Conferences related to Computer hacking

Back to Top

2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)

IWCMC 2018 will target a wide spectrum of the state-of-the-art as well as emerging topics pertaining to wireless networks, wireless sensors, vehicular communications, and mobile computing.


2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2018 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)

Cluster Computing, Grid Computing, Edge Computing, Cloud Computing, Parallel Computing, Distributed Computing


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2018 52nd Annual Conference on Information Sciences and Systems (CISS)

The scope includes theoretical advances, applications, and ideas in the fields of information sciences and systems including: Information Theory,Coding Theory, Image Processing, Communications, Signal Processing, Machine Learning, Statistical Inference,, Security and Privacy, Energy Systems, Networking, Systems and Control, Biological Systems


More Conferences

Periodicals related to Computer hacking

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computing in Science & Engineering

Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


More Periodicals


Xplore Articles related to Computer hacking

Back to Top

Performance Comparison Of EPRML And Peak Detection In High Density Digital Magnetic Recording

[{u'author_order': 1, u'affiliation': u'University of Minneapolis', u'full_name': u'H. Shafee'}, {u'author_order': 2, u'full_name': u'M. Melas'}, {u'author_order': 3, u'full_name': u'P. Sutardja'}] 1993 IEEE International Magnetics Conference (INTERMAG), None

First Page of the Article ![](/xploreAssets/images/absImages/00642555.png)


A Storm (Worm) Is Brewing

[{u'author_order': 1, u'affiliation': u'freelance technology writer', u'full_name': u'Brad Smith'}] Computer, 2008

Skilled hackers have designed a sophisticated type of malware that blends multiple techniques, hides and changes its code, and employs tricks to entice users to implement and spread it. The malware is generally called the Storm worm. This paper introduces the basic information about Storm worm and how we can combat against this attack.


A review of PHEV grid impacts

[{u'author_order': 1, u'affiliation': u'Florida State University - Center for Advanced Power Systems, Tallahassee, FL 32310', u'full_name': u'T. Bevis'}, {u'author_order': 2, u'affiliation': u'Florida State University - Center for Advanced Power Systems, Tallahassee, FL 32310', u'full_name': u'B. Hacker'}, {u'author_order': 3, u'affiliation': u'Florida State University - Center for Advanced Power Systems, Tallahassee, FL 32310', u'full_name': u'C. S. Edrington'}, {u'author_order': 4, u'affiliation': u'Florida State University - Center for Advanced Power Systems, Tallahassee, FL 32310', u'full_name': u'S. Azongha'}] 41st North American Power Symposium, None

This paper is a literary review of the benefits and barriers of PHEV deployment in the U.S., along with the proposed solutions to the setbacks that may occur. The review aims at identifying the energy requirements of PHEVs, the impact of PHEVs on the grid, and solutions to the shortcomings of the electrical grid, such as vehicle to grid and ...


Research on the Assessment of Risk of Enterprise E-Commerce

[{u'author_order': 1, u'affiliation': u'Sch. of Manage., Huazhong Normal Univ., Hubei, China', u'full_name': u'ShengLi Dai'}] 2010 2nd International Conference on E-business and Information System Security, None

Based on defining the conception of E-commerce, this article expatiates E-commerce and its classification, and brings forward a set of index system of enterprise E-commerce risks. It provides the foundation of risk prevention for E-commerce enterprises by using the fuzzy and comprehensive evaluation method (FCE) to evaluate enterprise E-commerce risks.


Experiments with a new piezoelectric rotary actuator

[{u'author_order': 1, u'affiliation': u'Dept. of Eng., Cambridge Univ., UK', u'full_name': u'T. Hack'}] Proceedings of the 1998 IEEE International Frequency Control Symposium (Cat. No.98CH36165), None

A new type of linear piezoelectric stick-slip actuator was recently developed at the University of Cambridge. The actuator worked very well at some particular frequencies, but was poor at other frequencies. Quasi-static and dynamic experiments on the inner part of the actuator, which provides the driving force for the system, are carried out. These experiments on the PZT5H tube and ...


More Xplore Articles

Educational Resources on Computer hacking

Back to Top

eLearning

No eLearning Articles are currently tagged "Computer hacking"

IEEE-USA E-Books

  • Security

    None

  • Rational Software Developers as Pathological Code Hackers

    No abstract

  • Espionage

  • Cooperation in Intrusion Detection Networks

    **This book focuses on the latest trends and research results in Cooperative Networking** This book discusses the issues involved in cooperative networking, namely, bottleneck resource management, resource utilization, servers and content, security, and so on. In addition, the authors address instances of cooperation in nature which actively encourage the development of cooperation in telecommunication networks. Following an introduction to the fundamentals and issues surrounding cooperative networking, the book addresses models of cooperation, inspirations of successful cooperation from nature and society, cooperation in networking (for e.g. Peer-to-Peer, wireless ad-hoc and sensor, client-server, and autonomous vehicular networks), cooperation and ambient networking, cooperative caching, cooperative networking for streaming media content, optimal node-task allocation, heterogeneity issues in cooperative networking, cooperative search in networks, and security and privacy issue with cooperative networking. It contains contributions from high profile researchers and is edited by leading experts in this field. Key Features: • Focuses on higher layer networking • Addresses the latest trends and research results • Covers fundamental concepts, models, advanced topics and performance issues in cooperative networking • Contains contributions from leading experts in the field • Provides an insight into the future direction of cooperative networking • Includes an accompanying website containing PowerPoint slides and a glossary of terms ([www.wiley.com/go/obaidat_cooperative](http://www.wiley.com/go/obaid at_cooperative)) This book is an ideal reference for researchers and practitioners working in the field. It will also serve as an excellent textbook for graduate and senior undergraduate courses in computer science, computer engineering, electrical engineeri g, software engineering, and information engineering and science.

  • Automated Crime

  • Customer Edge Switching

    This chapter introduces a security framework based on Customer Edge Switching (CES). The use of CES addresses the classical Internet weaknesses and proposes that all communications are controlled by policy. The chapter describes the deployment of CES framework in 5G mobile networks, its advantages, an evaluation of CES security and other potential uses cases.

  • Internet Firewalls for Trusted Systems

    A firewall is a device or group of devices that controls access between networks. It is a security gateway that controls access between the public Internet and an intranet and is a secure computer system placed between a trusted network and an untrusted Internet. Firewalls can be classified into packet filters, circuit‐level gateways, and application‐level gateways. The primary step in designing a secure firewall is obviously to prevent the firewall devices from being compromised by threats. To provide a certain level of security, a single‐homed bastion host, a dual‐homed bastion host, and a screened subnet firewall are considered. From firewalls to intrusion detection systems (IDSs), information technology (IT) industry's security solutions have been progressed effectively in some extent for preserving data integrity, protecting data confidentiality, and maintaining data availability. This chapter presents a survey and comparison of Internet worm/virus detection against cyber defense.

  • Hacking

  • DSM Definition Process

    This chapter contains sections titled: * Choosing Among Possible Candidate Domains * Organizing for DSM * Proof of Concept * Defining the DSM Solution * Pilot Project * DSM Deployment * DSM as a Continuous Process in the Real World * Summary

  • NFC Security and Privacy

    This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab - Istanbul research centre which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technolog , and security considerations are discussed in detail. This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates. Key Features: * Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis * Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives * Discusses methods, techniques and modelling support including UML are demonstrated with real cases * Contains case studies such as payment, ticketing, social networking and remote shopping



Standards related to Computer hacking

Back to Top

No standards are currently tagged "Computer hacking"


Jobs related to Computer hacking

Back to Top