Conferences related to Computer hacking

Back to Top

ICC 2015 - 2015 IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; London is to host this conference in 2015. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicise themselves and their products among the leaders of communications industries from all over the world.

  • ICC 2014 - 2014 IEEE International Conference on Communications

    The International Conference on Communications (ICC) is one of the two flagship conferences of the IEEE Communications Society, together with IEEE Globecom. Each year the ICC conference attracts about 2-3.000 submitted scientific papers, a technical program committee involving about 1.500 experts provides more than 10.000 reviews, the conference being finally attended by 1.500 - 2.000 professionals from all around the world. IEEE ICC is therefore one of the most significant scientific events of the networking and communications community, a must-attend forum for both industrials and academics working in this area.

  • ICC 2013 - 2013 IEEE International Conference on Communications

    A full programs of technical and professional activities spanning the entire range of hot topics in voice, data, image, quality of service, home networking, signal processing, wireless, optical, and multimedia communications

  • ICC 2012 - 2012 IEEE International Conference on Communications

    Full programs of technical and professional activities spanning the entire range of hot topics in voice, data, image, quality of service, home networking, signal processing, wireless, optical, and multimedia communications

  • ICC 2011 - 2011 IEEE International Conference on Communications

    A full programs of technical and professional activities spanning the entire range of hot topics in voice, data, image, quality of service, home networking, signal processing, wireless, optical, and multimedia communications.

  • ICC 2010 - 2010 IEEE International Conference on Communications

    Telecommunications

  • ICC 2009 - 2009 IEEE International Conference on Communications

  • ICC 2008 - 2008 IEEE International Conference on Communications


2013 Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA/NAFIPS)

IFSA-NAFIPS 2013 aims to bring together researchers, engineers and practitioners to present the latest achievements and innovations in the area of fuzzy information processing, to discuss thought-provoking developments and challenges.


2012 IEEE 13th International Conference on Information Reuse & Integration (IRI)

Given volumes of information in digital form, we are constantly faced with new challenges with regards to efficiently using it and extracting useful knowledge from it. Information reuse and integration (IRI) seeks to maximally exploit such available information to create new knowledge and to reuse it for addressing newer challenges. It plays a pivotal role in the capture, maintenance, integration, validation, extrapolation, and application of knowledge to augment human decision -making capabilities.

  • 2011 IEEE International Conference on Information Reuse & Integration (IRI)

    Given volumes of information in digital form, we are constantly faced with new challenges with regards to efficiently using it and extracting useful knowledge from it. Information reuse and integration (IRI) seeks to maximally exploit such available information to create new knowledge and to reuse it for addressing newer challenges. It plays a pivotal role in the capture, maintenance, integration, validation, extrapolation, and application of knowledge to augment human decision -making capabilities.

  • 2010 IEEE International Conference on Information Reuse & Integration (2010 IRI)

    Given volumes of information in digital form, we are constantly faced with new challenges with regards to efficiently using it and extracting useful knowledge from it. Information reuse and integration (IRI) seeks to maximally exploit such available information to create new knowledge and to reuse it for addressing newer challenges. It plays a pivotal role in the capture, maintenance, integration, validation, extrapolation, and application of knowledge to augment human decision -making capabilities.

  • 2009 IEEE International Conference on Information Reuse & Integration (2009 IRI)

    Given volumes of information in digital form, we are constantly faced with new challenges with regards to efficiently using it and extracting useful knowledge from it. Information reuse and integration (IRI) seeks to maximally exploit such available information to create new knowledge and to reuse it for addressing newer challenges. It plays a pivotal role in the capture, maintenance, integration, validation, extrapolation, and application of knowledge to augment human decision-making capabilities in variou

  • 2008 IEEE International Conference on Information Reuse & Integration (2008 IRI)

    The increasing volumes and dimensions of information dramatically impact on effective decision-making. To remedy this situation, Information Reuse and Integration (IRI) seeks to maximize the reuse of information by creating simple, rich, and reusable knowledge representations and consequently explore strategies for integrating this knowledge into legacy systems. IRI plays a pivotal role to capture, represent, maintain, integrate, validate, extrapolate, and apply both information and knowledge for enhancing

  • 2007 IEEE International Conference on Information Reuse & Integration (2007 IRI)

    Given volumes of information in digital form, we are constantly faced with new challenges with regards to efficiently using it and extracting useful knowledge from it. Information reuse and integration (IRI) seeks to maximally exploit such available information to create new knowledge and to reuse it for addressing newer challenges. It plays a pivotal role in the capture, maintenance, integration, validation, extrapolation, and application of knowledge to augment human decision-making.

