Conferences related to Forensics

Back to Top

2014 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)


2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)

Today new technologies and new applications will not be widely adopted until it can be demonstrated that the security of the underlying ICT infrastructure and the privacy of information being processed are both protected. Only then will users trust and therefore use these innovations and then, and only then, will the developers and society as a whole reap the benefits of the innovation. Without breakthroughs in Privacy, Security and Trust (PST) technology the "bad guys" will continue to thwart our best e

  • 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)

    The annual Privacy, Security and Trust research conference has quickly established itself as a leading forum for the presentation and discussion of the latest challenges and solutions covering a wide range of PST topics. The PST conference is unique in its broad approach including examining the issues from both the research and practice perspectives, encouraging multidisciplinary research, and fostering collaboration between academe, the private sector and government. PST-2012 will be a valuable place

  • 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST)

    PST2011 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. PST2011 will include an Innovation Day featuring workshops and tutorials followed by two days of high-quality research papers.

  • 2010 Eighth Annual Conference on Privacy, Security and Trust (PST)

    PST2010 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation.


2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)

The conference covers theory, design and application of computer networks and distributed computing and information systems.


2013 IEEE International Conference on Multimedia and Expo (ICME)

To promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2012 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE Societies. It exchanges the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2011 IEEE International Conference on Multimedia and Expo (ICME)

    Speech, audio, image, video, text processing Signal processing for media integration 3D visualization, animation and virtual reality Multi-modal multimedia computing systems and human-machine interaction Multimedia communications and networking Multimedia security and privacy Multimedia databases and digital libraries Multimedia applications and services Media content analysis and search Hardware and software for multimedia systems Multimedia standards and related issues Multimedia qu

  • 2010 IEEE International Conference on Multimedia and Expo (ICME)

    A flagship multimedia conference sponsored by four IEEE societies, ICME serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2009 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.


2013 International Carnahan Conference on Security Technology (ICCST)

This international conference is a forum for all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainability. The ICCST facilitates the exchange of ideas and information.

  • 2012 IEEE International Carnahan Conference on Security Technology (ICCST)

    Research, development, and user aspects of security technology, including principles of operation, applications, and user experiences.

  • 2011 International Carnahan Conference on Security Technology (ICCST)

    This annual conference is the world s longest -running, international technical symposium on security technology. This conference is a forum for collaboration on all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainment. The ICCST facilitates the exchange of ideas and sharing of information on both new and existing technology and systems. Conference participants are encouraged to consider the impact of their work on soc

  • 2010 IEEE International Carnahan Conference on Security Technology (ICCST)

    The ICCST is a forum for researchers and practitioners in both new and existing security technology, providing an interchange of knowledge through paper presentations and publication of proceedings that have been selected by the ICCST organizing committee.

  • 2009 International Carnahan Conference on Security Technology (ICCST)

    Conference is directed toward research and development and user aspects of electronic security technology.

  • 2008 International Carnahan Conference on Security Technology (ICCST)

    The ICCST is directed toward the research and development aspects of electronic security technology, including the operational testing of the technology. It establishes a forum for the exchange of ideas and dissemination of information on both new and existing technology. Conference participants are stimulated to consider the impact of their work on society. The Conference is an interchange of knowledge through the presentation of learned papers that have been selected by the ICCST organizing committee.

  • 2007 IEEE International Carnahan Conference on Security Technology (ICCST)

  • 2006 IEEE International Carnahan Conference on Security Technology (ICCST)


More Conferences

Periodicals related to Forensics

Back to Top

Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Selected Areas in Communications, IEEE Journal on

All telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space, and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; communication theory; and wireless communications.




Xplore Articles related to Forensics

Back to Top

Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks

Liang Zhou; Han-Chieh Chao; Vasilakos, A.V. Selected Areas in Communications, IEEE Journal on, 2011

High quality multimedia forensics service is increasingly critical for delay- sensitive applications over heterogeneous networks. Up to now, it is a challenging problem, where the demand for less forensics overhead, higher authentication level and smaller transmission delay needs to be reconciled with the limited and often dynamic network resources. Traditional multimedia forensics mechanisms, however, either overlook the available network resource ...


Digital forensics: Latest challenges and response

Zareen, M.S.; Waqar, A.; Aslam, B. Information Assurance (NCIA), 2013 2nd National Conference on, 2013

Twenty first century has witnessed an explosive growth in use of computers and networks in every facet of life. With this explosive growth, new advancements in the field of secure computing, network technologies and systems have also been witnessed at an unprecedented rate. These developments have made existing digital forensics tools and techniques ineffective. Moreover, easy access to science of ...


