Conferences related to National Security

Back to Top

2013 IEEE Aerospace Conference

The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors. The annual, weeklong conference, set in a stimulating and thought -provoking environment, is designed for aerospace experts, academics, military personnel, and industry leaders.

  • 2012 IEEE Aerospace Conference

    The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors. The annual, weeklong conference, set in a stimulating and thought-provoking environment, is designed for aerospace experts, academics, military personnel, and industry leaders.

  • 2011 IEEE Aerospace Conference

    The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors.

  • 2010 IEEE Aerospace Conference

    The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors.

  • 2009 IEEE Aerospace Conference

    The international IEEE Aerospace Conference promotes interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors. It is an annual, week-long conference designed for aerospace experts, academics, military personnel, and industry leaders and is set in a stimulating, thought-provoking environment.

  • 2008 IEEE Aerospace Conference

    The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors. It is an annual, week-long conference designed for aerospace experts, academics, military personnel, and industry leaders and is set in a stimulating and thought-provoking environment.

  • 2007 IEEE Aerospace Conference

  • 2006 IEEE Aerospace Conference


2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC)

DASC is the premier annual conference providing authors an opportunity for publication and presentation to an international audience of papers encompassing the field of avionics systems for aircraft/rotorcraft/unmanned aircraft (commercial, military, general aviation) launch vehicles, missiles, spacecraft, and space transportation systems, navigation, guidance/control of flight, computers, communications, sensors (radar, infrared, visual bands), avionics architectures and data networking, communications networks, software, crew interface, space and ground components needed for the operation of military, commercial, and business aircraft, and avionics electrical power generation and control, Student papers are entered into a judged competition.


2013 Integrated Communications, Navigation and Surveillance Conference (ICNS)

New reserach, development and implementation programs and policies related to ICNS -data link communications, ADS-B, SWIM, airport surface communications, spectrum constraints, transition to digital communications, surveillance systems integration, satellite-based navigation, integration, avionics equipage, secure airborne networking, unmanned aircraft integration into the airspace, NextGen, SESAR, and new commercial aircraft integration and operation, airspace management, weather

  • 2012 Integrated Communications, Navigation and Surveillance Conference (ICNS)

    New research, development and implementation programs and policies related to ICNS-data link communications, ADS-B, SWIM, airport surface communications, spectrum constraints, transition to digital communications, surveillance systems integration, satellite-based navigation integration, avionics equipage, secure airborne networking, unmanned aircraft integration into the airspace, NextGen, SESAR, and the new commercial aircraft integration and operation.

  • 2011 Integrated Communications, Navigation and Surveillance Conference (ICNS)

    The 2011 ICNS Conference addresses research needs, policy, and development for early implementation of integrated CNS technologies needed to enable NextGen. ICNS focuses on understanding CNS programs, longer term plans, standards, technology, and validation for early implementation of NextGen.

  • 2010 Integrated Communications, Navigation and Surveillance Conference (ICNS)

    The ICNS Conference addresses research and development of integrated communication, navigation, and surveillance technologies for advanced digital information systems and applications supporting the future global air transporation system. Focus is understanding of CNS Programs, plans,research and technology for the 2012-2020 time frame and beyond 2025.

  • 2009 Integrated Communications, Navigation and Surveillance Conference (ICNS)

    Close integration of on-board and ground flight management functions is the key to implementing the NextGen flight operations that will create the benefits of fewer delays, increased route efficiency, lower fuel consumption, further reduction of environmental impact, and lower per-flight system operations costs. The conference program provides up-to-date status of NextGen activities and discussion of the state of the art in technical development


2013 International Carnahan Conference on Security Technology (ICCST)

This international conference is a forum for all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainability. The ICCST facilitates the exchange of ideas and information.

  • 2012 IEEE International Carnahan Conference on Security Technology (ICCST)

    Research, development, and user aspects of security technology, including principles of operation, applications, and user experiences.

