Conferences related to Viruses

Back to Top

2018 7th IEEE International Conference on Biomedical Robotics and Biomechatronics (Biorob)

The RAS/EMBS International Conference on Biomedical Robotics and Biomechatronics - BioRob 2018 - is a joint effort of the two IEEE Societies of Robotics and Automation - RAS - and Engineering in Medicine and Biology - EMBS.BioRob covers both theoretical and experimental challenges posed by the application of robotics and mechatronics in medicine and biology. The primary focus of Biorobotics is to analyze biological systems from a "biomechatronic" point of view, trying to understand the scientific and engineering principles underlying their extraordinary performance. This profound understanding of how biological systems work, behave and interact can be used for two main objectives: to guide the design and fabrication of novel, high performance bio-inspired machines and systems for many different applications; and to develop novel nano, micro-, macro- devices that can act upon, substitute parts of, and assist human beings in prevention, diagnosis, surgery, prosthetics, rehabilitation.


2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

NTMS'2018 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2016 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2015 7th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2015 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2014 6th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2014 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas.

  • 2012 5th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2012 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce

  • 2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2011 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas.

  • 2009 3rd International Conference on New Technologies, Mobility and Security (NTMS)

    New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce

  • 2008 New Technologies, Mobility and Security (NTMS)

    NTMS'2008 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and t


2018 IEEE 10th Sensor Array and Multichannel Signal Processing Workshop (SAM)

The SAM Workshop is an biennial IEEE Signal Processing Society event dedicated to sensor array and multichannel signal processing. It is managed by the Sensor Array and Multichannel Signal Processing Technical Committee of the IEEE Signal Processing Society.


2017 12th International Conference on Computer Engineering and Systems (ICCES)

Computer Engineering and Systems


2017 12th International Conference on Computer Science and Education (ICCSE)

Annual Topics• Big Data • Cloud Computing • Robotics• Internet of Things • Recommendation System• Web Applications• Telemedicine• Massive Open Online CoursesComputer Science• Artificial Intelligence• Software Engineering• Database Technology • Computer Graphics• Computer Application • Control Technology• Systems Engineering • Communication TechnologyEngineering Education• Education Reform and Innovation• Engineering Education Mode• Curricula and Courseware Design • Engineering Training• Life-long Education• Computer Education for Special GroupCross Disciplinary• Mechatronics• Automation• Bio-inspired Engineering

  • 2016 11th International Conference on Computer Science & Education (ICCSE)

    Since 2006, the International Conference on Computer Science and Education (ICCSE) has been held in Xiamen, Wuhan, Kaifeng, Nanning, Hefei, Singapore, Melbourne, Colombo, Vancouver, and Cambridge for ten sessions.The 11th International Conference on Computer Science & Education (ICCSE 2016) will be held in Nagoya University, Nagoya, Japan at August 23-26, 2016, and organized by National Research Council of Computer Education in Colleges & Universities, China (CRC-CE), and technically co-sponsored by the IEEE Nagoya Section.Many internationally renowned experts and IEEE Fellows from the fields of computer, education and control have made brilliant speeches. The visitants and participants include many experts, academics, scientists, technicians and engineers from many well-known domestic and foreign institutions of higher learning, researches and enterprises. These make the conference become a good platform for internationally academic communication.

  • 2015 10th International Conference on Computer Science & Education (ICCSE)

    IEEE CCSE 2015 Topics of interest include:Annual Selected Topics-- Big Data-- Cloud Computing-- Robotics-- Internet of Things-- Recommendation System-- Web Applications-- Telemedicine-- Massive Open Online CoursesComputer Science-- Artificial Intelligence-- Software Engineering-- Database Technology-- Computer Graphics-- Computer Application-- Control Technology-- Systems Engineering-- Communication TechnologyEngineering Education-- Education Reform and Innovation-- Engineering Education Mode-- Curricula and Courseware Design-- Engineering Training-- Life-long Education-- Computer Education for Special GroupInterdisciplinary-- Mechatronics-- Automation-- Bio-inspired Engineering-- Energy Efficiency-- Uncertainty Quantification

  • 2014 9th International Conference on Computer Science & Education (ICCSE)

    ICCSE is an annual conference, to provide more chances for communication of researchers and educators.

  • 2013 8th International Conference on Computer Science & Education (ICCSE)

    Annual selected topics including cloud computing, internet of things, big data, recommendation system, green communication and web application etc. It also covers the topics of interaction between engineering education and computer science.

  • 2012 7th International Conference on Computer Science & Education (ICCSE 2012)

    Annual selected topics including cloud computing, internet of things, recommendation system, green communication and web application etc. It also covers the topics of interaction between engineering education and computer science.

  • 2011 6th International Conference on Computer Science & Education (ICCSE 2011)

    Computer Science: Database Technology, Artificial Intelligence, Computer Architecture, Software Engineering, Computer Graphics, Computer Application, Control Technology, Systems Engineering, Network Technology, Communication Technology, Web Applications. Computer Education.

