Conferences related to Information Assurance

Back to Top

2017 IEEE AUTOTESTCON

IEEE AUTOTESTCON is also known as the Systems Readiness Technology Conference. This major conference and exposition provides focus on the maintenance aspects of systems readiness and providing Mission Assurance through Advanced ATE (Automatic Test Equpmenrt/Systems). This includes Maintenance Repair & Overhaul as well as factory and development automated test equipment. This conference brings military and aerospace industry principals together to share new concepts, technologies and applications in this essential field of supportability and sustainability. The conference includes a major exhibit of exciting new products from a wide variety of exhibitors, and provides the opportunity to meet with senior military and aerospace leaders to discuss their future needs and expectations and the ways in which we can satisfy those needs.

  • 2014 IEEE AUTOTEST

    IEEE AUTOTESTCON is the world s only conference that focuses primarily on Automated Test and related technology for military, government and aerospace applications. The conference also has an expanded focus into commercial areas that share a common technical base, including aerospace, vehicle and automotive, and commercial factory test applications. Autotestcon provides a unique opportunity to discuss platform support requirements with all DoD Branches, provides hands-on experience with test equipment, and

  • 2013 IEEE AUTOTESTCON

    Content focused on automatic test systems for US military systems.

  • 2012 IEEE AUTOTESTCON

    Automated Test Systems (ATE) and related technologies such as Test Program Sets for US military and defense equipment

  • 2011 IEEE AUTOTESTCON

    Annual conference of the automatic testing industry.

  • 2010 IEEE AUTOTESTCON

    IEEE AUTOTESTCON, The Support Systems Technology Conference, is the largest conference focused on automatic test systems for military and aerospace systems, and has been held annually since 1965. It features more than 120 quality application-focused papers and 250 Exhibits. Attendance ranges between 650 and 750 registered professionals.

  • 2009 IEEE AUTOTESTCON

    Automated Test, Test Technology, and related Support Systems for Defense Systems.

  • 2008 IEEE AUTOTESTCON

    All theoretical and application aspects for an appropriate topic dealing with system readiness, in general, and automatic test technology, in particular. In keeping with our conference theme "Surpassing the Limits-Forging Ahead" our focus will be on new ideas and concepts, unusual testing solutions, and future technologies, e.g. ATE Architectures, Artificial Intelligence in Test, ATE/TPS Development Techniques, ATE/TPS Management, BIT/BIST

  • 2007 IEEE AUTOTESTCON

  • 2006 IEEE AUTOTESTCON


2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invited sessions of the latest significant findings and developments in all the major fields of biomedical engineering. Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.

  • 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The conference will cover diverse topics ranging from biomedical engineering to healthcare technologies to medical and clinical applications. The conference program will consist of invited plenary lectures, symposia, workshops, invited sessions and oral and poster sessions of unsolicited contributions. All papers will be peer reviewed and accepted papers of up to 4 pages will appear in the Conference Proceedings and be indexed by IEEE Xplore and Medline/PubMed.

  • 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The conference program will consist of plenary lectures, symposia, workshops and invited sessions of the latest significant findings and developments in all the major fields of biomedical engineering. Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.

  • 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The Annual International Conference of the IEEE Engineering in Medicine and Biology Society covers a broad spectrum of topics from biomedical engineering and physics to medical and clinical applications. The conference program will consist of invited plenary lectures, symposia, workshops, invited sessions, oral and poster sessions of unsolicited contributions. All papers will be peer reviewed and accepted papers of up to 4 pages will appear in the Conference Proceedings and be indexed by PubMed and EI. Prop

  • 2012 34th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc

  • 2011 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc.

  • 2010 32nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc

  • 2009 31st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc

  • 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The general theme of EMBC'08 is "Personalized Healthcare through Technology", covering a broad spectrum of topics from biomedical and clinical engineering and physics to medical and clinical applications. Transfer of research results from academia to industry will also be a focus of the conference.

