Conferences related to Network Security

Back to Top

2014 IEEE International Conference On Cluster Computing (CLUSTER)

IEEE Cluster is the main conference on all aspects of cluster computing for computational science

  • 2013 IEEE International Conference on Cluster Computing (CLUSTER)

    The conference will put special focus on campus clusters as the core of the cyberinfrastructure strategy and also campus bridging. Major topics: Systems design/configuration, tools, software, middleware, alogrithms, applications, storage.

  • 2012 IEEE International Conference on Cluster Computing (CLUSTER)

    Systems Design and Configuration Tools, Systems Software, and Middleware Algorithms, Applications and Performance Storage and File Systems

  • 2011 IEEE International Conference on Cluster Computing (CLUSTER)

    Major topics of interest include, but are not limited to: Systems Design and Configuration; Tools, Systems Software, and Middleware; Algorithms, Applications and Performance; Storage and File Systems

  • 2010 IEEE International Conference on Cluster Computing (CLUSTER)

    Cluster2010 welcomes original unpublished paper and poster submissions from researchers in academia, industry, and government, describing innovative research in the field of cluster and high-performance computing.

  • 2009 IEEE International Conference on Cluster Computing (CLUSTER)

    Cluster 2009 welcomes paper and poster submissions on innovative work from researchers in academia, industry, and government, describing original research in the field of cluster computing.


2014 IEEE Symposium on Security and Privacy (SP)

IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)


2013 ACS International Conference on Computer Systems and Applications (AICCSA)

This International Conference on Computer Systems and Applications (AICCSA) is the premier Computer Science and Engineering Conference in the Middle East and North Africa. It is held every other year in an Arab country and intends to enhance the participation and the contribution of the Arab world in Information Technologies and to maximize its benefits. In general, the scope of AICCSA includes all aspects of the theory and practice of computer science and information technology, but, depending on the needs, specific topics and/or issues might be prioritized.

  • 2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)

    An international conference that covers a broad range of information technology areas including Bioinformatics and Biomedical Engineering, Cloud and Grid Computing, Architecture and Systems, Databases, High Performance Computing, Reconfigurable and GPU Computing,Computer Networks and Security, Energy Efficient Computing, Wireless Systems and Sensor Networks.

  • 2010 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)

    AICCSA is the premier Computer Science and Engineering Conference in the Middle East and North Africa covering new advances in computer systems and their applications. Papers will cover the theoretical, conceptual, descriptive in nature, or a survey of the state of the art.

  • 2009 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)

    ICCSA is the premier Computer Science and Engineering Conference in the Middle East and North Africa


2013 Eighth International Conference on Digital Information Management (ICDIM)

The principal aim of this conference is to bring people in academia, research laboratories and industry together, and offer a collaborative platform to address the emerging issues and solutions in digital information science and technology. The ICDIM intends to bridge the gap between different areas of digital information management, science and technology.

  • 2012 Seventh International Conference on Digital Information Management (ICDIM)

    The principal aim of this conference is to bring people in academia, research laboratories and industry together, and offer a collaborative platform to address the emerging issues and solutions in digital information science and technology.

  • 2011 Sixth International Conference on Digital Information Management (ICDIM)

    The ICDIM 2011 is a forum of academic and industrial researchers and scientists in digital information management and technology. It addresses the research in significant areas of information management, database management, and process management.

  • 2010 Fifth International Conference on Digital Information Management (ICDIM)

    The International Conference on Digital Information Management is a multidisciplinary conference on digital information management, science and technology.

  • 2009 Fourth International Conference on Digital Information Management (ICDIM)

    he principal aim of this conference is to bring people in academia, research laboratories and industry and offer a collaborative platform to address the emerging issues and solutions in digital information science and technology. The ICDIM intends to bridge the gap between different areas of digital information management, science and technology. This forum will address a large number of themes and issues. The conference will have original research and industrial papers on the theory, design and implementat

  • 2008 Third International Conference on Digital Information Management (ICDIM)

    The International Conference on Digital Information Management is a multidisciplinary conference on digital information management, science and technology. The principal aim of this conference is to bring people in academia, research laboratories and industry and offer a collaborative platform to address the emerging issues and solutions in digital information science and technology. The ICDIM intends to bridge the gap between different areas of digital information management, science and technology. This f


2013 IEEE 10th International Conference on Networking, Sensing and Control (ICNSC)

The main theme of the conference is Technology for efficient green networks . It will provide a remarkable opportunity for the academic and industrial communities to address new challenges and share solutions, and discuss future research directions.