  • 2011 International Carnahan Conference on Security Technology (ICCST)

    This annual conference is the world s longest -running, international technical symposium on security technology. This conference is a forum for collaboration on all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainment. The ICCST facilitates the exchange of ideas and sharing of information on both new and existing technology and systems. Conference participants are encouraged to consider the impact of their work on society. The ICCST provides a foundation for support to authorities and agencies responsible for security, safety and law enforcement in the use of available and future technology.

  • 2010 IEEE International Carnahan Conference on Security Technology (ICCST)

    The ICCST is a forum for researchers and practitioners in both new and existing security technology, providing an interchange of knowledge through paper presentations and publication of proceedings that have been selected by the ICCST organizing committee.

  • 2009 International Carnahan Conference on Security Technology (ICCST)

    Conference is directed toward research and development and user aspects of electronic security technology.

  • 2008 International Carnahan Conference on Security Technology (ICCST)

    The ICCST is directed toward the research and development aspects of electronic security technology, including the operational testing of the technology. It establishes a forum for the exchange of ideas and dissemination of information on both new and existing technology. Conference participants are stimulated to consider the impact of their work on society. The Conference is an interchange of knowledge through the presentation of learned papers that have been selected by the ICCST organizing committee.

  • 2007 IEEE International Carnahan Conference on Security Technology (ICCST)

  • 2006 IEEE International Carnahan Conference on Security Technology (ICCST)


2012 IEEE International Conference on Technologies for Homeland Security (HST)

The conference will focus on innovative technologies for deterring and preventing attacks, protecting critical infrastructure and individuals, mitigating damage , expediting recovery and bring together innovators from leading universities, research laboratories, Homeland Security Centers of Excellence, small businesses, system integrators and the end user community and provides a forum to discuss ideas, concepts and experimental results.

  • 2011 IEEE International Conference on Technologies for Homeland Security (HST)

    The conference will focus on innovative technologies for deterring and preventing attacks, protecting critical infrastructure and individuals, mitigating damage , expediting recovery and bring together innovators from leading universities, research laboratories, Homeland Security Centers of Excellence, small businesses, system integrators and the end user community and provides a forum to discuss ideas, concepts and experimental results.

  • 2010 IEEE International Conference on Technologies for Homeland Security (HST)

    The IEEE International Conference on Technologies for Homeland Security (HST) addresses critical technology issues and bringing together innovators from universities, research laboratories, Homeland Security Centers of Excellence, businesses, system integrators, and end users to discuss ideas and experimental results. Featured speakers are from U.S. DHS Science & Technology, (Dr. Starnes Walker, Dir. of Research; Christopher Doyle, Dir., Infrastructure & Geophysical Div.; and Dr. Thomas Cellucci, CCO)


More Conferences

Periodicals related to National Security

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Engineering in Medicine and Biology Magazine, IEEE

Both general and technical articles on current technologies and methods used in biomedical and clinical engineering; societal implications of medical technologies; current news items; book reviews; patent descriptions; and correspondence. Special interest departments, students, law, clinical engineering, ethics, new products, society news, historical features and government.


Intelligent Systems, IEEE

IEEE Intelligent Systems, a bimonthly publication of the IEEE Computer Society, provides peer-reviewed, cutting-edge articles on the theory and applications of systems that perceive, reason, learn, and act intelligently. The editorial staff collaborates with authors to produce technically accurate, timely, useful, and readable articles as part of a consistent and consistently valuable editorial product. The magazine serves software engineers, systems ...


IT Professional

This IEEE Computer Society periodical covers the many rapidly emerging issues facing information technology professionals, developers, and managers of enterprise information systems. IT Professional's coverage areas include: Web services, Internet security, data management; enterprise architectures and infrastructures; organizing and utilizing data; instituting cross-functional systems; using IT for competitive breakthroughs; integrating systems and capitalizing on IT advances; emerging technologies like electronic ...


More Periodicals

Most published Xplore authors for National Security

Back to Top

Xplore Articles related to National Security

Back to Top

Network Distribution of Remote Sensing Images Based on Multi-rank Security

Jin Liu; Zhengquan Xu; Jing Sun; Xiaojun Liu; Zhe Wu 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

With the development of remote sensing technology and network, a wide range of space information civilian use make remote sensing images security more and more attention. On the basis of the characteristics of large amount of remote sensing data but real-time transmission or access, a scheme of authorizing the use of remote sensing images based on multi-rank security through Internet ...


