Conferences related to Information Assurance

Back to Top

2017 IEEE AUTOTESTCON

IEEE AUTOTESTCON is also known as the Systems Readiness Technology Conference. This major conference and exposition provides focus on the maintenance aspects of systems readiness and providing Mission Assurance through Advanced ATE (Automatic Test Equpmenrt/Systems). This includes Maintenance Repair & Overhaul as well as factory and development automated test equipment. This conference brings military and aerospace industry principals together to share new concepts, technologies and applications in this essential field of supportability and sustainability. The conference includes a major exhibit of exciting new products from a wide variety of exhibitors, and provides the opportunity to meet with senior military and aerospace leaders to discuss their future needs and expectations and the ways in which we can satisfy those needs.

  • 2014 IEEE AUTOTEST

    IEEE AUTOTESTCON is the world s only conference that focuses primarily on Automated Test and related technology for military, government and aerospace applications. The conference also has an expanded focus into commercial areas that share a common technical base, including aerospace, vehicle and automotive, and commercial factory test applications. Autotestcon provides a unique opportunity to discuss platform support requirements with all DoD Branches, provides hands-on experience with test equipment, and

  • 2013 IEEE AUTOTESTCON

    Content focused on automatic test systems for US military systems.

  • 2012 IEEE AUTOTESTCON

    Automated Test Systems (ATE) and related technologies such as Test Program Sets for US military and defense equipment

  • 2011 IEEE AUTOTESTCON

    Annual conference of the automatic testing industry.

  • 2010 IEEE AUTOTESTCON

    IEEE AUTOTESTCON, The Support Systems Technology Conference, is the largest conference focused on automatic test systems for military and aerospace systems, and has been held annually since 1965. It features more than 120 quality application-focused papers and 250 Exhibits. Attendance ranges between 650 and 750 registered professionals.

  • 2009 IEEE AUTOTESTCON

    Automated Test, Test Technology, and related Support Systems for Defense Systems.

  • 2008 IEEE AUTOTESTCON

    All theoretical and application aspects for an appropriate topic dealing with system readiness, in general, and automatic test technology, in particular. In keeping with our conference theme "Surpassing the Limits-Forging Ahead" our focus will be on new ideas and concepts, unusual testing solutions, and future technologies, e.g. ATE Architectures, Artificial Intelligence in Test, ATE/TPS Development Techniques, ATE/TPS Management, BIT/BIST

  • 2007 IEEE AUTOTESTCON

  • 2006 IEEE AUTOTESTCON


2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invited sessions of the latest significant findings and developments in all the major fields of biomedical engineering. Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.

  • 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The conference will cover diverse topics ranging from biomedical engineering to healthcare technologies to medical and clinical applications. The conference program will consist of invited plenary lectures, symposia, workshops, invited sessions and oral and poster sessions of unsolicited contributions. All papers will be peer reviewed and accepted papers of up to 4 pages will appear in the Conference Proceedings and be indexed by IEEE Xplore and Medline/PubMed.

  • 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The conference program will consist of plenary lectures, symposia, workshops and invited sessions of the latest significant findings and developments in all the major fields of biomedical engineering. Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.

  • 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The Annual International Conference of the IEEE Engineering in Medicine and Biology Society covers a broad spectrum of topics from biomedical engineering and physics to medical and clinical applications. The conference program will consist of invited plenary lectures, symposia, workshops, invited sessions, oral and poster sessions of unsolicited contributions. All papers will be peer reviewed and accepted papers of up to 4 pages will appear in the Conference Proceedings and be indexed by PubMed and EI. Prop

  • 2012 34th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc

  • 2011 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc.

  • 2010 32nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc

  • 2009 31st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc

  • 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The general theme of EMBC'08 is "Personalized Healthcare through Technology", covering a broad spectrum of topics from biomedical and clinical engineering and physics to medical and clinical applications. Transfer of research results from academia to industry will also be a focus of the conference.