  • 2006 IEEE International Conference on Information Reuse & Integration (2006 IRI)


2009 International Conference on Control, Automation, Communication and Energy Conservation (INCACEC 2009)

The rapid developments in the various spheres of engineering and technology have contributed immensely to the introduction of new products, services, improvement of productivity and quality and reduction in costs-all leading to enhancement of the quality of life. In the above scenario, it is imperative to take a close look at the present status of Automation and Control, Communication and Energy Conservation with a view to critically analyzing the present status and chalking out the future course of action



Periodicals related to Computer hacking

Back to Top

Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Distributed Systems Online, IEEE

After nine years of publication, DS Online will be moving into a new phase as part of Computing Now (http://computingnow.computer.org), a new website providing the front end to all of the Computer Society's magazines. As such, DS Online will no longer be publishing standalone peer-reviewed articles.


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Spectrum, IEEE

IEEE Spectrum Magazine, the flagship publication of the IEEE, explores the development, applications and implications of new technologies. It anticipates trends in engineering, science, and technology, and provides a forum for understanding, discussion and leadership in these areas. IEEE Spectrum is the world's leading engineering and scientific magazine. Read by over 300,000 engineers worldwide, Spectrum provides international coverage of all ...


Systems, Man, and Cybernetics, Part B, IEEE Transactions on

The scope of the IEEE Transactions on Systems, Man and Cybernetics Part B: Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or between machines, humans, and organizations. The scope of Part B includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, ...



Most published Xplore authors for Computer hacking

Back to Top

Xplore Articles related to Computer hacking

Back to Top

Coordination of security levels for Internet architectures

E. B. Fernandez Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99, 1999

Internet systems provide a variety of ways for exchanging information, contain a large amount and variety of data, and have become quite complex, making them vulnerable to attacks from determined hackers. There are many products currently being used to stop these attacks but they suffer from a lack of completeness, only applying to one type of attack. Several mechanisms are ...


Maximizing online security by providing a 3 factor authentication system to counter-attack 'Phishing'

K. Nirmal; S. E. Vinodh Ewards; K. Geetha INTERACT-2010, 2010

Phishing is a kind of online security attack where the attacker creates a replica of an existing web page to fool users in order to hack their personal, financial, or password data. The statistics today reveal that the current Anti-Phishing system has failed to prevent Phishing completely. In this paper an Anti-Phishing algorithm is proposed which is termed as Phish-Secure. ...


Content authentication in enterprises for mobile devices

M. Kappes; P. Krishnan 2004 IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communications, 2004

Most recent work in enterprise security has targeted the area of securing systems and networks from external hackers. We present new security challenges that arise in such networks from a mobile workforce. We argue that future threats to the network will likely come from inside the network; specifically, from legitimate devices and users that roam and reconnect to the enterprise. ...


A new method for analyzing s-t reliability of communication networks

Zu Yunxiao; Sun Yugeng; Wang Zanji TENCON '02. Proceedings. 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering, 2002

A new method, state transition(ST), for analyzing s-t reliability of communication networks is developed . ST is based on the finding that the message transmission process can be described by the Markov chain with two absorbing states. With ST all the non-absorbing states can be generated with depth-first search or breadth-first search and the network reliability can be computed with ...


Evaluation of Resistance to Differential Power Analysis: Execution Time Optimizations for Designers

G. Di Natale; M. -L. Flottes; B. Rouzeyre 2010 Fifth IEEE International Symposium on Electronic Design, Test & Applications, 2010

This paper proposes a novel method intended to accelerate the checking of the robustness of a device against Differential Power Analysis. We propose an algorithm for the automatic selection of shortest short input vector sequence that leads to the secret key breakthrough. We show that the selected sequence remains valid for different designs of the same cryptographic function.


More Xplore Articles

Educational Resources on Computer hacking

Back to Top

eLearning

Coordination of security levels for Internet architectures

E. B. Fernandez Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99, 1999

Internet systems provide a variety of ways for exchanging information, contain a large amount and variety of data, and have become quite complex, making them vulnerable to attacks from determined hackers. There are many products currently being used to stop these attacks but they suffer from a lack of completeness, only applying to one type of attack. Several mechanisms are ...


Maximizing online security by providing a 3 factor authentication system to counter-attack 'Phishing'

K. Nirmal; S. E. Vinodh Ewards; K. Geetha INTERACT-2010, 2010

Phishing is a kind of online security attack where the attacker creates a replica of an existing web page to fool users in order to hack their personal, financial, or password data. The statistics today reveal that the current Anti-Phishing system has failed to prevent Phishing completely. In this paper an Anti-Phishing algorithm is proposed which is termed as Phish-Secure. ...


Content authentication in enterprises for mobile devices

M. Kappes; P. Krishnan 2004 IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communications, 2004

Most recent work in enterprise security has targeted the area of securing systems and networks from external hackers. We present new security challenges that arise in such networks from a mobile workforce. We argue that future threats to the network will likely come from inside the network; specifically, from legitimate devices and users that roam and reconnect to the enterprise. ...


A new method for analyzing s-t reliability of communication networks

Zu Yunxiao; Sun Yugeng; Wang Zanji TENCON '02. Proceedings. 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering, 2002

A new method, state transition(ST), for analyzing s-t reliability of communication networks is developed . ST is based on the finding that the message transmission process can be described by the Markov chain with two absorbing states. With ST all the non-absorbing states can be generated with depth-first search or breadth-first search and the network reliability can be computed with ...


