Conferences related to Viruses

Back to Top

2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)

This is a general Electrical and Computer Engineering Conference which encompasses all aspects of these fields.

  • 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)

    On behalf of the organizing committee of the 2012 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), it is with great pleasure to invite you to the 25th anniversary of this conference. CCECE is the annual flagship of IEEE Canada, and over the past 24 years it has been established as a major forum in various areas of electrical and computer engineering for researchers from Canada and around the world. The silver anniversary of CCECE in Montreal is an important milestone in the history of this conference, and the organizing committee members are trying hard to make it a memorable one.

  • 2011 24th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)

    The 2011 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2011) will be held in Niagara Falls, Ontario, Canada from May 8 11, 2011. CCECE 2011 provides a forum for the presentation of electrical and computer engineering research and development from Canada and around the world. Papers are invited, in French or English, for the following symposia.

  • 2010 IEEE 23rd Canadian Conference on Electrical and Computer Engineering - CCECE

    CCECE 2010 provides researchers, students, and practicing professionals in the area of Electrical and Computer Engineering with a Canadian venue in which they can present the latest technological advancements and discoveries. CCECE 2010 will feature papers presented from a broad range of areas in Electrical and Computer Engineering.

  • 2009 IEEE 22nd Canadian Conference on Electrical and Computer Engineering - CCECE

    CCECE provides researchers, students, and practicing professionals in the area of Electrical and Computer Engineering with a Canadian venue in which they can present the latest technological advancements and discoveries. It is also a valuable opportunity to network, exchange ideas, strengthen existing partnerships and foster new collaborations. CCECE 2009 will feature 7 mini-symposia with papers presented from a broad range of areas in Electrical and Computer Engineering. There will be tutorial sessions in

  • 2008 IEEE Canadian Conference on Electrical and Computer Engineering - CCECE

    CCECE 2008 provides a forum for the presentation of electrical and computer engineering research and development from Canada and around the world. There will be eight mini symposia and papers are invited, in French and English, including but not limited to the following topics: Biomedical Engineering, Circuits, Devices and Systems, Communications and Networking, Computer Systems and Applications, Control and Robotics, Emerging Areas, Power Electronics and Systems, Signal and Multimedia Processing.

  • 2007 Canadian Conference on Electrical and Computer Engineering - CCECE

    Brings together researchers working in all areas covered by the IEEE Technical Societies. There is a special emphasis on Communications, Power, Computers, Signal Processing, and Biomedical Engineering.

  • 2006 Canadian Conference on Electrical and Computer Engineering - CCECE

  • 2005 Canadian Conference on Electrical and Computer Engineering - CCECE


2012 8th International Conference on Natural Computation (ICNC)

ICNC is an international forum on intelligent systems inspired from nature, particularly neural, biological, and nonlinear systems, with applications to signal processing, communications, biomedical engineering and more.

  • 2011 Seventh International Conference on Natural Computation (ICNC)

    ICNC is an international forum on intelligent systems inspired from nature, particularly neural, biological, and nonlinear systems, with applications to signal processing, communications, biomedical engineering, and more.

  • 2010 Sixth International Conference on Natural Computation (ICNC)

    ICNC is an international forum on intelligent systems inspired from nature, particularly neural, biological, and nonlinear systems, with applications to signal processing, communications, biomedical engineering, and more.

  • 2007 International Conference on Natural Computation (ICNC)

    ICNC '07 aims to provide a high-level international forum for scientists and researchers to present the state of the art of intelligent methods inspired from nature, including biological, ecological, and physical systems, with applications to data mining, manufacturing, design, reliability, and more. It is an exciting and emerging interdisciplinary area in which a wide range of techniques and methods are being studied for dealing with large, complex, and dynamic problems.


2010 Second International Conference on Computational Intelligence and Natural Computing (CINC)

The CINC 2010 conference provides a forum for engineers and scientists in academia, industry, and government to address profound issues including technical challenges, safety, social, legal, political, and economic issues, and to present and discuss their ideas, results, work in progress and experience on all aspects of computational intelligence and natural computing.



