Conferences related to Viruses

Back to Top

2020 IEEE International Conference on Plasma Science (ICOPS)

IEEE International Conference on Plasma Science (ICOPS) is an annual conference coordinated by the Plasma Science and Application Committee (PSAC) of the IEEE Nuclear & Plasma Sciences Society.


2019 41st Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops andinvitedsessions of the latest significant findings and developments in all the major fields ofbiomedical engineering.Submitted papers will be peer reviewed. Accepted high quality paperswill be presented in oral and postersessions, will appear in the Conference Proceedings and willbe indexed in PubMed/MEDLINE & IEEE Xplore


2019 IEEE 16th International Symposium on Biomedical Imaging (ISBI)

The IEEE International Symposium on Biomedical Imaging (ISBI) is the premier forum for the presentation of technological advances in theoretical and applied biomedical imaging.ISBI 2019 will be the 16th meeting in this series. The previous meetings have played a leading role in facilitating interaction between researchers in medical and biological imaging. The 2019 meeting will continue this tradition of fostering cross fertilization among different imaging communities and contributing to an integrative approach to biomedical imaging across all scales of observation.

  • 2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI 2018)

    The IEEE International Symposium on Biomedical Imaging (ISBI) is the premier forum for the presentation of technological advances in theoretical and applied biomedical imaging. ISBI 2018 will be the 15th meeting in this series. The previous meetings have played a leading role in facilitating interaction between researchers in medical and biological imaging. The 2018 meeting will continue this tradition of fostering crossfertilization among different imaging communities and contributing to an integrative approach to biomedical imaging across all scales of observation.

  • 2017 IEEE 14th International Symposium on Biomedical Imaging (ISBI 2017)

    The IEEE International Symposium on Biomedical Imaging (ISBI) is the premier forum for the presentation of technological advances in theoretical and applied biomedical imaging. ISBI 2017 will be the 14th meeting in this series. The previous meetings have played a leading role in facilitating interaction between researchers in medical and biological imaging. The 2017 meeting will continue this tradition of fostering crossfertilization among different imaging communities and contributing to an integrative approach to biomedical imaging across all scales of observation.

  • 2016 IEEE 13th International Symposium on Biomedical Imaging (ISBI 2016)

    The IEEE International Symposium on Biomedical Imaging (ISBI) is the premier forumfor the presentation of technological advances in theoretical and applied biomedical imaging. ISBI 2016 willbe the thirteenth meeting in this series. The previous meetings have played a leading role in facilitatinginteraction between researchers in medical and biological imaging. The 2016 meeting will continue thistradition of fostering crossfertilization among different imaging communities and contributing to an integrativeapproach to biomedical imaging across all scales of observation.

  • 2015 IEEE 12th International Symposium on Biomedical Imaging (ISBI 2015)

    The IEEE International Symposium on Biomedical Imaging (ISBI) is the premier forum for the presentation of technological advances in theoretical and applied biomedical imaging. ISBI 2015 will be the 12th meeting in this series. The previous meetings have played a leading role in facilitating interaction between researchers in medical and biological imaging. The 2014 meeting will continue this tradition of fostering crossfertilization among different imaging communities and contributing to an integrative approach to biomedical imaging across all scales of observation.

  • 2014 IEEE 11th International Symposium on Biomedical Imaging (ISBI 2014)

    The IEEE International Symposium on Biomedical Imaging (ISBI) is the premier forum for the presentation of technological advances in theoretical and applied biomedical imaging. ISBI 2014 will be the eleventh meeting in this series. The previous meetings have played a leading role in facilitating interaction between researchers in medical and biological imaging. The 2014 meeting will continue this tradition of fostering crossfertilization among different imaging communities and contributing to an integrative approach to biomedical imaging across all scales of observation.

  • 2013 IEEE 10th International Symposium on Biomedical Imaging (ISBI 2013)

    To serve the biological, biomedical, bioengineering, bioimaging and other technical communities through a quality program of presentations and papers on the foundation, application, development, and use of biomedical imaging.

