Conferences related to Network Security

Back to Top

2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

Promote the exchange of ideas between academia and industry in the field of computer and networks dependability


2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2018 26th Signal Processing and Communications Applications Conference (SIU)

The general scope of the conference ranges from signal and image processing to telecommunication, and applications of signal processing methods in biomedical and communication problems.

  • 2017 25th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing and Communication Applications (SIU) conference is the most prominent scientific meeting on signal processing in Turkey bringing together researchers working in signal processing and communication fields. Topics include but are not limited to the areas of research listed in the keywords.

  • 2016 24th Signal Processing and Communication Application Conference (SIU)

    Signal Processing Theory, Statistical Signal Processing, Nonlinear Signal Processing, Adaptive Signal Processing, Array and Multichannel Signal Processing, Signal Processing for Sensor Networks, Time-Frequency Analysis, Speech / Voice Processing and Recognition, Computer Vision, Pattern Recognition, Machine Learning for Signal Processing, Human-Machine Interaction, Brain-Computer Interaction, Signal-Image Acquisition and Generation, image Processing, video Processing, Image Printing and Presentation, Image / Video / Audio browsing and retrieval, Image / Video / Audio Watermarking, Multimedia Signal Processing, Biomedical Signal Processing and Image Processing, Bioinformatics, Biometric Signal-Image Processing and Recognition, Signal Processing for Security and Defense, Signal and Image Processing for Remote Sensing, Signal Processing Hardware, Signal Processing Education, Radar Signal Processing, Communication Theory, Communication Networks, Wireless Communications

  • 2015 23th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing Theory Statistical Signal Processing Nonlinear Signal Processing Adaptive Signal Processing Array and Multichannel Signal Processing Signal Processing for Sensor Networks Time-Frequency Analysis Speech / Voice Processing and Recognition Computer Vision Pattern Recognition Machine Learning for Signal Processing Human-Machine Interaction Brain-Computer Interaction Signal-Image Acquisition and Generation image Processing video Processing Image Printing and Presentation Image / Video / Audio browsing and retrieval Image / Video / Audio Watermarking Multimedia Signal Processing Biomedical Signal Processing and Image Processing Bioinformatics Biometric Signal-Image Processing and Recognition Signal Processing for Security and Defense Signal and Image Processing for Remote Sensing Signal Processing Hardware Signal Processing Education Radar Signal Processing Communication Theory Communication Networks Wireless Communications

  • 2014 22nd Signal Processing and Communications Applications Conference (SIU)

    SIU will be held in Trabzon, Turkey at the Karadeniz Technical University Convention and Exhibition Centre on April 23, 2014. SIU is the largest and most comprehensive technical conference focused on signal processing and its applications in Turkey. Last year there were 500 hundred participants. The conference will feature renowned speakers, tutorials, and thematic workshops. Topics include but are not limited to: Signal Procesing, Image Processing, Communication, Computer Vision, Machine Learning, Biomedical Signal Processing,

  • 2013 21st Signal Processing and Communications Applications Conference (SIU)

    Conference will discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. Conference will also include invited lectures, tutorials and special sessions.

  • 2012 20th Signal Processing and Communications Applications Conference (SIU)

    Conference will discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. Conference will also include invited lectures, tutorials and special sessions.

  • 2011 19th Signal Processing and Communications Applications Conference (SIU)

    Conference will bring together academia and industry professionals as well as students and researchers to present and discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. The Conference will also include invited lectures, tutorials and special sessions.

  • 2010 IEEE 18th Signal Processing and Communications Applications Conference (SIU)

    S1.Theory of Signal-Processing S2.Statistical Signal-Processing S3.Multimedia Signal-Processing S4.Biomedical Signal-Processing S5.Sensor Networks S6.Multirate Signal-Processing S7.Pattern Recognition S8.Computer Vision S9.Adaptive Filters S10.Image/Video/Speech Browsing, Retrieval S11.Speech/Audio Coding S12.Speech Processing S13.Human-Machine Interfaces S14.Surveillance Signal Processing S15.Bioinformatics S16.Self-Learning S17.Signal-Processing Education S18.Signal-Processing Systems S1

  • 2009 IEEE 17th Signal Processing and Communications Applications Conference (SIU)

    The scope of the conference is to cover recent topics in theory and applications of Signal Processing and Communications.