  • 2010 5th International Conference on Computer Science & Education (ICCSE 2010)

    The main areas addressed by the conference included: (1)Computer Science: Database Technology, Artificial Intelligence, Computer architecture, Software engineering, Computer Graphics, Computer Application , Control Technology, Systems Engineering, Network Technology, Communication Technology 2) Computer Education.

  • 2009 4th International Conference on Computer Science & Education (ICCSE 2009)

    The main areas addressed by the conference included: (1)Computer Science: Database Technology, Artificial Intelligence, Computer architecture, Software engineering, Computer Graphics, Computer Application , Control Technology, Systems Engineering, Network Technology, Communication Technology 2) Computer Education.


More Conferences

Periodicals related to Viruses

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Computational Biology and Bioinformatics, IEEE/ACM Transactions on

Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals


Xplore Articles related to Viruses

Back to Top

A Three-Step Program for Recovering Hackers

Gerard J. Holzmann Computer, 2013

Following a three-step program can help software developers rely less on users to catch their bugs.


Topology dependent information dissemination in P2P networks for anti-entropy algorithms

Emre Iskender; Oznur Ozkasap; Mine Caglar 2008 IEEE 16th Signal Processing, Communication and Applications Conference, 2008

Analyzing the behavior of epidemic spreading in a network is a good way of modeling several network phenomena. There are several studies analyzing the spreading of email viruses. Spreading of epidemics is also a good model for several types of information dissemination in distributed systems. In this study, we examine spreading of epidemics for anti-entropy algorithms in a peer-to-peer network ...


Second Internationa1 Biophysics Congress

IEEE Transactions on Biomedical Engineering, 1967

First Page of the Article ![](/xploreAssets/images/absImages/04502482.png)


Virus analysis: techniques, tools, and research issues tutorial

A. Lakhotia; P. Pathak 11th Working Conference on Reverse Engineering, 2004

The tutorial covers techniques, tools, and research issues in analyzing computer viruses. It provides participants the background needed to initiate research in reverse engineering computer viruses.


Tutorial T1: Designing Secure SoCs

S. Mangard; S. Ravi; A. Raghunathan; S. Mangard; S. Ravi; A. Raghunathan 20th International Conference on VLSI Design held jointly with 6th International Conference on Embedded Systems (VLSID'07), 2007

Information security is a critical concern in a wide range of embedded computing and communications systems. Embedded systems are being used in critical applications (medical electronics, automotive systems, and avionics), where the consequence of security attacks can be severe. Several business models (e.g., distribution of multimedia content, mobile e- commerce, etc.) require an adequate level of security in the associated ...


More Xplore Articles

Educational Resources on Viruses

Back to Top

eLearning

A Three-Step Program for Recovering Hackers

Gerard J. Holzmann Computer, 2013

Following a three-step program can help software developers rely less on users to catch their bugs.


Topology dependent information dissemination in P2P networks for anti-entropy algorithms

Emre Iskender; Oznur Ozkasap; Mine Caglar 2008 IEEE 16th Signal Processing, Communication and Applications Conference, 2008

Analyzing the behavior of epidemic spreading in a network is a good way of modeling several network phenomena. There are several studies analyzing the spreading of email viruses. Spreading of epidemics is also a good model for several types of information dissemination in distributed systems. In this study, we examine spreading of epidemics for anti-entropy algorithms in a peer-to-peer network ...


Second Internationa1 Biophysics Congress

IEEE Transactions on Biomedical Engineering, 1967

First Page of the Article ![](/xploreAssets/images/absImages/04502482.png)


Virus analysis: techniques, tools, and research issues tutorial

A. Lakhotia; P. Pathak 11th Working Conference on Reverse Engineering, 2004

The tutorial covers techniques, tools, and research issues in analyzing computer viruses. It provides participants the background needed to initiate research in reverse engineering computer viruses.


Tutorial T1: Designing Secure SoCs

S. Mangard; S. Ravi; A. Raghunathan; S. Mangard; S. Ravi; A. Raghunathan 20th International Conference on VLSI Design held jointly with 6th International Conference on Embedded Systems (VLSID'07), 2007

Information security is a critical concern in a wide range of embedded computing and communications systems. Embedded systems are being used in critical applications (medical electronics, automotive systems, and avionics), where the consequence of security attacks can be severe. Several business models (e.g., distribution of multimedia content, mobile e- commerce, etc.) require an adequate level of security in the associated ...


More eLearning Resources

IEEE-USA E-Books

  • Technologies for Safeguarding Medical Data and Privacy

    **This book brings together a broad range of topics demonstrating how information and wireless technologies can be used in healthcare** In this book, the authors focus on how medical information can be reliably transmitted through wireless communication networks. It explains how they can be optimized to carry medical information in various situations by utilizing readily available traditional wireless local area network (WLAN) and broadband wireless access (BWA) systems. In addition, the authors discuss consumer healthcare technology, which is becoming more popular as reduction in manufacturing cost of electronics products makes healthcare products more affordable to the general public. Finally, the book explores topics such as communication networks and services, patient monitoring, information processing, system deployment, data security and privacy, information technology in alternative medicine, multimedia and health informatics, and caring for the community. **Key F atures**: •Focuses on the transmission of medical information over wireless communication networks, and addresses topics such as communication networks and services, patient monitoring, information processing, system deployment, data security and privacy, and many others •Provides an in-depth introduction to the various factors that need to be considered for supporting healthcare services with information technology •Covers advancements in topics such as RFID in healthcare •Discusses medical signal processing as well as ECG and signal processing techniques This book will be of interest to advanced students and professors in biomedical engineering, bioinformatics, and information engineering. Medical and IT professionals involved in specifying new facilities, healthcare practitioners in telemedicine, researchers in wireless communications and information technology, and network administrators will also find this book insi htful.