  • 2012 IEEE 9th International Symposium on Biomedical Imaging (ISBI 2012)

    To serve the biological, biomedical, bioengineering, bioimaging, and other technical communities through a quality program of presentations and papers on the foundation, application, development, and use of biomedical imaging.

  • 2011 IEEE 8th International Symposium on Biomedical Imaging (ISBI 2011)

    To serve the biological, biomedical, bioengineering, bioimaging, and other technical communities through a quality program of presentations and papers on the foundation, application, development, and use of biomedical imaging.

  • 2010 IEEE 7th International Symposium on Biomedical Imaging (ISBI 2010)

    To serve the biological, biomedical, bioengineering, bioimaging, and other technical communities through a quality program of presentations and papers on the foundation, application, development, and use of biomedical imaging.

  • 2009 IEEE 6th International Symposium on Biomedical Imaging (ISBI 2009)

    Algorithmic, mathematical and computational aspects of biomedical imaging, from nano- to macroscale. Topics of interest include image formation and reconstruction, computational and statistical image processing and analysis, dynamic imaging, visualization, image quality assessment, and physical, biological and statistical modeling. Molecular, cellular, anatomical and functional imaging modalities and applications.

  • 2008 IEEE 5th International Symposium on Biomedical Imaging (ISBI 2008)

    Algorithmic, mathematical and computational aspects of biomedical imaging, from nano- to macroscale. Topics of interest include image formation and reconstruction, computational and statistical image processing and analysis, dynamic imaging, visualization, image quality assessment, and physical, biological and statistical modeling. Molecular, cellular, anatomical and functional imaging modalities and applications.

  • 2007 IEEE 4th International Symposium on Biomedical Imaging: Macro to Nano (ISBI 2007)

  • 2006 IEEE 3rd International Symposium on Biomedical Imaging: Macro to Nano (ISBI 2006)

  • 2004 2nd IEEE International Symposium on Biomedical Imaging: Macro to Nano (ISBI 2004)

  • 2002 1st IEEE International Symposium on Biomedical Imaging: Macro to Nano (ISBI 2002)


2019 IEEE 58th Conference on Decision and Control (CDC)

The CDC is recognized as the premier scientific and engineering conference dedicated to the advancement of the theory and practice of systems and control. The CDC annually brings together an international community of researchers and practitioners in the field of automatic control to discuss new research results, perspectives on future developments, and innovative applications relevant to decision making, systems and control, and related areas.The 58th CDC will feature contributed and invited papers, as well as workshops and may include tutorial sessions.The IEEE CDC is hosted by the IEEE Control Systems Society (CSS) in cooperation with the Society for Industrial and Applied Mathematics (SIAM), the Institute for Operations Research and the Management Sciences (INFORMS), the Japanese Society for Instrument and Control Engineers (SICE), and the European Union Control Association (EUCA).


2019 IEEE SENSORS

The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state-of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors.

  • 2018 IEEE SENSORS

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state -of-the art information including the latest research and development in sensors and their relatedfields. It brings together researchers, developers, and practitioners from diverse fields includinginternational scientists and engineers from academia, research institutes, and companies topresent and discuss the latest results in the general field of sensors.

  • 2017 IEEE SENSORS

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state -of-the art information including the latest research and development in sensors and their relatedfields. It brings together researchers, developers, and practitioners from diverse fields includinginternational scientists and engineers from academia, research institutes, and companies topresent and discuss the latest results in the general field of sensors.

  • 2016 IEEE Sensors

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state -of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors.

  • 2015 IEEE Sensors

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state -of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fieldsincluding international scientists and engineers from academia, research institutes, and companies topresent and discuss the latest results in the general field of sensors.

  • 2014 IEEE Sensors

    The IEEE Sensors Conference is a forum for presentation, discussion, andexchange of state -of-the art information including the latest research and development in sensors andtheir related fields. It brings together researchers, developers, and practitioners from diverse fieldsincluding international scientists and engineers from academia, research institutes, and companies topresent and discuss the latest results in the general field of sensors.

