ontario, Canada from May 8 11, 2011. CCECE 2011 provides a forum for the presentation of electrical and computer engineering research and development from Canada and around the world. Papers are invited, in French or English, for the following symposia.

  • 2010 IEEE 23rd Canadian Conference on Electrical and Computer Engineering - CCECE

    CCECE 2010 provides researchers, students, and practicing professionals in the area of Electrical and Computer Engineering with a Canadian venue in which they can present the latest technological advancements and discoveries. CCECE 2010 will feature papers presented from a broad range of areas in Electrical and Computer Engineering.

  • 2009 IEEE 22nd Canadian Conference on Electrical and Computer Engineering - CCECE

    CCECE provides researchers, students, and practicing professionals in the area of Electrical and Computer Engineering with a Canadian venue in which they can present the latest technological advancements and discoveries. It is also a valuable opportunity to network, exchange ideas, strengthen existing partnerships and foster new collaborations. CCECE 2009 will feature 7 mini-symposia with papers presented from a broad range of areas in Electrical and Computer Engineering. There will be tutorial sessions in

  • 2008 IEEE Canadian Conference on Electrical and Computer Engineering - CCECE

    CCECE 2008 provides a forum for the presentation of electrical and computer engineering research and development from Canada and around the world. There will be eight mini symposia and papers are invited, in French and English, including but not limited to the following topics: Biomedical Engineering, Circuits, Devices and Systems, Communications and Networking, Computer Systems and Applications, Control and Robotics, Emerging Areas, Power Electronics and Systems, Signal and Multimedia Processing.

  • 2007 Canadian Conference on Electrical and Computer Engineering - CCECE

    Brings together researchers working in all areas covered by the IEEE Technical Societies. There is a special emphasis on Communications, Power, Computers, Signal Processing, and Biomedical Engineering.

  • 2006 Canadian Conference on Electrical and Computer Engineering - CCECE

  • 2005 Canadian Conference on Electrical and Computer Engineering - CCECE


2012 8th International Conference on Natural Computation (ICNC)

ICNC is an international forum on intelligent systems inspired from nature, particularly neural, biological, and nonlinear systems, with applications to signal processing, communications, biomedical engineering and more.

  • 2011 Seventh International Conference on Natural Computation (ICNC)

    ICNC is an international forum on intelligent systems inspired from nature, particularly neural, biological, and nonlinear systems, with applications to signal processing, communications, biomedical engineering, and more.

  • 2010 Sixth International Conference on Natural Computation (ICNC)

    ICNC is an international forum on intelligent systems inspired from nature, particularly neural, biological, and nonlinear systems, with applications to signal processing, communications, biomedical engineering, and more.

  • 2007 International Conference on Natural Computation (ICNC)

    ICNC '07 aims to provide a high-level international forum for scientists and researchers to present the state of the art of intelligent methods inspired from nature, including biological, ecological, and physical systems, with applications to data mining, manufacturing, design, reliability, and more. It is an exciting and emerging interdisciplinary area in which a wide range of techniques and methods are being studied for dealing with large, complex, and dynamic problems.


2010 Second International Conference on Computational Intelligence and Natural Computing (CINC)

The CINC 2010 conference provides a forum for engineers and scientists in academia, industry, and government to address profound issues including technical challenges, safety, social, legal, political, and economic issues, and to present and discuss their ideas, results, work in progress and experience on all aspects of computational intelligence and natural computing.


2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)

1. Innovative Computing 2. Information Processing, 3. Intelligent System and Control,


2007 Frontiers in the Convergence of Bioscience and Information Technologies (FBIT 2007)



Periodicals related to Viruses

Back to Top

Computational Biology and Bioinformatics, IEEE/ACM Transactions on

Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.


Micro, IEEE

IEEE Micro magazine presents high-quality technical articles from designers, systems integrators, and users discussing the design, performance, or application of microcomputer and microprocessor systems. Topics include architecture, components, subassemblies, operating systems, application software, communications, fault tolerance, instrumentation, control equipment, and peripherals.