  • 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)


2012 11th International Conference on Signal Processing (ICSP 2012)

Signal Processing; Speech and Audio Coding; Image Processing; Computer Vision;; Video compression; Pattern Recognition; Statistic Machine Learning; Wireless and Communications; Radar Signal Processing; Biometrics; Authentification; Sonar Signal Processing ; Sensor Networks

  • 2010 10th International Conference on Signal Processing (ICSP 2010)

    Digital Signal Processing (DSP); Spectrum Estimation & Modeling; TF Spectrum Analysis & Wavelet; Higher Order Spectral Analysis; Adaptive Filtering &SP; Array Signal Processing; Hardware Implementation for SP; Speech and Audio Coding; Speech Synthesis & Recognition; Image Processing & Understanding; PDE for Image Processing;Video compression &Streaming; Computer Vision & VR; Multimedia & Human-computer Interaction; Statistic Learning,ML & Pattern Recognition; AI & Neural Networks; Communication Signal proce

  • 2008 9th International Conference on Signal Processing (ICSP 2008)

  • 2006 8th International Conference on Signal Processing (ICSP 2006)


MILCOM 2012 - 2012 IEEE Military Communications Conference

MILCOM 2012 gives industry the opportunity to promote communications technologies and services to commanders from all branches of the armed forces, Department of Defense, federal government, and the heads of multi-national forces from around the globe.


2009 International Joint Conference on e-Business and Telecommunications (ICETE)

This is an international joint multiconference aim at bringing together researchers, engineers, scientists, practitioners in information and communication technologies and systems including e-business, wireless network s and systems, information assurance and security and cryptography, signal processing and multimedia applications. It will have 4 conferences that will be held at same time (namely, ICE-B 2009, SCRYPT 2009, SIGMAP 2009, and WINSYS 2009) under the umbrella of ICETE 2009. See: www.icete.org fo


More Conferences

Periodicals related to Information Assurance

Back to Top

Education, IEEE Transactions on

Educational methods, technology, and programs; history of technology; impact of evolving research on education.


IT Professional

This IEEE Computer Society periodical covers the many rapidly emerging issues facing information technology professionals, developers, and managers of enterprise information systems. IT Professional's coverage areas include: Web services, Internet security, data management; enterprise architectures and infrastructures; organizing and utilizing data; instituting cross-functional systems; using IT for competitive breakthroughs; integrating systems and capitalizing on IT advances; emerging technologies like electronic ...


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Software, IEEE

IEEE Software's mission is to build the community of leading and future software practitioners. The magazine delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change. The authority on translating software theory into practice, IEEE Software is positioned between pure research and pure practice, transferring ideas, methods, and experiences among researchers and engineers. ...



Most published Xplore authors for Information Assurance

Back to Top

Xplore Articles related to Information Assurance

Back to Top

Facial Expression Recognition Based on Field Programmable Gate Array

Jzau-Sheng Lin; Shao-Han Liou; Wu-Chih Hsieh; Yu-Yi Liao; HongChao Wang; QingHua Lan 2009 Fifth International Conference on Information Assurance and Security, 2009

In this paper, we proposed a hardware system with field programmable gate array (FPGA) for facial expression recognition which used Haar discrete wavelet transform (DWT) and cerebellar model articulation controller (CMAC). Firstly, the facial expression features are automatically extracted and preprocessed to obtain the frontal view of faces. A 2D DWT IP is then used to decrease the size of ...


Automatic IP Interface Synthesis Supporting Multi-layer Communication Protocols in SoC Designs

Yin-Tsung Hwang; Hua-Hsin Luo 2009 Fifth International Conference on Information Assurance and Security, 2009

We present an automatic interface synthesis system to expedite the IP (silicon intellectual property) integration process in SoC designs. The concept of multi-layer communication protocols is incorporated into the synthesis process so that interface design targeting different levels of functionality and circuit complexity can be generated automatically. The multi-layered interface architecture template designs are addressed in the first place. We ...


Most known vulnerabilities in Saudi Arabian web servers

Khaled S. Alghathbar; Maqsood Mahmud; Hanif Ullah 2008 4th IEEE/IFIP International Conference on Central Asia on Internet, 2008

Vulnerabilities are the loopholes that arise due to poor programming or mis- configuration. Web Applications are considered to be very vulnerable to attack as compared to desktop programs on sole computers. Keeping this thing in our minds we decided to find out the all possible vulnerabilities in Saudi Arabian organizationpsilas Web servers. To assess these vulnerabilities we selected number of ...