  • 2013 IEEE Sensors

    The IEEE SENSORS Conference is a forum for presentation, discussion, and exchange of state -of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors.

  • 2012 IEEE Sensors

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state-of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors.

  • 2011 IEEE Sensors

    The IEEE Sensors Conference is a forum for presentation, discussion, and exchange of state-of-the art information including the latest research and development in sensors and their related fields. It brings together researchers, developers, and practitioners from diverse fields including international scientists and engineers from academia, research institutes, and companies to present and discuss the latest results in the general field of sensors. IEEE SENSORS 2011 will include keynote addresses by eminen

  • 2010 IEEE Sensors

    The IEEE SENSORS 2010 Conference is a forum for state-of-the-art presentations on sensors and related topics covering from theory to application, device to system, modeling to implementation and from macro/nano to scale.

  • 2009 IEEE Sensors

    IEEE Sensors Conference 2009 is intended to provide a common forum for researchers, scientists, engineers and practitioners throughout the world to present their latest research findings, ideas, developments and applications in the area of sensors and sensing technology. IEEE Sensors Conference 2009 will include keynote addresses by eminent scientists as well as special, regular and poster sessions.

  • 2008 IEEE Sensors

    IEEE SENSORS 2008 solicits original and state-of-the-art contributions to sensors and related topics, covering from theory to application, from device to system, from modeling to implementation, and from macro to micro/nano in scale. Topics of interest include,but are not limitid to: Phenomena, Modeling, and Evaluation (Novel Sensing Principles, Theory and Modeling, Sensors Characterization, Evaluation and Testing, Data Handling and Mining) Chemical and Gas Sensors (Materials, Devices, Electronics N

  • 2007 IEEE Sensors

    IEEE SENSORS 2007 solicits original and state-of-the-art contributions to sensors and related topics, covering from theory to application, from device to system, from modeling to implementation, and from macro to micro/nano in scale.

  • 2006 IEEE Sensors

  • 2005 IEEE Sensors

  • 2004 IEEE Sensors

  • 2003 IEEE Sensors

  • 2002 IEEE Sensors


More Conferences

Periodicals related to Viruses

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Computational Biology and Bioinformatics, IEEE/ACM Transactions on

Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals

Most published Xplore authors for Viruses

Back to Top

No authors for "Viruses"


Xplore Articles related to Viruses

Back to Top

IEE Colloquium on 'Viruses and their Impact on Future Computing Systems' (Digest No.132)

[] IEE Colloquium on Viruses and their Impact on Future Computing Systems, 1990

None


Viruses and their impact on future computing systems

[{u'author_order': 1, u'affiliation': u'Dept. of Comput. Sci., Stirling Univ., UK', u'authorUrl': u'https://ieeexplore.ieee.org/author/37355917800', u'full_name': u'H. Thimbleby', u'id': 37355917800}] IEE Colloquium on Viruses and their Impact on Future Computing Systems, 1990

The impact of computer viruses will be felt in: new hardware, new user interfaces, and new legal frameworks. Much of these developments will obsolete current practice. In particular, any computer system that remains compatible- whether hardware or software-will remain as susceptible to the current computer viruses as before. Thus, one impact of viruses is going to be a new generation ...


Hacking and computer viruses-the legal dimension

[{u'author_order': 1, u'affiliation': u'Sunbury Res. Center, BP Int. Ltd., UK', u'authorUrl': u'https://ieeexplore.ieee.org/author/38226304600', u'full_name': u'M.K.O. Lee', u'id': 38226304600}] IEE Colloquium on Viruses and their Impact on Future Computing Systems, 1990

The threat posed by computer misuse can be countered by security measures and legal measures. Legal deterrences (in the form of relevant legislation) are relatively low-cost but their effectiveness depends on many factors (such as good drafting and successful prosecutions) which cannot be predicted accurately in the short term. The paper discusses legal issues arising from hacking and computer viruses, ...