Knowledge-based key-hole monitoring of users for security control in transaction processing systems

V. K. Murthy; E. V. Krishnamurthy Networks, 1993. International Conference on Information Engineering '93. 'Communications and Networks for the Year 2000', Proceedings of IEEE Singapore International Conference on, 1993

This paper considers the interrelationships between knowledge-based security, concurrency and recoverability in on-line database transaction processing systems (OLTP). It describes how OLTP can permit the users to carry out the desired actions, and concurrently activate scrutinizing transactions that identify the users with respect to their biometrical or other characteristics stored in a secure knowledge database. A finite state machine model ...


Silver Bullet Talks with Bob Blakley

Gary McGraw IEEE Security & Privacy, 2009

Gary McGraw interviews, Bob Blakley, the VP and research director of Burton Group's Identity and Privacy Strategies. Before joining Burton Group, he was chief scientist for security and privacy at IBM. Blakley is active in the security research community, having served as general chair at Oakland and also for the New Security Paradigms Conferences. He's also participated in the US ...


Research and realization of authentication technique based on OTP and Kerberos

Cheng Xiao-rong; Feng Qi-yuan; Dong Chao; Zhang Ming-quan Eighth International Conference on High-Performance Computing in Asia-Pacific Region (HPCASIA'05), 2005

With the development of computer network, its security problem has been urgent at present. Authentication is an important part in the network security. It can prevent illegal user from accessing network. Traditional authentication method is password. But it cannot resist dictionary and playback attack. This paper makes a profound study on the principle of one-time password. This mode doesn't need ...


Security against compelled disclosure

I. Brown; B. Laurie Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference, 2000

Various existing and pending legislation can be used to force individuals and organisations to disclose confidential information. Courts may order a wide variety of data to be turned over by either party in civil and criminal cases. Government agencies are explicitly tasked with protecting national economic security. Organised crime will target information just like any other valuable asset. In a ...


More Xplore Articles

Educational Resources on National Security

Back to Top

eLearning

Network Distribution of Remote Sensing Images Based on Multi-rank Security

Jin Liu; Zhengquan Xu; Jing Sun; Xiaojun Liu; Zhe Wu 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

With the development of remote sensing technology and network, a wide range of space information civilian use make remote sensing images security more and more attention. On the basis of the characteristics of large amount of remote sensing data but real-time transmission or access, a scheme of authorizing the use of remote sensing images based on multi-rank security through Internet ...


Knowledge-based key-hole monitoring of users for security control in transaction processing systems

V. K. Murthy; E. V. Krishnamurthy Networks, 1993. International Conference on Information Engineering '93. 'Communications and Networks for the Year 2000', Proceedings of IEEE Singapore International Conference on, 1993

This paper considers the interrelationships between knowledge-based security, concurrency and recoverability in on-line database transaction processing systems (OLTP). It describes how OLTP can permit the users to carry out the desired actions, and concurrently activate scrutinizing transactions that identify the users with respect to their biometrical or other characteristics stored in a secure knowledge database. A finite state machine model ...


Silver Bullet Talks with Bob Blakley

Gary McGraw IEEE Security & Privacy, 2009

Gary McGraw interviews, Bob Blakley, the VP and research director of Burton Group's Identity and Privacy Strategies. Before joining Burton Group, he was chief scientist for security and privacy at IBM. Blakley is active in the security research community, having served as general chair at Oakland and also for the New Security Paradigms Conferences. He's also participated in the US ...


Research and realization of authentication technique based on OTP and Kerberos

Cheng Xiao-rong; Feng Qi-yuan; Dong Chao; Zhang Ming-quan Eighth International Conference on High-Performance Computing in Asia-Pacific Region (HPCASIA'05), 2005

With the development of computer network, its security problem has been urgent at present. Authentication is an important part in the network security. It can prevent illegal user from accessing network. Traditional authentication method is password. But it cannot resist dictionary and playback attack. This paper makes a profound study on the principle of one-time password. This mode doesn't need ...