Modeling and Analyzing Dynamic Forensics System Based on Intrusion Tolerance

Lin Chen; Zhitang Li; Cuixia Gao; Yingshu Liu Computer and Information Technology, 2009. CIT '09. Ninth IEEE International Conference on, 2009

As an important part of computer forensics, network forensics particularly places emphasis on dynamic network information collection and proactive defense. Most forensics systems based on intrusion detection or honeypot rarely emphasize the availability of actual servers. In addition, few of them discussed the occasion of dynamic forensics particularly. The work presented in this paper is based on an idea to ...


Guidelines for procedures of a harmonised digital forensic process in network forensics

Sibiya, G.; Venter, H.S.; Ngobeni, S.; Fogwill, T. Information Security for South Africa (ISSA), 2012, 2012

Cloud computing is a new computing paradigm that presents fresh research issues in the field of digital forensics. Cloud computing builds upon virtualisation technologies and is distributed in nature. Depending on its implementation, the cloud can span across numerous countries. Its distributed nature and virtualisation introduces digital forensic research issues that include among others difficulty in identifying and collecting forensically ...


New developments in network forensics — Tools and techniques

Hunt, R. Networks (ICON), 2012 18th IEEE International Conference on, 2012

Network forensics is a branch of digital forensics which has evolved recently as a very important discipline used in monitoring and analysing network traffic - particularly for the purposes of tracing intrusions and attacks. This paper presents an analysis of the tools and techniques used in network forensic analysis. It further examines the application of network forensics to vital areas ...


More Xplore Articles

Educational Resources on Forensics

Back to Top

eLearning

Digital Image Forensics

Memon, Nasir Digital Image Forensics, 2011

This tutorial will cover collecting image evidence as well as searching and sorting evidence. We will also review attributing images to their sources and authenticating them. Sources of images include devices such as cameras or computers. Image authentication involves asking whether an image has been tampered with or manipulated.


Cyber Security of Industrial Control Systems (ICS)

Weiss, Joseph Cyber Security of Industrial Control Systems (ICS), 2009

This course will begin with an introduction to industrial control systems (SCADA, DCS, PLC, RTU, IED, field devices, meters, etc) and will explain what makes control systems different than business IT. Potential mitigation approaches including policies and technologies will be discussed. Example control system cyber events and their ramifications will be presented. Finally, current industry and government activities to secure ...


IEEE-USA E-Books

No IEEE-USA E-Books are currently tagged "Forensics"



Standards related to Forensics

Back to Top

No standards are currently tagged "Forensics"


Jobs related to Forensics

Back to Top
Assistant Professor of Computer Science Boston University
Computer Network Operations (CNO) Operator Federal Government Jobs
Online Full-Time Faculty - Electrical Engineering/Information Technology American Public University System
R&D Cybersecurity (Entry or Senior Level) Sandia National Laboratories
Online Full-Time Faculty - Electrical Engineering/Information Technology (1309-175) American Public University System
Computer Network Operations (CNO) Operator Federal Government Jobs
Student Intern - Cyber Security Support Technical Grad Summer 2015 Sandia National Laboratories
Master's Fellowship Program Computer Science/Computer Engineering Cybersecurity Sandia National Laboratories
R&D S&E, Cybersecurity Sandia National Laboratories
Exploitation Analyst Federal Government Jobs
Student Intern - Center for Cyber Defenders Technical High School Summer Sandia National Laboratories
Student Intern - Center for Cyber Defenders Technical Undergrad Summer Sandia National Laboratories
Student Intern - Center for Cyber Defenders Technical Grad Summer Sandia National Laboratories
Electrical Engineer Teledyne Technologies
Assistant Professor - Cybersecurity Southeast Missouri State University
Software Developer JAVA - CTISL- 752 Georgia Tech Research Institute (GTRI)
Software Developer JAVA - CTISL - 802 Georgia Tech Research Institute (GTRI)
Cybersecurity Researcher (Entry or Senior Level) Sandia National Laboratories
Experienced Cybersecurity Researcher (Senior or Principal Level) Sandia National Laboratories
R&D Cybersecurity (Entry or Senior Level) Sandia National Laboratories
R&D Cybersecurity (Entry or Senior Level)-CS and IT Sandia National Laboratories
Student Intern Pipeline Program - Center for Cyber Defenders Graduate Summer Sandia National Laboratories
R&D S&E, Computer Science Senior/Principal Sandia National Laboratories
Student Intern - Cyber Security Research Grad Summer Sandia National Laboratories
Student Intern - Cyber Security Research Undergrad Summer Sandia National Laboratories