  • Synthetic Biology: Synthesis and Modification of a Chemical Called Poliovirus

    This chapter contains sections titled: * Introduction * The Synthesis of Poliovirus * The Response to the Poliovirus Synthesis * Application of the Strategy of Whole Genome Synthesis to Viruses * Conclusion * Acknowledgments * References

  • Immune Principle and Neural Networks-Based Malware Detection

    Detection of unknown malware is one of most important tasks in Computer Immune System (CIS) studies. By using nonself detection, diversity of anti-body (Ab) and artificial neural networks (ANN), this chapter proposes an NN-based malware detection algorithm. A number of experiments illustrate that this algorithm has high detection rate with a very low false positive rate. Aiming at automation detection malicious executables, the chapter proposes a novel malware detection algorithm (MDA) based on the immune principle and ANN. Extensive experiments show that the algorithm has a better detection performance than Schultz's method. The first goal is to verify the detection ability of the malware detection algorithm for malicious executables. The experimental results are all scaled with false positive rate (FPR) and detection rate (DR). The second goal is to calculate the probability of the reducing detection hole with the diversity of detectors.

  • About the Editor

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Computer Viruses as Artificial Life

    There has been considerable interest in computer viruses since they first appeared in 1981, and especially in the past few years as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed computing environment. However, only recently have some scientists begun to ask if computer viruses are not a form of artificial life--a self-replicating organism. Simply because computer viruses do not exist as organic molecules may not be sufficient reason to dismiss the classification of this form of "vandalware" as a form of life. This paper begins with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of artificial life and self-organizing systems. The paper concludes with some comments directed toward the definition of artificially "alive" systems and experimentation.

  • Cache Poisoning Defenses

    The primary attack vector for poisoning domain name system (DNS) cache consists of an attacker manipulating DNS responses by sending numerous answers to a given query with varying IP and DNS header parameters. A high volume of incoming DNS answers disproportionate to outgoing queries could indicate a cache poisoning attack. Upon detection of an attack, user should attempt to identify the source of the attack and if possible, block the sender. Antivirus and anti¿¿¿malware defenses for end user devices can help reduce the incidence of known viruses and malware from instigating a cache poisoning attack against the recursive servers. The definitive solution to cache poisoning attacks requires the authentication of each DNS query answer as having been published by the authoritative domain owner. DNS security extensions (DNSSEC) specifications provide for query answer authentication as well as data integrity validation to assure no manipulation of query answers en route to the validating resolver.

  • Index

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Host‐Level Threats and Vulnerabilities

    This chapter contains sections titled: Background Malware Eavesdropping Job Faults Resource Starvation Overflow Privilege Escalation Injection Attacks Conclusion References

  • Hierarchical Artificial Immune Model

    As viruses become more complex, current anti-virus methods are inefficient to detect various forms of viruses, especially new variants and unknown viruses. This chapter proposes a hierarchical artificial immune model (HAIM) for virus detection to overcome three specific shortcomings in traditional artificial immune system (AIS) models: randomly generating the detectors leading to the bad efficiency; poor generalization and poor performance with a big dataset; and ignoring the relevance between different extracted signatures in one virus. The virus gene library generating module works on the training set consisting of legal and virus programs. The model can obtain the frequency information of deoxyribonucleotides (ODN) appearing in the legal and virus programs. Finally, classification decision is an overall behavior that greatly reduces the information loss. The model can effectively and efficiently recognize obfuscated virus, detect new variants of known virus and some unknown viruses.

  • Malware Detection System Using Affinity Vectors

    This chapter proposes an immune-based virus detection system using affinity vectors (IVDS) based on the negative selection and clonal selection algorithms in artificial immune system (AIS). AVDS first generates the detector set from virus files in dataset, negative selection is used to eliminate autoimmunity detectors for the detector set, while clonal selection is exploited to increase the diversity of the detector set in the non-self space. The affinity vectors of the training set and the testing set are used to train and test classifiers, respectively. Finally, based on the affinity vectors, three classic classifiers, that is, Support Vector Machine (SVM), radial basis kernel function (RBF) network and k-nearest neighbor (KNN), are used to verify the performance of the model. Experimental results showed that the IVDS with the rbf-SVM classifier has a strong generalization ability with a low false positive rate in detecting unknown viruses.



Standards related to Viruses

Back to Top

No standards are currently tagged "Viruses"