  • 2012 9th IEEE International Conference on Networking, Sensing and Control (ICNSC)

    This conference will provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions in the area of intelligent transportation systems and networks as well other areas of networking, sensing and control. It will feature plenary speeches, industrial panel sessions, funding agency panel sessions, interactive sessions, and invited/special sessions. Contributions are expected from academia, industry, and government agencies.

  • 2011 IEEE International Conference on Networking, Sensing and Control (ICNSC)

    The main theme of the conference is Next Generation Infrastructures . Infrastructures are the backbone of the economy and society. Especially the network bound infrastructures operated by public utilities and network industries provide essential services that are enabling for almost every economic and social activity. The crucial role of the infrastructure networks for energy and water supply, transportation of people and goods, and provision of telecommunication and information services.

  • 2010 International Conference on Networking, Sensing and Control (ICNSC)

    Provide a remarkable opportunity for the academic and industrial community to address new challenges and share solutions, and discuss future research directions.

  • 2009 International Conference on Networking, Sensing and Control (ICNSC)

    The main theme of the conference is advanced technologies for safety and functional maintenance. The real challenge is to obtain advanced control technology for safety and management technology and to construct an information system to share information on safetytechnology and on investigated accidents.


More Conferences

Periodicals related to Network Security

Back to Top

Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Latin America Transactions, IEEE (Revista IEEE America Latina)

The IEEE Region 9 is releasing the IEEE Latin America Transactions to enable the publication of non-published and technically excellent papers from Latin American engineers, in Spanish or Portuguese languages. Engineers and researchers from Portugal and Spain (and others countries with the same language) are also very welcome to submit their proposals.


Power Delivery, IEEE Transactions on

Research, development, design, application, construction, the installation and operation of apparatus, equipment, structures, materials, and systems for the safe, reliable, and economic delivery and control of electric energy for general industrial, commercial, public, and domestic consumption.


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Selected Areas in Communications, IEEE Journal on

All telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space, and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; communication theory; and wireless communications.


More Periodicals

Most published Xplore authors for Network Security

Back to Top

Xplore Articles related to Network Security

Back to Top

Histogram cloning and CuSum: An experimental comparison between different approaches to Anomaly Detection

Christian Callegari; Stefano Giordano; Michele Pagano 2015 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), 2015

Due to the proliferation of new threats from spammers, attackers, and criminal enterprises, Anomaly-based Intrusion Detection Systems have emerged as a key element in network security and different statistical approaches have been considered in the literature. To cope with scalability issues, random aggregation through the use of sketches seems to be a powerful prefiltering stage that can be applied to ...


Corporate network security

R. Oppliger; D. Hogrefe Networks, 1993. International Conference on Information Engineering '93. 'Communications and Networks for the Year 2000', Proceedings of IEEE Singapore International Conference on, 1993

The current, widespread use of computer networks has led to increased concerns about security. This paper deals with network security in general, and concentrates on corporate networks in particular. Passive and active attacks are outlined. Counter-measures to prevent corporate networks from being attacked are discussed. The security architecture for OSI networks is introduced. This architecture might be of interest for ...


The effects of loss profiles in interdependent network security

C. F. Larry Heimann; Alan Nochenson World Congress on Internet Security (WorldCIS-2012), 2012

Although system administrators are frequently urged to protect the machines in their network, the fact remains that the decision to mandate protection is far from universal. To better understand this decision, we formulate a model of interdependent network security where there is a system administrator responsible for a network of size n against autonomous attackers attempting to penetrate the network ...


HotSel: A Hot Spot Selection Algorithm for Internet Access in Rural Areas through Nanosatellite Networks

Marco Cello; Mario Marchese; Fabio Patrone 2015 IEEE Global Communications Conference (GLOBECOM), 2015

Nowadays, to benefit from Internet access is so easy in some areas of the world as difficult in others. There are some different projects whose purpose is to extend Internet access to areas which do not have it yet. Each of these projects has unique characteristics that distinguish it from others (different transmission channels, different devices used, dots). One possible ...


Securing MPLS Networks with Multi-path Routing

Sahel Alouneh; Abdeslam En-Nouaary; Anjali Agarwal Information Technology, 2007. ITNG '07. Fourth International Conference on, 2007

MPLS network architecture does not protect the confidentiality of data transmitted. This paper proposes a mechanism to enhance the security in MPLS networks by using multi-path routing combined with a modified (k, n) threshold secret sharing scheme. An IP packet entering MPLS ingress router can be partitioned into n shadow (share) packets, which are then assigned to maximally-node disjoint paths ...