A Weighted Stego Image Detector for Sequential LSB Replacement

Andrew D. Ker Third International Symposium on Information Assurance and Security, 2007

We describe a simple modification of the so-called weighted stego image (WS) steganalysis method, due to Fridrich and Goljan, to detect sequential replacement of least significant bits. The most sensitive methods for the detection of bit replacement do not work well when the payload is concentrated at the start of the cover instead of being spread evenly over it, so ...


Security Enhancement of the Authentication Protocol for RFID Systems

Yung-Cheng Lee; Wen-Chung Kuo; Y. -C Hsieh; T. -C. Chen 2009 Fifth International Conference on Information Assurance and Security, 2009

RFID is a convenient and efficient mechanism used for identification or authentication in industry, agriculture, commerce, health care, entrance control, etc. Most of the RFID systems need security mechanisms for authentication and privacy protection. In 2004, Gao et al. propose a RFID system for supply chain, their system has drawbacks on security. Recently, Chen et al. proposed an improvement to ...


More Xplore Articles

Educational Resources on Information Assurance

Back to Top

eLearning

Facial Expression Recognition Based on Field Programmable Gate Array

Jzau-Sheng Lin; Shao-Han Liou; Wu-Chih Hsieh; Yu-Yi Liao; HongChao Wang; QingHua Lan 2009 Fifth International Conference on Information Assurance and Security, 2009

In this paper, we proposed a hardware system with field programmable gate array (FPGA) for facial expression recognition which used Haar discrete wavelet transform (DWT) and cerebellar model articulation controller (CMAC). Firstly, the facial expression features are automatically extracted and preprocessed to obtain the frontal view of faces. A 2D DWT IP is then used to decrease the size of ...


Automatic IP Interface Synthesis Supporting Multi-layer Communication Protocols in SoC Designs

Yin-Tsung Hwang; Hua-Hsin Luo 2009 Fifth International Conference on Information Assurance and Security, 2009

We present an automatic interface synthesis system to expedite the IP (silicon intellectual property) integration process in SoC designs. The concept of multi-layer communication protocols is incorporated into the synthesis process so that interface design targeting different levels of functionality and circuit complexity can be generated automatically. The multi-layered interface architecture template designs are addressed in the first place. We ...


Most known vulnerabilities in Saudi Arabian web servers

Khaled S. Alghathbar; Maqsood Mahmud; Hanif Ullah 2008 4th IEEE/IFIP International Conference on Central Asia on Internet, 2008

Vulnerabilities are the loopholes that arise due to poor programming or mis- configuration. Web Applications are considered to be very vulnerable to attack as compared to desktop programs on sole computers. Keeping this thing in our minds we decided to find out the all possible vulnerabilities in Saudi Arabian organizationpsilas Web servers. To assess these vulnerabilities we selected number of ...


A Weighted Stego Image Detector for Sequential LSB Replacement

Andrew D. Ker Third International Symposium on Information Assurance and Security, 2007

We describe a simple modification of the so-called weighted stego image (WS) steganalysis method, due to Fridrich and Goljan, to detect sequential replacement of least significant bits. The most sensitive methods for the detection of bit replacement do not work well when the payload is concentrated at the start of the cover instead of being spread evenly over it, so ...


Security Enhancement of the Authentication Protocol for RFID Systems

Yung-Cheng Lee; Wen-Chung Kuo; Y. -C Hsieh; T. -C. Chen 2009 Fifth International Conference on Information Assurance and Security, 2009

RFID is a convenient and efficient mechanism used for identification or authentication in industry, agriculture, commerce, health care, entrance control, etc. Most of the RFID systems need security mechanisms for authentication and privacy protection. In 2004, Gao et al. propose a RFID system for supply chain, their system has drawbacks on security. Recently, Chen et al. proposed an improvement to ...


