Conferences related to Network Security

Back to Top

2014 IEEE International Conference On Cluster Computing (CLUSTER)

IEEE Cluster is the main conference on all aspects of cluster computing for computational science

  • 2013 IEEE International Conference on Cluster Computing (CLUSTER)

    The conference will put special focus on campus clusters as the core of the cyberinfrastructure strategy and also campus bridging. Major topics: Systems design/configuration, tools, software, middleware, alogrithms, applications, storage.

  • 2012 IEEE International Conference on Cluster Computing (CLUSTER)

    Systems Design and Configuration Tools, Systems Software, and Middleware Algorithms, Applications and Performance Storage and File Systems

  • 2011 IEEE International Conference on Cluster Computing (CLUSTER)

    Major topics of interest include, but are not limited to: Systems Design and Configuration; Tools, Systems Software, and Middleware; Algorithms, Applications and Performance; Storage and File Systems

  • 2010 IEEE International Conference on Cluster Computing (CLUSTER)

    Cluster2010 welcomes original unpublished paper and poster submissions from researchers in academia, industry, and government, describing innovative research in the field of cluster and high-performance computing.

  • 2009 IEEE International Conference on Cluster Computing (CLUSTER)

    Cluster 2009 welcomes paper and poster submissions on innovative work from researchers in academia, industry, and government, describing original research in the field of cluster computing.


2014 IEEE Symposium on Security and Privacy (SP)

IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)


2013 ACS International Conference on Computer Systems and Applications (AICCSA)

This International Conference on Computer Systems and Applications (AICCSA) is the premier Computer Science and Engineering Conference in the Middle East and North Africa. It is held every other year in an Arab country and intends to enhance the participation and the contribution of the Arab world in Information Technologies and to maximize its benefits. In general, the scope of AICCSA includes all aspects of the theory and practice of computer science and information technology, but, depending on the needs, specific topics and/or issues might be prioritized.

  • 2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)

    An international conference that covers a broad range of information technology areas including Bioinformatics and Biomedical Engineering, Cloud and Grid Computing, Architecture and Systems, Databases, High Performance Computing, Reconfigurable and GPU Computing,Computer Networks and Security, Energy Efficient Computing, Wireless Systems and Sensor Networks.

  • 2010 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)

    AICCSA is the premier Computer Science and Engineering Conference in the Middle East and North Africa covering new advances in computer systems and their applications. Papers will cover the theoretical, conceptual, descriptive in nature, or a survey of the state of the art.

  • 2009 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)

    ICCSA is the premier Computer Science and Engineering Conference in the Middle East and North Africa


2013 Eighth International Conference on Digital Information Management (ICDIM)

The principal aim of this conference is to bring people in academia, research laboratories and industry together, and offer a collaborative platform to address the emerging issues and solutions in digital information science and technology. The ICDIM intends to bridge the gap between different areas of digital information management, science and technology.

  • 2012 Seventh International Conference on Digital Information Management (ICDIM)

    The principal aim of this conference is to bring people in academia, research laboratories and industry together, and offer a collaborative platform to address the emerging issues and solutions in digital information science and technology.

  • 2011 Sixth International Conference on Digital Information Management (ICDIM)

    The ICDIM 2011 is a forum of academic and industrial researchers and scientists in digital information management and technology. It addresses the research in significant areas of information management, database management, and process management.

  • 2010 Fifth International Conference on Digital Information Management (ICDIM)

    The International Conference on Digital Information Management is a multidisciplinary conference on digital information management, science and technology.

  • 2009 Fourth International Conference on Digital Information Management (ICDIM)

    he principal aim of this conference is to bring people in academia, research laboratories and industry and offer a collaborative platform to address the emerging issues and solutions in digital information science and technology. The ICDIM intends to bridge the gap between different areas of digital information management, science and technology. This forum will address a large number of themes and issues. The conference will have original research and industrial papers on the theory, design and implementat

  • 2008 Third International Conference on Digital Information Management (ICDIM)

    The International Conference on Digital Information Management is a multidisciplinary conference on digital information management, science and technology. The principal aim of this conference is to bring people in academia, research laboratories and industry and offer a collaborative platform to address the emerging issues and solutions in digital information science and technology. The ICDIM intends to bridge the gap between different areas of digital information management, science and technology. This f


2013 IEEE 10th International Conference on Networking, Sensing and Control (ICNSC)

The main theme of the conference is Technology for efficient green networks . It will provide a remarkable opportunity for the academic and industrial communities to address new challenges and share solutions, and discuss future research directions.