  • 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)


2012 11th International Conference on Signal Processing (ICSP 2012)

Signal Processing; Speech and Audio Coding; Image Processing; Computer Vision;; Video compression; Pattern Recognition; Statistic Machine Learning; Wireless and Communications; Radar Signal Processing; Biometrics; Authentification; Sonar Signal Processing ; Sensor Networks

  • 2010 10th International Conference on Signal Processing (ICSP 2010)

    Digital Signal Processing (DSP); Spectrum Estimation & Modeling; TF Spectrum Analysis & Wavelet; Higher Order Spectral Analysis; Adaptive Filtering &SP; Array Signal Processing; Hardware Implementation for SP; Speech and Audio Coding; Speech Synthesis & Recognition; Image Processing & Understanding; PDE for Image Processing;Video compression &Streaming; Computer Vision & VR; Multimedia & Human-computer Interaction; Statistic Learning,ML & Pattern Recognition; AI & Neural Networks; Communication Signal proce

  • 2008 9th International Conference on Signal Processing (ICSP 2008)

  • 2006 8th International Conference on Signal Processing (ICSP 2006)


MILCOM 2012 - 2012 IEEE Military Communications Conference

MILCOM 2012 gives industry the opportunity to promote communications technologies and services to commanders from all branches of the armed forces, Department of Defense, federal government, and the heads of multi-national forces from around the globe.


2009 International Joint Conference on e-Business and Telecommunications (ICETE)

This is an international joint multiconference aim at bringing together researchers, engineers, scientists, practitioners in information and communication technologies and systems including e-business, wireless network s and systems, information assurance and security and cryptography, signal processing and multimedia applications. It will have 4 conferences that will be held at same time (namely, ICE-B 2009, SCRYPT 2009, SIGMAP 2009, and WINSYS 2009) under the umbrella of ICETE 2009. See: www.icete.org fo


More Conferences

Periodicals related to Information Assurance

Back to Top

Education, IEEE Transactions on

Educational methods, technology, and programs; history of technology; impact of evolving research on education.


IT Professional

This IEEE Computer Society periodical covers the many rapidly emerging issues facing information technology professionals, developers, and managers of enterprise information systems. IT Professional's coverage areas include: Web services, Internet security, data management; enterprise architectures and infrastructures; organizing and utilizing data; instituting cross-functional systems; using IT for competitive breakthroughs; integrating systems and capitalizing on IT advances; emerging technologies like electronic ...


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Software, IEEE

IEEE Software's mission is to build the community of leading and future software practitioners. The magazine delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change. The authority on translating software theory into practice, IEEE Software is positioned between pure research and pure practice, transferring ideas, methods, and experiences among researchers and engineers. ...



Most published Xplore authors for Information Assurance

Back to Top

Xplore Articles related to Information Assurance

Back to Top

Image Enhancement Based on Nonsubsampled Contourlet Transform

Yuxin Ma; Jiancang Xie; Jungang Luo 2009 Fifth International Conference on Information Assurance and Security, 2009

Based on nonsubsampled contourlet transform and image statistical property, an image enhancement method is presented. A noise variance estimate algorithm is given using nonsubsampled Laplace Pyramid decompose, and a wake edge enhancement algorithm using directional local neighborhood is proposed. This paper estimates the variance in each decomposed direction, and the directional local neighborhood statics is used to distinguish the strong ...


Development of a Java-Oriented Software General Component Library

Han Xiao; Zu-xun Zhang; Qiang Wang; Hua-liang Hu 2009 Fifth International Conference on Information Assurance and Security, 2009

In order to promote the reuse ability of software, the domain engineering- based development method is used. A design architecture and software architecture in domain information system are presented. The paper emphasizes model architecture of domain information system and the design of the general component library. The system implements a general component library to mark, inspect, classify and administrate components. ...


Invertible authentication watermark for JPEG images

J. Fridrich; M. Goljan; Rui Du Proceedings International Conference on Information Technology: Coding and Computing, 2001

We present two new invertible watermarking methods for authentication of digital images in the JPEG format. While virtually all previous authentication watermarking schemes introduced some small amount of non-invertible distortion in the image, the new methods are invertible in the sense that, if the image is deemed authentic, the distortion due to authentication can be completely removed to obtain the ...