Potentials, IEEE

This award-winning magazine for technology professionals explores career strategies, the latest research and important technical developments. IEEE Potentials covers theories to practical applications and highlights technology's global impact.


More Periodicals


Xplore Articles related to Viruses

Back to Top

An Interferometric Reflectance Imaging Sensor for Point of Care Viral Diagnostics

Alexander P. Reddington; Jacob T. Trueb; David S. Freedman; Ahmet Tuysuzoglu; George G. Daaboul; Carlos A. Lopez; W. Clem Karl; John H. Connor; Helen Fawcett; M. Selim Ünlü IEEE Transactions on Biomedical Engineering, 2013

The use of in vitro diagnostic devices is transitioning from the laboratory to the primary care setting to address early disease detection needs. Time critical viral diagnoses are often made without support due to the experimental time required in today's standard tests. Available rapid point of care (POC) viral tests are less reliable, requiring a follow-on confirmatory test before conclusions ...


Separating Trojan horses, viruses, and worms - a proposed taxonomy of software weapons

M. Karresand IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

The terms used today to categorise different types of software weapons are not really suitable, because there exist several different definitions of each term, many of them contradicting each other. Therefore we present some methods for solving the problem. All the methods are based on a technical description's model of IT weapons (TEBIT), which is a proposed taxonomy of software ...


IEEE Systems, Man and Cybernetics Society Information Assurance Workshop (IEEE Cat. No.03EX676)

IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

The following topic are dealt with: information assurance education; mobile agents; computer viruses; data security; intrusion detection; ad hoc networks; authentication and access control; risk analysis; cryptography.


Research on anomaly behavior blocking method for desktop security

Jing Wang; Chao-Yi Sun; Li Feng; Ti Zhou 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010

Anti-virus software is a most common method for protecting the security of Desktop operating system. However, they fall prey to a number of shortcomings such as fully depend on and need to update the virus-database frequently, long scanning time, and their inability to prevent the unknown attacks. Aiming at these, in this paper we propose a novel anomaly behavior blocking ...


On the optimal control of virus spread in networks

Ali Khanafer; Tamer Başar 2014 7th International Conference on NETwork Games, COntrol and OPtimization (NetGCoop), 2014

We study the design of optimal controllers for virus spread dynamics over undirected networks. The network designer is capable of controlling the curing rates of the nodes, and his objective is to reduce infection across the network at minimum cost. We employ Pontryagin's maximum principle to study the switching behavior of optimal controllers. Further, we propose two static control laws ...


More Xplore Articles

Educational Resources on Viruses

Back to Top

eLearning

An Interferometric Reflectance Imaging Sensor for Point of Care Viral Diagnostics

Alexander P. Reddington; Jacob T. Trueb; David S. Freedman; Ahmet Tuysuzoglu; George G. Daaboul; Carlos A. Lopez; W. Clem Karl; John H. Connor; Helen Fawcett; M. Selim Ünlü IEEE Transactions on Biomedical Engineering, 2013

The use of in vitro diagnostic devices is transitioning from the laboratory to the primary care setting to address early disease detection needs. Time critical viral diagnoses are often made without support due to the experimental time required in today's standard tests. Available rapid point of care (POC) viral tests are less reliable, requiring a follow-on confirmatory test before conclusions ...


Separating Trojan horses, viruses, and worms - a proposed taxonomy of software weapons

M. Karresand IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

The terms used today to categorise different types of software weapons are not really suitable, because there exist several different definitions of each term, many of them contradicting each other. Therefore we present some methods for solving the problem. All the methods are based on a technical description's model of IT weapons (TEBIT), which is a proposed taxonomy of software ...


IEEE Systems, Man and Cybernetics Society Information Assurance Workshop (IEEE Cat. No.03EX676)

IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

The following topic are dealt with: information assurance education; mobile agents; computer viruses; data security; intrusion detection; ad hoc networks; authentication and access control; risk analysis; cryptography.


Research on anomaly behavior blocking method for desktop security

Jing Wang; Chao-Yi Sun; Li Feng; Ti Zhou 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010

Anti-virus software is a most common method for protecting the security of Desktop operating system. However, they fall prey to a number of shortcomings such as fully depend on and need to update the virus-database frequently, long scanning time, and their inability to prevent the unknown attacks. Aiming at these, in this paper we propose a novel anomaly behavior blocking ...