  • 2012 9th IEEE International Conference on Networking, Sensing and Control (ICNSC)

    This conference will provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions in the area of intelligent transportation systems and networks as well other areas of networking, sensing and control. It will feature plenary speeches, industrial panel sessions, funding agency panel sessions, interactive sessions, and invited/special sessions. Contributions are expected from academia, industry, and government agencies.

  • 2011 IEEE International Conference on Networking, Sensing and Control (ICNSC)

    The main theme of the conference is Next Generation Infrastructures . Infrastructures are the backbone of the economy and society. Especially the network bound infrastructures operated by public utilities and network industries provide essential services that are enabling for almost every economic and social activity. The crucial role of the infrastructure networks for energy and water supply, transportation of people and goods, and provision of telecommunication and information services.

  • 2010 International Conference on Networking, Sensing and Control (ICNSC)

    Provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions.

  • 2009 International Conference on Networking, Sensing and Control (ICNSC)

    The main theme of the conference is advanced technologies for safety and functional maintenance. The real challenge is to obtain advanced control technology for safety and management technology and to construct an information system to share information on safetytechnology and on investigated accidents.


More Conferences

Periodicals related to Network Security

Back to Top

Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Latin America Transactions, IEEE (Revista IEEE America Latina)

The IEEE Region 9 is releasing the IEEE Latin America Transactions to enable the publication of non-published and technically excellent papers from Latin American engineers, in Spanish or Portuguese languages. Engineers and researchers from Portugal and Spain (and others countries with the same language) are also very welcome to submit their proposals.


Power Delivery, IEEE Transactions on

Research, development, design, application, construction, the installation and operation of apparatus, equipment, structures, materials, and systems for the safe, reliable, and economic delivery and control of electric energy for general industrial, commercial, public, and domestic consumption.


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Selected Areas in Communications, IEEE Journal on

All telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space, and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; communication theory; and wireless communications.


More Periodicals

Most published Xplore authors for Network Security

Back to Top

Xplore Articles related to Network Security

Back to Top

Unveiling flat traffic on the Internet: An SSH attack case study

Mattijs Jonker; Rick Hofstede; Anna Sperotto; Aiko Pras 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

Many types of brute-force attacks are known to exhibit a characteristic `flat' behavior at the network-level, meaning that connections belonging to an attack feature a similar number of packets and bytes, and duration. Flat traffic usually results from repeating similar application-layer actions, such as login attempts in a brute-force attack. For typical attacks, hundreds of attempts span over multiple connections, ...


Resilient misbehaviour detection MAC protocol (MD-MAC) for distributed wireless networks

Chaminda Alocious; Hannan Xiao; Bruce Christianson 2016 IEEE Wireless Communications and Networking Conference, 2016

Wireless network security requirements are becoming more important and critical. The modern network security architectures require more attention to provide security in each network layer. This will require understanding of protocol vulnerabilities in existing protocol architectures. However, providing security requirements are not just limited to confidentiality and integrity, also availability and fairness are important security elements. IEEE 802.11 MAC protocol ...


An Age-Based Membership Protocol against Strong Churn in Unstructured P2P Networks

Haowen Liu; Xiwen Liu; Wei Song; Weidong Wen 2011 International Conference on Network Computing and Information Security, 2011

Churn refers the continuous process of node arrival and departure in distributed peer-to-peer network. Enormous nodes joining the system concurrently will results in a flash crowd scenario for special nodes in the system, and enormous nodes crashing in a moment might come out a broken network. In fact, the joining and crashing always occur around some nodes at the same ...


How to exchange security events? Overview and evaluation of formats and protocols

Jessica Steinberger; Anna Sperotto; Mario Golling; Harald Baier 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

Network-based attacks pose a strong threat to the Internet landscape. Recent approaches to mitigate and resolve these threats focus on cooperation of Internet service providers and their exchange of security event information. A major benefit of a cooperation is that it might counteract a network-based attack at its root and provides the possibility to inform other cooperative partners about the ...


An optimal statistical test for robust detection against interest flooding attacks in CCN

Tan Nguyen; Remi Cogranne; Guillaume Doyen 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

Confronting the changing demand of users, the current Internet is revealing its limitations. Information Centric Network (ICN) are Future Internet proposals which are based on named data objects. In order to actually replace its predecessor, ICN must be able to resist existent threats in the current Internet, especially the Denial of Service (DoS) attack. In this paper, we focus on ...


More Xplore Articles

Educational Resources on Network Security

Back to Top

eLearning

Unveiling flat traffic on the Internet: An SSH attack case study

Mattijs Jonker; Rick Hofstede; Anna Sperotto; Aiko Pras 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

Many types of brute-force attacks are known to exhibit a characteristic `flat' behavior at the network-level, meaning that connections belonging to an attack feature a similar number of packets and bytes, and duration. Flat traffic usually results from repeating similar application-layer actions, such as login attempts in a brute-force attack. For typical attacks, hundreds of attempts span over multiple connections, ...