Periodicals related to Viruses

Back to Top

Computational Biology and Bioinformatics, IEEE/ACM Transactions on

Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.


Potentials, IEEE

This award-winning magazine for technology professionals explores career strategies, the latest research and important technical developments. IEEE Potentials covers theories to practical applications and highlights technology's global impact.


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...




Xplore Articles related to Viruses

Back to Top

Assistant detection of skewed data streams classification in cloud security

Qun Song; Jun Zhang; Qian Chi 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, 2010

Data stream in the cloud is characterized by imbalanced distribution and concept drift. To solve the problem of classification of skewed and concept drift data stream in cloud security, we present an one-class classifier dynamic ensemble method which aims at separating virus data, reducing the amount of data analyzed in clouds, improving the efficiency of intrusion detection in cloud security ...


The effects of loss profiles in interdependent network security

C. F. Larry Heimann; Alan Nochenson World Congress on Internet Security (WorldCIS-2012), 2012

Although system administrators are frequently urged to protect the machines in their network, the fact remains that the decision to mandate protection is far from universal. To better understand this decision, we formulate a model of interdependent network security where there is a system administrator responsible for a network of size n against autonomous attackers attempting to penetrate the network ...


A wavelet-based anomaly detection for outbound network traffic

Kriangkrai Limthong; Pirawat Watanapongse; Fukuda Kensuke 8th Asia-Pacific Symposium on Information and Telecommunication Technologies, 2010

Monitoring and detecting network anomalies are indispensable activities for network administrators. Most anomaly detection techniques focus on inbound traffic (traffic from the Internet entering a customer network) rather than outbound traffic. However, anomalous inbound traffic patterns will be significantly different from anomalous outbound traffic. For network operators, outbound traffic is as important as inbound traffic because they can monitor unwanted ...


DAW: A Distributed Antiworm System

Shigang Chen; Yong Tang IEEE Transactions on Parallel and Distributed Systems, 2007

A worm automatically replicates itself across networks and may infect millions of servers in a short period of time. It is conceivable that the cyberterrorists may use a widespread worm to cause major disruption to the Internet economy. Much recent research concentrates on propagation models and early warning, but the defense against worms is largely an open problem. We propose ...


RNA Secondary Structure and Sequence Variability of the 3' End of Strawberry Mild Yellow Edge Virus Genome

Lili Li; Hong-Yi Yang 2009 3rd International Conference on Bioinformatics and Biomedical Engineering, 2009

The specific segment in 3' terminal region of strawberry mild yellow edge virus (SMYEV) genome was amplified by 3' rapid amplification of cDNA ends (RACE). Ten Chinese isolates were sequenced. Sequence analysis of coat protein gene showed nucleotide and deduced amino acid identities ranged from 76.8 to 100% and 86.4 to 100%, respectively. Phylogenetic analysis showed that all isolates of ...


More Xplore Articles

Educational Resources on Viruses

Back to Top

eLearning

Assistant detection of skewed data streams classification in cloud security

Qun Song; Jun Zhang; Qian Chi 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, 2010

Data stream in the cloud is characterized by imbalanced distribution and concept drift. To solve the problem of classification of skewed and concept drift data stream in cloud security, we present an one-class classifier dynamic ensemble method which aims at separating virus data, reducing the amount of data analyzed in clouds, improving the efficiency of intrusion detection in cloud security ...


The effects of loss profiles in interdependent network security

C. F. Larry Heimann; Alan Nochenson World Congress on Internet Security (WorldCIS-2012), 2012

Although system administrators are frequently urged to protect the machines in their network, the fact remains that the decision to mandate protection is far from universal. To better understand this decision, we formulate a model of interdependent network security where there is a system administrator responsible for a network of size n against autonomous attackers attempting to penetrate the network ...