More Xplore Articles

Educational Resources on Network Security

Back to Top

eLearning

Histogram cloning and CuSum: An experimental comparison between different approaches to Anomaly Detection

Christian Callegari; Stefano Giordano; Michele Pagano 2015 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), 2015

Due to the proliferation of new threats from spammers, attackers, and criminal enterprises, Anomaly-based Intrusion Detection Systems have emerged as a key element in network security and different statistical approaches have been considered in the literature. To cope with scalability issues, random aggregation through the use of sketches seems to be a powerful prefiltering stage that can be applied to ...


Corporate network security

R. Oppliger; D. Hogrefe Networks, 1993. International Conference on Information Engineering '93. 'Communications and Networks for the Year 2000', Proceedings of IEEE Singapore International Conference on, 1993

The current, widespread use of computer networks has led to increased concerns about security. This paper deals with network security in general, and concentrates on corporate networks in particular. Passive and active attacks are outlined. Counter-measures to prevent corporate networks from being attacked are discussed. The security architecture for OSI networks is introduced. This architecture might be of interest for ...


The effects of loss profiles in interdependent network security

C. F. Larry Heimann; Alan Nochenson World Congress on Internet Security (WorldCIS-2012), 2012

Although system administrators are frequently urged to protect the machines in their network, the fact remains that the decision to mandate protection is far from universal. To better understand this decision, we formulate a model of interdependent network security where there is a system administrator responsible for a network of size n against autonomous attackers attempting to penetrate the network ...


HotSel: A Hot Spot Selection Algorithm for Internet Access in Rural Areas through Nanosatellite Networks

Marco Cello; Mario Marchese; Fabio Patrone 2015 IEEE Global Communications Conference (GLOBECOM), 2015

Nowadays, to benefit from Internet access is so easy in some areas of the world as difficult in others. There are some different projects whose purpose is to extend Internet access to areas which do not have it yet. Each of these projects has unique characteristics that distinguish it from others (different transmission channels, different devices used, dots). One possible ...


Securing MPLS Networks with Multi-path Routing

Sahel Alouneh; Abdeslam En-Nouaary; Anjali Agarwal Information Technology, 2007. ITNG '07. Fourth International Conference on, 2007

MPLS network architecture does not protect the confidentiality of data transmitted. This paper proposes a mechanism to enhance the security in MPLS networks by using multi-path routing combined with a modified (k, n) threshold secret sharing scheme. An IP packet entering MPLS ingress router can be partitioned into n shadow (share) packets, which are then assigned to maximally-node disjoint paths ...


More eLearning Resources

IEEE-USA E-Books

  • DWDM Networks

    This chapter contains sections titled: Introduction The Optical Transport Network DWDM Network Topologies and Restoration Strategies Dispersion Management Bandwidth Management Fiber Span Between Transmitter and Receiver Fault Management Network Security DWDM Network Issues Wireless DWDM Networks Exercises References Standards

  • Front Matter

    The prelims comprise: Half Title Title Copyright Contents List of Figures List of Tables Acronyms Preface

  • SECURITY SYSTEMS DESIGN??-??DESIGNING NETWORK SECURITY

    This chapter first examines protocol layers 1,2, and 3 of the available security mechanisms and explores their deployment possibilities within networking protocols. Network Physical layer media types include: metallic or fiber-optic cables/wires used for interconnecting network elements; radio frequency signals transmitted through air used for wireless communications; or visible, or invisible, laser light signals transmitted through air or water. Within the Data Link layer, the encountered security devices are IEEE 802.1x, IEEE 802. 1ae and IEEE 802.11 WPA and 802.11i. The chapter then considers the security capabilities, uses, and deficiencies for each of these technologies. Next, it covers the advantages and limitations of providing security at the Network layer, via the IP security (IPsec) framework of protocols, for secure channel establishment. Finally, the filtering and inspection of packets are discussed as forms of network and host access control (authorization).