Resilient misbehaviour detection MAC protocol (MD-MAC) for distributed wireless networks

Chaminda Alocious; Hannan Xiao; Bruce Christianson 2016 IEEE Wireless Communications and Networking Conference, 2016

Wireless network security requirements are becoming more important and critical. The modern network security architectures require more attention to provide security in each network layer. This will require understanding of protocol vulnerabilities in existing protocol architectures. However, providing security requirements are not just limited to confidentiality and integrity, also availability and fairness are important security elements. IEEE 802.11 MAC protocol ...


An Age-Based Membership Protocol against Strong Churn in Unstructured P2P Networks

Haowen Liu; Xiwen Liu; Wei Song; Weidong Wen 2011 International Conference on Network Computing and Information Security, 2011

Churn refers the continuous process of node arrival and departure in distributed peer-to-peer network. Enormous nodes joining the system concurrently will results in a flash crowd scenario for special nodes in the system, and enormous nodes crashing in a moment might come out a broken network. In fact, the joining and crashing always occur around some nodes at the same ...


How to exchange security events? Overview and evaluation of formats and protocols

Jessica Steinberger; Anna Sperotto; Mario Golling; Harald Baier 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

Network-based attacks pose a strong threat to the Internet landscape. Recent approaches to mitigate and resolve these threats focus on cooperation of Internet service providers and their exchange of security event information. A major benefit of a cooperation is that it might counteract a network-based attack at its root and provides the possibility to inform other cooperative partners about the ...


An optimal statistical test for robust detection against interest flooding attacks in CCN

Tan Nguyen; Remi Cogranne; Guillaume Doyen 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

Confronting the changing demand of users, the current Internet is revealing its limitations. Information Centric Network (ICN) are Future Internet proposals which are based on named data objects. In order to actually replace its predecessor, ICN must be able to resist existent threats in the current Internet, especially the Denial of Service (DoS) attack. In this paper, we focus on ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Network Security"

IEEE-USA E-Books

  • TESLA-based Broadcast Authentication

    This chapter explores ways to use fast symmetric cryptography to protect vehicular communications, but without direct involvement of RSUs. It focuses on the timed efficient stream loss-tolerant authentication (TESLA) authentication protocol, which is commonly used in securing broadcast and multicast communication. In addition, since only a short message authentication code (MAC) tag is attached to each message, the extra message length and the bandwidth overhead due to the security mechanism can be significantly reduced. The chapter presents the design of a TESLA-based broadcast authentication scheme for vehicular communication, termed TSVC. It begins by providing a brief introduction to the techniques used here, which serve as the basis for the proposed scheme, and then presents the scheme. Finally, the chapter analyzes security through rigorous analysis and conducts performance evaluations through extensive simulation.

  • Distributed Cooperative Message Authentication

    This chapter presents an efficient cooperative message authentication scheme that does not directly involve a trusted authority (TA). First, the chapter proposes a cooperative authentication scheme that doesn't involve intervehicle interaction, using extensive simulations to derive the optimal strategy for vehicle users under different parameter settings. In order to resist the free- riding attacks that do not use fake authentication efforts, an evidence-token mechanism is added. The chapter evaluates the performance of the proposed scheme in a simulated VANET environment. In order to present insight into the performance of the proposed secure cooperative authentication scheme, the authors conducted a set of custom simulations using a Java simulator. The simulation settings and the simulation results are presented here. By the proposed scheme, vehicle users can cooperatively authenticate a bunch of message-signature pairs without direct involvement of a TA.

  • Dynamic Network Security Analysis in a Load Dispatch Center

    This chapter contains sections titled: Introduction Siemens Approach to Dynamic Security Assessment Case Studies: Challenges, Implementation Approach, and Solution Features References Annex 8-1. Further Dynamic Simulation Capabilities

  • Introduction

    The dedicated short-range communication (DSRC) protocol is one of short-range wireless protocols, which is specifically designed for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to enhance the safety and productivity of the transportation system, which is also referred to as an intelligent transportation system (ITS). In vehicular ad hoc networks (VANETs), roadside units (RSUs) can provide assistance in finding a facility such as a restaurant or gas station, and broadcast traffic-related messages such as maximum curve turning speed notifications to give drivers a heads-up. VANETs open up new avenues to create conveniences and safer lifestyles. In order to protect VANET against security and privacy threats, the security mechanisms employed in VANETs should satisfy the following security requirements: authentication, integrity, nonrepudiation, access control and privacy. The following security primitives help securing VANET: primitives for confidentiality, primitives for data integrity and authentication, primitives for nonrepudiation and primitives for privacy.