Security against compelled disclosure

I. Brown; B. Laurie Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference, 2000

Various existing and pending legislation can be used to force individuals and organisations to disclose confidential information. Courts may order a wide variety of data to be turned over by either party in civil and criminal cases. Government agencies are explicitly tasked with protecting national economic security. Organised crime will target information just like any other valuable asset. In a ...


More eLearning Resources

IEEE-USA E-Books

  • National Security

    This chapter contains sections titled: The Concept of National Security, The Spectrum of Intelligence, Signals Intelligence and Communications Intelligence, The Impact of Encryption on Communications Intelligence, Information Warfare, The Relationship of Security and Intelligence, The Security of Communications in the United States, Federal Policies and Programs

  • Glossary

    Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. InPrivacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.

  • No title

    Following the June 2006 IEEE-sponsored Special Session on Integration and Interoperability of National Security Information Systems, in Cambridge, MA, a number of discussions have been had regarding interoperability and its role in protecting, strengthening and enhancing U.S. critical infrastructures. A decision was made to author a series of monographs that will attempt to address the effects of deep-rooted un-interoperability on particular infrastructures. In Interoperability & Critical Infrastructure Protection: A Review of Activities to Ensure the Reliability of the U.S. Electric Power Grid, authors Luis Kun of the National Defense University and Robert Mathews of the University of Hawaii examine and present the impacts of lack of interoperability on the reliability of the U.S. electric power grid. Copyright 2007.

  • Bibliography

    Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. InPrivacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.

  • Cyber Venues and Levels of Analysis

    Cyberspace is widely acknowledged as a fundamental fact of daily life in today's world. Until recently, its political impact was thought to be a matter of low politics--background conditions and routine processes and decisions. Now, however, experts have begun to recognize its effect on high politics-- national security, core institutions, and critical decision processes. In this book, Nazli Choucri investigates the implications of this new cyberpolitical reality for international relations theory, policy, and practice. The ubiquity, fluidity, and anonymity of cyberspace have already challenged such concepts as leverage and influence, national security and diplomacy, and borders and boundaries in the traditionally state-centric arena of international relations. Choucri grapples with fundamental questions of how we can take explicit account of cyberspace in the analysis of world politics and how we can integrate the traditional international system with its cyber venues. After establishing the theoretical and empirical terrain, Choucri examines modes of cyber conflict and cyber cooperation in international relations; the potential for the gradual convergence of cyberspace and sustainability, in both substantive and policy terms; and the emergent synergy of cyberspace and international efforts toward sustainable development. Choucri's discussion is theoretically driven and empirically grounded, drawing on recent data and analyzing the dynamics of cyberpolitics at individual, state, international, and global levels.

  • Index

    Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. InPrivacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original--and prescient--discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.

  • On the Brink of a Revolution

    This chapter contains sections titled: Decentralized Cryptography, Cryptography and National Security, Cryptographic Research Programs, Conclusion

  • There's S, and Then There's

    No abstract.

  • Epilogue Can One Ever Truly Go Home Again?

    No abstract.

  • Index

    Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties. Topics covered include: Counter-terrorism modeling Quantitative and computational social science Signal processing and information management techniques Semantic Web and knowledge management technologies Information and intelligence sharing technologies Text/data processing and language translation technologies Social network analysis Legal standards for data mining Potential structures for enabling policies Technical system design to support policy Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a com prehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.



Standards related to National Security

Back to Top

American National Standard for the Performance of Checkpoint Cabinet X-Ray Imaging Security Systems

This document establishes standards for the technical performance of cabinet x-ray imaging systems used for screening at security checkpoints and other inspection venues. Included are all x-ray systems designed primarily for the inspection of baggage at airline, railroad, and bus terminals, and in similar facilities. An xray tube used within a shielded part of a building, or x-ray equipment that ...



Jobs related to National Security

Back to Top