Network viruses: their working principles and marriages with hacking programs

[{u'author_order': 1, u'affiliation': u'Dept. of Comput. Sci. & Eng., Arkansas Univ., Fayetteville, AR, USA', u'authorUrl': u'https://ieeexplore.ieee.org/author/37421021200', u'full_name': u'Y. Zuo', u'id': 37421021200}, {u'author_order': 2, u'affiliation': u'Dept. of Comput. Sci. & Eng., Arkansas Univ., Fayetteville, AR, USA', u'authorUrl': u'https://ieeexplore.ieee.org/author/37312858900', u'full_name': u'B. Panda', u'id': 37312858900}] IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

We coin the name "network viruses", which refer to those viruses spreading through networks. Security attacks can come from both viruses and hacking programs. A network virus makes use of networking protocols and/or applications to spread. We surveyed several hundreds of computer viruses and classified them based on their spreading and infecting mechanisms. Virus intelligence is introduced to describe the ...


Next-generation viruses present new challenges

[{u'author_order': 1, u'authorUrl': u'https://ieeexplore.ieee.org/author/37362557200', u'full_name': u'J. Edwards', u'id': 37362557200}] Computer, 2001

Computer technology has advanced in many ways, but not all of them have been welcome. One of the more undesirable has been the ongoing advance of virus technology. Taking advantage of emerging computer technologies and techniques, virus writers come up with new ways to defeat existing security software, infect computers, cause damage, and spread their malicious creations. This has become ...


More Xplore Articles

Educational Resources on Viruses

Back to Top

eLearning

No eLearning Articles are currently tagged "Viruses"

IEEE-USA E-Books

  • Computer Viruses as Artificial Life

    There has been considerable interest in computer viruses since they first appeared in 1981, and especially in the past few years as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed computing environment. However, only recently have some scientists begun to ask if computer viruses are not a form of artificial life—a self-replicating organism. Simply because computer viruses do not exist as organic molecules may not be sufficient reason to dismiss the classification of this form of “vandalware” as a form of life. This paper begins with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of artificial life and self-organizing systems. The paper concludes with some comments directed toward the definition of artificially “alive” systems and experimentation.

  • Immune Principle and Neural Networks-Based Malware Detection

    Detection of unknown malware is one of most important tasks in Computer Immune System (CIS) studies. By using nonself detection, diversity of anti-body (Ab) and artificial neural networks (ANN), this chapter proposes an NN-based malware detection algorithm. A number of experiments illustrate that this algorithm has high detection rate with a very low false positive rate. Aiming at automation detection malicious executables, the chapter proposes a novel malware detection algorithm (MDA) based on the immune principle and ANN. Extensive experiments show that the algorithm has a better detection performance than Schultz's method. The first goal is to verify the detection ability of the malware detection algorithm for malicious executables. The experimental results are all scaled with false positive rate (FPR) and detection rate (DR). The second goal is to calculate the probability of the reducing detection hole with the diversity of detectors.

  • Hierarchical Artificial Immune Model

    As viruses become more complex, current anti-virus methods are inefficient to detect various forms of viruses, especially new variants and unknown viruses. This chapter proposes a hierarchical artificial immune model (HAIM) for virus detection to overcome three specific shortcomings in traditional artificial immune system (AIS) models: randomly generating the detectors leading to the bad efficiency; poor generalization and poor performance with a big dataset; and ignoring the relevance between different extracted signatures in one virus. The virus gene library generating module works on the training set consisting of legal and virus programs. The model can obtain the frequency information of deoxyribonucleotides (ODN) appearing in the legal and virus programs. Finally, classification decision is an overall behavior that greatly reduces the information loss. The model can effectively and efficiently recognize obfuscated virus, detect new variants of known virus and some unknown viruses.