  • Context-aware Cooperative Authentication

    Many trusted security mechanisms and protocols have been developed to protect messages over vehicular ad hoc networks (VANETs), and to ensure the integrity and origin of messages. This chapter focuses on the trustworthiness of emergency messages in VANETs. In most cases, a VANET performs message propagation via multihop transmission, particularly in suburban areas where fewer roadside unit (RSUs) are installed. The chapter examines context-aware ways to protect some specific types of messages in VANETs while considering their unique requirements. It demonstrates that the proposed scheme can dramatically reduce both computation and transmission overhead in achieving efficient and effective authentication of emergency messages. The chapter describes the system model and the attack model, and discusses the security and efficiency design goals of the aggregated emergency message authentication and trustworthiness (AEMAT) scheme. It finally evaluates the performance of the proposed AEMAT scheme in terms of the resultant communication cost and computation overhead.

  • References

    The network economy presents itself in the transactions of electronic commerce, finance, business, and communications. The network economy is also a social condition of discontinuity, indefinite limits, and in-between spaces. In Cornucopia Limited, Richard Coyne uses the liminality of design -- its uneasy position between creativity and commerce -- to explore the network economy. He argues that design, with its open-ended and transgressive explorations, provides a new way to think about the world of commerce; design's inter-territorial precinct, its in-between condition, offers a way to frame the problems of the Internet economy -- for profit vs. for free, private vs. public, security vs. open access, defense vs. permeability.Design, says Coyne, has a natural affinity with the edge condition and the position between polar opposites. Edgy design starts with an idea, brings to mind its opposite, and then works with what emerges from the friction between the two. The designer of a Web portal, for example, might take on the problem of security by focusing on the limits of permeability. Design is edgy, and risky, argues Coyne, in the same way that breaches in network security are risky. In Cornucopia Limited he examines the threshold between conditions exemplified by the boundary between design and commerce. Coyne uses five metaphors of design to develop his argument: the household (in economics, historically opposed to the market), with its relationship to the street mediated by various portals; the machine, rampant and glitchy; the game, competitive but simulated; the gift, precursor to commerce; and the threshold. The threshold condition, Coyne says, is the site of edgy design and a portal into the new. The threshold, he argues, provides the most potent metaphor for u nderstanding the liminal dwellers of the network economy.

  • GSIS: Group Signature and ID-based Signature-Based Secure and Privacy-Preserving Protocol

    This chapter examines the problem of security assurance and conditional privacy preservation in vehicular communication applications. It introduces a novel security and privacy preserving protocol for vehicular ad hoc networks (VANETs), called GSIS, by integrating the techniques of group signature and identity-based signature. Security problems are divided into two aspects: security and privacy preservation among multiple on-board units (OBUs), as well as that between OBUs and roadside units (RSUs), in light of their different design requirements. Simulation is conducted to verify the efficiency of the proposed secure protocol for Intervehicle communications (IVC) applications with ns-2. An important factor that determines the performance of a security protocol is the latency utilized by the cryptographic operations in the protocol. The chapter evaluates the efficiency of membership revocation and tracing schemes in the proposed protocol. With the identity-based signature, the management complexity on public key and certificate can be further reduced.

  • Frontmatter

    The prelims comprise: Half Title Title Copyright Dedication Contents Preface Contributors

  • Next-Generation Networks

    This chapter contains sections titled: Framework and Topology of the NGN The NGN Functional Reference Model Relationship between NGN Transport and Service Domains Enterprise Role Model Security Allocation within the NGN Transport Stratum Example Converged Network Management (TMN and eTOM) General Network Security Architectures Chapter Summary Further Reading and Resources Exercises

  • Bluetooth Security

    This chapter contains sections titled: Introduction Bluetooth Wireless Technology Security Architecture Security Weaknesses and Countermeasures Bluetooth Security: What Comes Next? References



Standards related to Network Security

Back to Top

IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


IEEE Standard Specifications for Public-Key Cryptography

Specifications of common public-key cryptographic techniques, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys.


IEEE Standard Specifications for Public-Key Cryptography - Amendment 1: Additional Techniques

Specifications of common public-key cryptographic techniques supplemental to those considered in IEEE Std 1363-2000, including mathematical primitives for secret value (key) derivation, public-key encryption, digital signatures, and identification, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is not restricted.


Standard for a Protection Profile in Operational Environment B

Standard for a Protection Profile for Hardcopy Devices in a commercial information processing environment in which a moderate level of document security, network security, and security assurance, are required. Typically, the day-to-day proprietary and non-proprietary information needed to operate an enterprise will be handled by this environment. This environment will be known as Operational Environment B.""


More Standards