A wavelet-based anomaly detection for outbound network traffic

Kriangkrai Limthong; Pirawat Watanapongse; Fukuda Kensuke 8th Asia-Pacific Symposium on Information and Telecommunication Technologies, 2010

Monitoring and detecting network anomalies are indispensable activities for network administrators. Most anomaly detection techniques focus on inbound traffic (traffic from the Internet entering a customer network) rather than outbound traffic. However, anomalous inbound traffic patterns will be significantly different from anomalous outbound traffic. For network operators, outbound traffic is as important as inbound traffic because they can monitor unwanted ...


DAW: A Distributed Antiworm System

Shigang Chen; Yong Tang IEEE Transactions on Parallel and Distributed Systems, 2007

A worm automatically replicates itself across networks and may infect millions of servers in a short period of time. It is conceivable that the cyberterrorists may use a widespread worm to cause major disruption to the Internet economy. Much recent research concentrates on propagation models and early warning, but the defense against worms is largely an open problem. We propose ...


RNA Secondary Structure and Sequence Variability of the 3' End of Strawberry Mild Yellow Edge Virus Genome

Lili Li; Hong-Yi Yang 2009 3rd International Conference on Bioinformatics and Biomedical Engineering, 2009

The specific segment in 3' terminal region of strawberry mild yellow edge virus (SMYEV) genome was amplified by 3' rapid amplification of cDNA ends (RACE). Ten Chinese isolates were sequenced. Sequence analysis of coat protein gene showed nucleotide and deduced amino acid identities ranged from 76.8 to 100% and 86.4 to 100%, respectively. Phylogenetic analysis showed that all isolates of ...


More eLearning Resources

IEEE-USA E-Books

  • Malware Detection System Using Affinity Vectors

    This chapter proposes an immune-based virus detection system using affinity vectors (IVDS) based on the negative selection and clonal selection algorithms in artificial immune system (AIS). AVDS first generates the detector set from virus files in dataset, negative selection is used to eliminate autoimmunity detectors for the detector set, while clonal selection is exploited to increase the diversity of the detector set in the non-self space. The affinity vectors of the training set and the testing set are used to train and test classifiers, respectively. Finally, based on the affinity vectors, three classic classifiers, that is, Support Vector Machine (SVM), radial basis kernel function (RBF) network and k-nearest neighbor (KNN), are used to verify the performance of the model. Experimental results showed that the IVDS with the rbf-SVM classifier has a strong generalization ability with a low false positive rate in detecting unknown viruses.

  • Hierarchical Artificial Immune Model

    As viruses become more complex, current anti-virus methods are inefficient to detect various forms of viruses, especially new variants and unknown viruses. This chapter proposes a hierarchical artificial immune model (HAIM) for virus detection to overcome three specific shortcomings in traditional artificial immune system (AIS) models: randomly generating the detectors leading to the bad efficiency; poor generalization and poor performance with a big dataset; and ignoring the relevance between different extracted signatures in one virus. The virus gene library generating module works on the training set consisting of legal and virus programs. The model can obtain the frequency information of deoxyribonucleotides (ODN) appearing in the legal and virus programs. Finally, classification decision is an overall behavior that greatly reduces the information loss. The model can effectively and efficiently recognize obfuscated virus, detect new variants of known virus and some unknown viruses.

  • Index

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • About the Editor

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Appendix B: Codes of Ethics

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Appendix C: Pointers to Additional Resources

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Synthetic Biology: Synthesis and Modification of a Chemical Called Poliovirus

    This chapter contains sections titled: Introduction The Synthesis of Poliovirus The Response to the Poliovirus Synthesis Application of the Strategy of Whole Genome Synthesis to Viruses Conclusion Acknowledgments References

  • Computer Viruses as Artificial Life

    There has been considerable interest in computer viruses since they first appeared in 1981, and especially in the past few years as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed computing environment. However, only recently have some scientists begun to ask if computer viruses are not a form of artificial life--a self-replicating organism. Simply because computer viruses do not exist as organic molecules may not be sufficient reason to dismiss the classification of this form of "vandalware" as a form of life. This paper begins with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of artificial life and self-organizing systems. The paper concludes with some comments directed toward the definition of artificially "alive" systems and experimentation.



Standards related to Viruses

Back to Top

No standards are currently tagged "Viruses"