Evaluation of Resistance to Differential Power Analysis: Execution Time Optimizations for Designers

G. Di Natale; M. -L. Flottes; B. Rouzeyre 2010 Fifth IEEE International Symposium on Electronic Design, Test & Applications, 2010

This paper proposes a novel method intended to accelerate the checking of the robustness of a device against Differential Power Analysis. We propose an algorithm for the automatic selection of shortest short input vector sequence that leads to the secret key breakthrough. We show that the selected sequence remains valid for different designs of the same cryptographic function.


More eLearning Resources

IEEE-USA E-Books

  • References

    In Playing with Sound, Karen Collins examines video game sound from the player's perspective. She explores the many ways that players interact with a game's sonic aspects -- which include not only music but also sound effects, ambient sound, dialogue, and interface sounds -- both within and outside of the game. She investigates the ways that meaning is found, embodied, created, evoked, hacked, remixed, negotiated, and renegotiated by players in the space of interactive sound in games. Drawing on disciplines that range from film studies and philosophy to psychology and computer science, Collins develops a theory of interactive sound experience that distinguishes between interacting with sound and simply listening without interacting. Her conceptual approach combines practice theory (which focuses on productive and consumptive practices around media) and embodied cognition (which holds that our understanding of the world is shaped by our physical interaction with it). Collins investigates the multimodal experience of sound, image, and touch in games; the role of interactive sound in creating an emotional experience through immersion and identification with the game character; the ways in which sound acts as a mediator for a variety of performative activities; and embodied interactions with sound beyond the game, including machinima, chip- tunes, circuit bending, and other practices that use elements from games in sonic performances.

  • Hackers: Loving the Machine for Itself

    This chapter contains section titled: The Social Construction of the Engineer, The Image of the Hacker, Passion in Virtuosity, The Hacker Controversies, Perfect Mastery, Loneliness and Safety, Being Special, Sex and Romance: Getting Burned, Antisensuality, The Game of Adventure, The Hack, Rites of Passage, Building Straight from Your Mind

  • Audiovisual References

    In Playing with Sound, Karen Collins examines video game sound from the player's perspective. She explores the many ways that players interact with a game's sonic aspects -- which include not only music but also sound effects, ambient sound, dialogue, and interface sounds -- both within and outside of the game. She investigates the ways that meaning is found, embodied, created, evoked, hacked, remixed, negotiated, and renegotiated by players in the space of interactive sound in games. Drawing on disciplines that range from film studies and philosophy to psychology and computer science, Collins develops a theory of interactive sound experience that distinguishes between interacting with sound and simply listening without interacting. Her conceptual approach combines practice theory (which focuses on productive and consumptive practices around media) and embodied cognition (which holds that our understanding of the world is shaped by our physical interaction with it). Collins investigates the multimodal experience of sound, image, and touch in games; the role of interactive sound in creating an emotional experience through immersion and identification with the game character; the ways in which sound acts as a mediator for a variety of performative activities; and embodied interactions with sound beyond the game, including machinima, chip- tunes, circuit bending, and other practices that use elements from games in sonic performances.

  • Tool-Assisted

    This chapter contains sections titled: The Conversion Problem, Machines That Do Not (Yet) Exist, Console Emulation, Split Format, The Birth of .NES, Dirty Headers, The Severed Hand, Hacks and Patches, Text Movies, Choreographic Play

  • Index

    In Playing with Sound, Karen Collins examines video game sound from the player's perspective. She explores the many ways that players interact with a game's sonic aspects -- which include not only music but also sound effects, ambient sound, dialogue, and interface sounds -- both within and outside of the game. She investigates the ways that meaning is found, embodied, created, evoked, hacked, remixed, negotiated, and renegotiated by players in the space of interactive sound in games. Drawing on disciplines that range from film studies and philosophy to psychology and computer science, Collins develops a theory of interactive sound experience that distinguishes between interacting with sound and simply listening without interacting. Her conceptual approach combines practice theory (which focuses on productive and consumptive practices around media) and embodied cognition (which holds that our understanding of the world is shaped by our physical interaction with it). Collins investigates the multimodal experience of sound, image, and touch in games; the role of interactive sound in creating an emotional experience through immersion and identification with the game character; the ways in which sound acts as a mediator for a variety of performative activities; and embodied interactions with sound beyond the game, including machinima, chip- tunes, circuit bending, and other practices that use elements from games in sonic performances.

  • Assembler

    This chapter contains sections titled: Background, Hack Assembly-to-Binary Translation Specification, Implementation, Perspective, Project

  • Computer Architecture

    This chapter contains sections titled: Background, The Hack Hardware Platform Specification, Implementation, Perspective, Project

  • Machine Language

    This chapter contains sections titled: Background, Hack Machine Language Specification, Perspective, Project



Standards related to Computer hacking

Back to Top

No standards are currently tagged "Computer hacking"


Jobs related to Computer hacking

Back to Top