More eLearning Resources

IEEE-USA E-Books

  • Systems Engineering

    This chapter contains sections titled: So What Is Systems Engineering? Process Management Organization Environments Chapter Summary Further Reading and Resources Questions Exercises

  • Foundation Concepts

    This chapter contains sections titled: Security Concepts and Goals Role of Cryptology in Information Security Key Management Revisited Chapter Summary Further Reading and Resources Questions Exercises

  • GENERAL COMPUTER SECURITY ARCHITECTURE

    This chapter considers security capabilities within computing and communications devices. It considers the software that resides next to the hardware and controls the use of system resources by applications. The networking subsystem supported by the element software is responsible for the confidentiality and integrity of information transferred among elements, for the authentication of elements to one another, and for user authentication and access control in distributed systems. The chapter focuses on the element security software components, primarily for the kernel, security contexts, security-critical functions, and operating system (OS) implementations. OS implementations structured to use the common kernel interface to obtain basic services should be able to be closely controlled from an authorization perspective relatively easily since most hardware dependencies will be visible only in the kernel and the device drivers. Physical and administrative security mechanisms are the first lines of defense used to achieve security objectives.

  • Authentication of Subjects

    This chapter contains sections titled: Authentication Systems Human Authentication Chapter Summary Further Reading and Resources Questions Exercises

  • COMPUTER SOFTWARE SECURITY

    This chapter considers security of applications, examining security threats to applications, and how to mitigate these threats. It first looks at the various aspects of security in any general-purpose unix and linux operating systems (OSs). The chapter then describes the role-based access control as implemented in the Solaris OS. Based on the protection ring model, Windows security components operate in two modes: the kernel mode (protection ring 0) and the user mode (protection ring 3). Next, the chapter focuses on the VXworks- and pSOS-type embedded OSs as these differ the most from the general-purpose OSs. It also shows how buffer overflows could be exploited in applications through stack and heap manipulations. Application software is a primary target and a major source of security problems. Finally, the chapter looks at anti-malware applications available for windows and unix-type OS.

  • Security Systems Engineering

    This chapter contains sections titled: Security Policy Development Senior Management Oversight and Involvement Security Process Management and Standards Information Security Systems Engineering Methodology Requirements Analysis and Decomposition Access Control Concepts Security Modeling and Security-Related Standards Chapter Summary Questions Exercises

  • SECURITY SYSTEMS DESIGN??-??DESIGNING NETWORK SECURITY

    This chapter first examines protocol layers 1,2, and 3 of the available security mechanisms and explores their deployment possibilities within networking protocols. Network Physical layer media types include: metallic or fiber-optic cables/wires used for interconnecting network elements; radio frequency signals transmitted through air used for wireless communications; or visible, or invisible, laser light signals transmitted through air or water. Within the Data Link layer, the encountered security devices are IEEE 802.1x, IEEE 802. 1ae and IEEE 802.11 WPA and 802.11i. The chapter then considers the security capabilities, uses, and deficiencies for each of these technologies. Next, it covers the advantages and limitations of providing security at the Network layer, via the IP security (IPsec) framework of protocols, for secure channel establishment. Finally, the filtering and inspection of packets are discussed as forms of network and host access control (authorization).

  • Traditional Network Concepts

    This chapter contains sections titled: Networking Architectures Types of Networks Network Protocols Chapter Summary Further Reading and Resources Questions Exercises

  • Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety

    Some Internet of Things (IoT) subsystems will be far less robust than others. Systems that rely on these sensors require considerable knowledge about the sensors, their calibration, test conditions, manufacturers' recommended maintenance procedures. Despite the drive toward increased dataset variety, and while Big Data has had a correspondingly large impact on containerization and DevOps, the impact on information assurance (IA) has been incremental. This chapter surveys approaches to leverage Big Data techniques to enhance IoT provenance, which is itself only one of multiple measures needed to improve information assurance. A number of thus far loosely connected approaches are identified and addressed. Systematic use of concept of complex event processing (CEP) can improve on current information assurance practices, especially if its paradigms and design practices are more widely incorporated into IoT architectures. Big Data is changing the nature of work for Chief Security Officers (CSO), auditors, and forensic investigators.

  • About the Author

    No abstract.



Standards related to Information Assurance

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...