On the optimal control of virus spread in networks

Ali Khanafer; Tamer Başar 2014 7th International Conference on NETwork Games, COntrol and OPtimization (NetGCoop), 2014

We study the design of optimal controllers for virus spread dynamics over undirected networks. The network designer is capable of controlling the curing rates of the nodes, and his objective is to reduce infection across the network at minimum cost. We employ Pontryagin's maximum principle to study the switching behavior of optimal controllers. Further, we propose two static control laws ...


More eLearning Resources

IEEE-USA E-Books

  • Synthetic Biology: Synthesis and Modification of a Chemical Called Poliovirus

    This chapter contains sections titled: Introduction The Synthesis of Poliovirus The Response to the Poliovirus Synthesis Application of the Strategy of Whole Genome Synthesis to Viruses Conclusion Acknowledgments References

  • Appendix B: Codes of Ethics

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Computer Viruses as Artificial Life

    There has been considerable interest in computer viruses since they first appeared in 1981, and especially in the past few years as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed computing environment. However, only recently have some scientists begun to ask if computer viruses are not a form of artificial life--a self-replicating organism. Simply because computer viruses do not exist as organic molecules may not be sufficient reason to dismiss the classification of this form of "vandalware" as a form of life. This paper begins with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of artificial life and self-organizing systems. The paper concludes with some comments directed toward the definition of artificially "alive" systems and experimentation.

  • Hierarchical Artificial Immune Model

    As viruses become more complex, current anti-virus methods are inefficient to detect various forms of viruses, especially new variants and unknown viruses. This chapter proposes a hierarchical artificial immune model (HAIM) for virus detection to overcome three specific shortcomings in traditional artificial immune system (AIS) models: randomly generating the detectors leading to the bad efficiency; poor generalization and poor performance with a big dataset; and ignoring the relevance between different extracted signatures in one virus. The virus gene library generating module works on the training set consisting of legal and virus programs. The model can obtain the frequency information of deoxyribonucleotides (ODN) appearing in the legal and virus programs. Finally, classification decision is an overall behavior that greatly reduces the information loss. The model can effectively and efficiently recognize obfuscated virus, detect new variants of known virus and some unknown viruses.

  • Appendix C: Pointers to Additional Resources

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • About the Editor

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Cache Poisoning Defenses

    The primary attack vector for poisoning domain name system (DNS) cache consists of an attacker manipulating DNS responses by sending numerous answers to a given query with varying IP and DNS header parameters. A high volume of incoming DNS answers disproportionate to outgoing queries could indicate a cache poisoning attack. Upon detection of an attack, user should attempt to identify the source of the attack and if possible, block the sender. Antivirus and anti???malware defenses for end user devices can help reduce the incidence of known viruses and malware from instigating a cache poisoning attack against the recursive servers. The definitive solution to cache poisoning attacks requires the authentication of each DNS query answer as having been published by the authoritative domain owner. DNS security extensions (DNSSEC) specifications provide for query answer authentication as well as data integrity validation to assure no manipulation of query answers en route to the validating resolver.

  • Malware Detection System Using Affinity Vectors

    This chapter proposes an immune-based virus detection system using affinity vectors (IVDS) based on the negative selection and clonal selection algorithms in artificial immune system (AIS). AVDS first generates the detector set from virus files in dataset, negative selection is used to eliminate autoimmunity detectors for the detector set, while clonal selection is exploited to increase the diversity of the detector set in the non-self space. The affinity vectors of the training set and the testing set are used to train and test classifiers, respectively. Finally, based on the affinity vectors, three classic classifiers, that is, Support Vector Machine (SVM), radial basis kernel function (RBF) network and k-nearest neighbor (KNN), are used to verify the performance of the model. Experimental results showed that the IVDS with the rbf-SVM classifier has a strong generalization ability with a low false positive rate in detecting unknown viruses.

  • Index

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.



Standards related to Viruses

Back to Top

No standards are currently tagged "Viruses"