  • APPENDIX N

    This chapter contains sections titled: INTRODUCTION AUDIT CHECKLIST FOR EXTERNAL NETWORK SECURITY

  • Network Security

    This chapter contains sections titled: Introduction Energy Cost of Embedded Security for Wireless Sensor Networks Increasing Authentication and Communication Confidentiality in Wireless Sensor Networks Efficient Pairwise Authentication Protocols for Sensor and Ad Hoc Networks Fast and Scalable Key Establishment in Sensor Networks Weil Pairing-Based Round, Efficient, and Fault-Tolerant Group Key Agreement Protocol for Sensor Networks References

  • Introduction

    The dedicated short-range communication (DSRC) protocol is one of short-range wireless protocols, which is specifically designed for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to enhance the safety and productivity of the transportation system, which is also referred to as an intelligent transportation system (ITS). In vehicular ad hoc networks (VANETs), roadside units (RSUs) can provide assistance in finding a facility such as a restaurant or gas station, and broadcast traffic-related messages such as maximum curve turning speed notifications to give drivers a heads-up. VANETs open up new avenues to create conveniences and safer lifestyles. In order to protect VANET against security and privacy threats, the security mechanisms employed in VANETs should satisfy the following security requirements: authentication, integrity, nonrepudiation, access control and privacy. The following security primitives help securing VANET: primitives for confidentiality, primitives for data integrity and authentication, primitives for nonrepudiation and primitives for privacy.

  • References

    The network economy presents itself in the transactions of electronic commerce, finance, business, and communications. The network economy is also a social condition of discontinuity, indefinite limits, and in-between spaces. In Cornucopia Limited, Richard Coyne uses the liminality of design -- its uneasy position between creativity and commerce -- to explore the network economy. He argues that design, with its open-ended and transgressive explorations, provides a new way to think about the world of commerce; design's inter-territorial precinct, its in-between condition, offers a way to frame the problems of the Internet economy -- for profit vs. for free, private vs. public, security vs. open access, defense vs. permeability.Design, says Coyne, has a natural affinity with the edge condition and the position between polar opposites. Edgy design starts with an idea, brings to mind its opposite, and then works with what emerges from the friction between the two. The designer of a Web portal, for example, might take on the problem of security by focusing on the limits of permeability. Design is edgy, and risky, argues Coyne, in the same way that breaches in network security are risky. In Cornucopia Limited he examines the threshold between conditions exemplified by the boundary between design and commerce. Coyne uses five metaphors of design to develop his argument: the household (in economics, historically opposed to the market), with its relationship to the street mediated by various portals; the machine, rampant and glitchy; the game, competitive but simulated; the gift, precursor to commerce; and the threshold. The threshold condition, Coyne says, is the site of edgy design and a portal into the new. The threshold, he argues, provides the most potent metaphor for u nderstanding the liminal dwellers of the network economy.

  • Part Four Trust, Anonymity, and Privacy

    No abstract.

  • Part One Introduction

    No abstract.

  • Portraits Gallery

    "Meet the challenge of protecting your telecommunications network management system with SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT. Leading expert Moshe Rozenblit explains pertinent security-related features to use in your products and offers practical solutions to enable you to plan, implement, and manage the evolution of your network security mechanisms and to better manage security components from several suppliers to ensure overall security of your network management. This book provides a comprehensive discussion of security for telecommunications network management including these featured topics: * Overview of network management for security professionals * Introduction to security mechanisms for network managers * A complete account of OSI-based security management * In-depth analysis of security operations for telecommunications networks * Insights into how to integrate security of network management, management of security-related information, and network operations * The latest security for all standard protocols used in network management: CMIP, CORBA, EDI, and SNMP * Astute comparison of security options and their tradeoffs. SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT is intended to assist network architects, operations planners, system designers, software engineers, and operation systems developers in understanding and addressing the security implications of the telecommunications network (TMN) in the telecommunications industry, as well as in finance, large manufacturing, military, and government environments."



Standards related to Network Security

Back to Top

IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


IEEE Standard Specifications for Public-Key Cryptography

Specifications of common public-key cryptographic techniques, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys.


IEEE Standard Specifications for Public-Key Cryptography - Amendment 1: Additional Techniques

Specifications of common public-key cryptographic techniques supplemental to those considered in IEEE Std 1363-2000, including mathematical primitives for secret value (key) derivation, public-key encryption, digital signatures, and identification, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is not restricted.


Standard for a Protection Profile in Operational Environment B

Standard for a Protection Profile for Hardcopy Devices in a commercial information processing environment in which a moderate level of document security, network security, and security assurance, are required. Typically, the day-to-day proprietary and non-proprietary information needed to operate an enterprise will be handled by this environment. This environment will be known as Operational Environment B.""


More Standards