  • 2008 IEEE 16th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing, Image Processing, Speech Processing, Pattern Recognition, Human Computer Interaction, Communication, Video and Speech indexing, Computer Vision, Biomedical Signal Processing

  • 2007 IEEE 15th Signal Processing and Communications Applications (SIU)

  • 2006 IEEE 14th Signal Processing and Communications Applications (SIU)

  • 2005 IEEE 13th Signal Processing and Communications Applications (SIU)

  • 2004 IEEE 12th Signal Processing and Communications Applications (SIU)


More Conferences

Periodicals related to Network Security

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


More Periodicals

Most published Xplore authors for Network Security

Back to Top

No authors for "Network Security"


Xplore Articles related to Network Security

Back to Top

Review of network security risk assessment methods

[{u'author_order': 1, u'affiliation': u'Science and Technology on Complex Electronic System Simulation Laboratory, Equipment Academy, Beijing, China', u'full_name': u'Sun Yang'}, {u'author_order': 2, u'affiliation': u'Science and Technology on Complex Electronic System Simulation Laboratory, Equipment Academy, Beijing, China', u'full_name': u'Xiong Wei'}] 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS), None

The vulnerability of network or information system is the inherent reason for the existence of security risks and security risks. External threats exploit the vulnerability of the network or information system to launch attacks. Therefore, in the field of network security risk assessment technology, security vulnerability analysis takes an important position and is the basis for a network security risk ...


Strategic defense and attack in deception based network security

[{u'author_order': 1, u'affiliation': u'Intelligent Networks Research Group, German Research Center for Artificial Intelligence, Kaiserslautern, Germany', u'full_name': u'Daniel Fraunholz'}, {u'author_order': 2, u'affiliation': u'Intelligent Networks Research Group, German Research Center for Artificial Intelligence, Kaiserslautern, Germany', u'full_name': u'Hans Dieter Schotten'}] 2018 International Conference on Information Networking (ICOIN), None

Prodigious increases in interconnectivity, highly professionalized electronic crime and espionage syndicates expose today's networks and applications to an extensive threat level. Established defense mechanisms hardly cope with this emerging threat landscape. Adversaries implemented counter measures for most defense mechanisms such as polymorphism to circumvent antivirus software, encryption against deep packet inspection and reverse connections to avoid ingress filtering or poorly ...


A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy

[{u'author_order': 1, u'affiliation': u'School of Optical and Electronic Information, Huazhong University of Science and Technology, Wuhan 430074, China.', u'full_name': u'Zhaojun Lu'}, {u'author_order': 2, u'affiliation': u'Department of Electrical and Computer Engineering, University of Maryland at College Park, College Park, MD 20742 USA.', u'full_name': u'Gang Qu'}, {u'author_order': 3, u'affiliation': u'School of Optical and Electronic Information, Huazhong University of Science and Technology, Wuhan 430074, China (e-mail: liuzhenglin@hust.edu.cn).', u'full_name': u'Zhenglin Liu'}] IEEE Transactions on Intelligent Transportation Systems, None

Vehicular ad hoc networks (VANETs) are becoming the most promising research topic in intelligent transportation systems, because they provide information to deliver comfort and safety to both drivers and passengers. However, unique characteristics of VANETs make security, privacy, and trust management challenging issues in VANETs' design. This survey article starts with the necessary background of VANETs, followed by a brief ...


Discussion on Risk Assessment of Network Security Management

[{u'author_order': 1, u'full_name': u'Yalin Ye'}, {u'author_order': 2, u'full_name': u'Lina Yan'}, {u'author_order': 3, u'full_name': u'Weifeng Sun'}, {u'author_order': 4, u'full_name': u'Qian Zhang'}, {u'author_order': 5, u'full_name': u'Ning Wang'}] 2018 10th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), None

Network security risk assessment is necessary to the network security management. This paper analyses the importance of security risk assessment in the network security management, and then discusses the principles, methods and the main steps of security risk assessment. Finally, the main stages and steps of network risk assessment is discussed.


Wireless Network Security Detection System Design Based on Client

[{u'author_order': 1, u'full_name': u'Baiping Li'}, {u'author_order': 2, u'full_name': u'Huawei Yu'}, {u'author_order': 3, u'full_name': u'Fengfeng Tan'}] 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), None

Paper first discusses the development and security safeguard mechanism of WLAN(Wireless Local Area Network).Then it introduces the technical standards of several types of security protocols in the development of WLAN,analyzes the security problems of several standards in application,and finally proposes a Phishing Wi-Fi detection scheme.