  • Malware Detection System Using Affinity Vectors

    This chapter proposes an immune-based virus detection system using affinity vectors (IVDS) based on the negative selection and clonal selection algorithms in artificial immune system (AIS). AVDS first generates the detector set from virus files in dataset, negative selection is used to eliminate autoimmunity detectors for the detector set, while clonal selection is exploited to increase the diversity of the detector set in the non-self space. The affinity vectors of the training set and the testing set are used to train and test classifiers, respectively. Finally, based on the affinity vectors, three classic classifiers, that is, Support Vector Machine (SVM), radial basis kernel function (RBF) network andk-nearest neighbor (KNN), are used to verify the performance of the model. Experimental results showed that the IVDS with the rbf-SVM classifier has a strong generalization ability with a low false positive rate in detecting unknown viruses.

  • 21 Attackers

    In the first two parts of the book, we considered how computer systems work. Then, in the third part, we considered how computer systems fail. Knowing that failures are inevitable, we then looked at ways to tolerate failures by incorporating redundant resources. With appropriate arrangements of those resources, we can ensure that the system continues working despite occasional failures.

  • Host‐Level Threats and Vulnerabilities

    This chapter contains sections titled:BackgroundMalwareEavesdroppingJob FaultsResource StarvationOverflowPrivilege EscalationInjection AttacksConclusionReferences

  • Technologies for Safeguarding Medical Data and Privacy

    None

  • 23 Secrets

    So far, all of our discussion about enforcing trust has assumed that the problem is local. When we are dealing with a single step-taking machine, we can build trust mechanisms that are based on some aspect of that machine's physical implementation. For example, we have described ways in which an interrupt causes the execution of a particular piece of (local) trusted interrupt-handling code (chapter 11). It's also possible to load trusted programs into a particular part of the computer's (local) storage, so that attempts to write into that trusted area are very carefully checked. It's still not possible to avoid all attacks—for example, we have mentioned problems like viruses (chapter 21) and Thompson's hack (chapter 22)—but when everything is local, it is at least easy to distinguish the privileged operating system from an unprivileged ordinary application.

  • Cyber‐Security and Resiliency of Transportation and Power Systems in Smart Cities

    The power grid has become more dependent on information and communication technologies, which puts more emphasis on its cybersecurity. Cyber‐vulnerabilities of the power grid have attracted the attention of many researchers and power systems stakeholders. It has been shown that penetration and propagation of cyberattacks vary depending on the nature of the connected systems. In addition to vulnerabilities of power systems, integration of electric vehicles (EVs) will increase the point of access for users and hence increase security risks. EVs, being the mobile portion of the smart grid, may easily spread worms and viruses in a large geographic area. Alternatively, the cyberattack may be launched in the communication network and target the smart grid infrastructure such as the phasor measurement unit (PMU) networks. Complex networks of advanced sensors such as PMUs are going to be used extensively in the smart grid. PMUs collect voltage phasors in real time to improve the observability of the power grid. The PMU network would be a great target for cyber‐intruders to tamper with the safe and secure operations of the power grid. In this chapter, we introduce the vulnerability of the PMU networks and electric vehicle infrastructure (EVI) to cyberattacks. We also propose response models to increase the resiliency of these complex networks when a cyberattack is detected in the system.

  • Cache Poisoning Defenses

    The primary attack vector for poisoning domain name system (DNS) cache consists of an attacker manipulating DNS responses by sending numerous answers to a given query with varying IP and DNS header parameters. A high volume of incoming DNS answers disproportionate to outgoing queries could indicate a cache poisoning attack. Upon detection of an attack, user should attempt to identify the source of the attack and if possible, block the sender. Antivirus and anti‐malware defenses for end user devices can help reduce the incidence of known viruses and malware from instigating a cache poisoning attack against the recursive servers. The definitive solution to cache poisoning attacks requires the authentication of each DNS query answer as having been published by the authoritative domain owner. DNS security extensions (DNSSEC) specifications provide for query answer authentication as well as data integrity validation to assure no manipulation of query answers en route to the validating resolver.



Standards related to Viruses

Back to Top

No standards are currently tagged "Viruses"


Jobs related to Viruses

Back to Top