More Xplore Articles

Educational Resources on Network Security

Back to Top

eLearning

No eLearning Articles are currently tagged "Network Security"

IEEE-USA E-Books

  • Network Security and Privacy for Cyber‐Physical Systems

    Cyber‐physical systems (CPSs) are expected to collect, process, and exchange data that regularly contain sensitive information. CPSs may, for example, involve a person in the privacy of her home or convey business secrets in production plants. Hence, confidentiality, integrity, and authenticity are of utmost importance for secure and privacy‐preserving CPSs. In this chapter, we present and discuss emerging security and privacy issues in CPSs and highlight challenges as well as opportunities for building and operating these systems in a secure and privacy‐preserving manner. We focus on issues that are unique to CPSs, for example, resulting from the resource constraints of the involved devices and networks, the limited configurability of these devices, and the expected ubiquity of the data collection of CPSs. The covered issues impact the security and privacy of CPSs from local networks to Cloud‐based environments.

  • Software Defined Mobile Network Security

    Digital transformation has changed our lives; it has become more critical and challenging to protect our data, keep our privacy, and secure our mobile networks. Threat landscape has evolved for telecommunication industry with more sophisticated and advanced threats. Legacy security model, techniques, and tools may fail to offer necessary protection in an all‐IP mobile network. Security needs to be inclusive and intrinsic. SDMN can offer the required visibility, intelligence, and control to mitigate threats in real time.

  • Network Security

    This chapter contains sections titled: Introduction Network Attacks and Security Issues Protection and Prevention Detection Assessment and Response Questions Problems Projects

  • WiMAX Network Security

    This chapter contains sections titled: Introduction WiMAX Network Reference Model The RADIUS Server WiMAX Networking Procedures and Security Further Reading Summary References

  • Introduction to Network Security

    This chapter contains sections titled: Goals of cryptographic protocols Basics and terminology Attack types Defense mechanisms Security protocols Weak authentication techniques Secure DNS

  • An Experimental Comparison of Collaborative Defense Strategies for Network Security

    **This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networks** With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future, pervasive computing and networking research and applications are among the hot topics on the agenda of researchers working on the next generation of mobile communications and networks. This book provides a comprehensive guide to selected topics, both ongoing and emerging, in pervasive computing and networking. It contains contributions from high profile researchers and is edited by leading experts in this field. The main topics covered in the book include pervasive computing and systems, pervasive networking security, and pervasive networking and communication. Key Features: * Discusses existing and emerging communications and compu ing models, design architectures, mobile and pervasive wireless applications, technology and research challenges in pervasive computing systems, networking and communications * Provides detailed discussions of key research challenges and open research issues in the field of autonomic computing and networking * Offers information on existing experimental studies including case studies, implementation test-beds in industry and academia * Includes a set of PowerPoint slides for each chapter for instructors adopting it as a textbook _Pervasive Computing and Networking_ will be an ideal reference for practitioners and researchers working in the areas of communication networking and pervasive computing and networking. It also serves as an excellent textbook for graduate and senior undergraduate courses in computer science, computer engineering, electrical engineering, software engineering, and information engineering and science.

  • Network Security

    This chapter contains sections titled: Security Attacks in WMNs Counter‐Attack Measures Security Schemes in Related Wireless Networks Security Mechanisms for WMNs Multilayer Design for WMN Security

  • Ad Hoc Network Security

    This chapter contains sections titled: Authentication techniques Physical layer attacks Security of application protocols Biometrics‐based key establishment Routing security Broadcast security Secure location verification Security in directional antenna systems Bibliographic comments Exercises

  • Personal Network Security

    This chapter contains sections titled: Device Personalization Establishment of Secure Communication Secure Foreign Communication Anonymity Summary

  • DNS Applications to Improve Network Security

    This chapter discusses some of the ways domain name system (DNS) can be used to help improve the overall network security. Numerous applications are enhanced with DNS, and the chapter discusses security applications where DNS plays a key role. DNS can facilitate safer web browsing by enabling website publishers to post information about their Transaction Layer Security (TLS) credentials, used to authenticate and encrypt "secure HTTP" traffic. The DNS¿¿?based Authentication of Named Entities (DANE) protocol (80, 81) enables access to a website publisher's certificate or certificate authority (CA) information to protect against spoofed certificates or CAs, which can lead to website hijacking unbeknownst to the user/browser. The Sender Policy Framework (SPF) is currently defined in RFC 7208 (89). The SPF attempts to provide validation of what hosts are configured to send email for a given domain. Domain keys identified mail (DKIM) supports data origin authentication and data integrity verification through the use of digital signatures.



Standards related to Network Security

Back to Top

IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


IEEE Standard Specifications for Public-Key Cryptography

Specifications of common public-key cryptographic techniques, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys.


IEEE Standard Specifications for Public-Key Cryptography - Amendment 1: Additional Techniques

Specifications of common public-key cryptographic techniques supplemental to those considered in IEEE Std 1363-2000, including mathematical primitives for secret value (key) derivation, public-key encryption, digital signatures, and identification, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is not restricted.


More Standards