A technique for digital watermarking in combined spatial and transform domains using chaotic maps

Amir Anees; Adil Masood Siddiqui 2013 2nd National Conference on Information Assurance (NCIA), 2013

In this paper, the problems of robustness and quantity of embedded watermark of digital watermarking linked with independent spatial and frequency domains have been analysed. In attempt to overcome these problems to some extent, we have proposed a technique for watermarking in combined spatial and frequency domains based upon chaotic maps. By applying chaos effectively in secure communication, the strength ...


Toward Linking Information Assurance and Air and Missile Defense Mission Metrics

A. K. Castner; M. H. Henry; R. R. J. Jailall; V. H. Nguyen; B. L. Paulhamus; E. P. Reilly 2010 IEEE Second International Conference on Social Computing, 2010

With the growing reliance on net-centric warfare, understanding the effect of information operations (IO) on the overall mission becomes increasingly important. Our research seeks to develop metrics that provide insight into the mission-level effect of IO. We approach this goal by proposing comprehensive mission success metrics that provide a vehicle to analyze correlation with proposed information metrics. A quantitative analysis ...


More Xplore Articles

Educational Resources on Information Assurance

Back to Top

eLearning

Image Enhancement Based on Nonsubsampled Contourlet Transform

Yuxin Ma; Jiancang Xie; Jungang Luo 2009 Fifth International Conference on Information Assurance and Security, 2009

Based on nonsubsampled contourlet transform and image statistical property, an image enhancement method is presented. A noise variance estimate algorithm is given using nonsubsampled Laplace Pyramid decompose, and a wake edge enhancement algorithm using directional local neighborhood is proposed. This paper estimates the variance in each decomposed direction, and the directional local neighborhood statics is used to distinguish the strong ...


Development of a Java-Oriented Software General Component Library

Han Xiao; Zu-xun Zhang; Qiang Wang; Hua-liang Hu 2009 Fifth International Conference on Information Assurance and Security, 2009

In order to promote the reuse ability of software, the domain engineering- based development method is used. A design architecture and software architecture in domain information system are presented. The paper emphasizes model architecture of domain information system and the design of the general component library. The system implements a general component library to mark, inspect, classify and administrate components. ...


Invertible authentication watermark for JPEG images

J. Fridrich; M. Goljan; Rui Du Proceedings International Conference on Information Technology: Coding and Computing, 2001

We present two new invertible watermarking methods for authentication of digital images in the JPEG format. While virtually all previous authentication watermarking schemes introduced some small amount of non-invertible distortion in the image, the new methods are invertible in the sense that, if the image is deemed authentic, the distortion due to authentication can be completely removed to obtain the ...


A technique for digital watermarking in combined spatial and transform domains using chaotic maps

Amir Anees; Adil Masood Siddiqui 2013 2nd National Conference on Information Assurance (NCIA), 2013

In this paper, the problems of robustness and quantity of embedded watermark of digital watermarking linked with independent spatial and frequency domains have been analysed. In attempt to overcome these problems to some extent, we have proposed a technique for watermarking in combined spatial and frequency domains based upon chaotic maps. By applying chaos effectively in secure communication, the strength ...


Toward Linking Information Assurance and Air and Missile Defense Mission Metrics

A. K. Castner; M. H. Henry; R. R. J. Jailall; V. H. Nguyen; B. L. Paulhamus; E. P. Reilly 2010 IEEE Second International Conference on Social Computing, 2010

With the growing reliance on net-centric warfare, understanding the effect of information operations (IO) on the overall mission becomes increasingly important. Our research seeks to develop metrics that provide insight into the mission-level effect of IO. We approach this goal by proposing comprehensive mission success metrics that provide a vehicle to analyze correlation with proposed information metrics. A quantitative analysis ...


More eLearning Resources

IEEE-USA E-Books

  • Front Matter

    The prelims comprise: Half-Title Page Title Page Copyright Page Dedications Contents Preface and Acknowledgments About the Companion Website

  • WHAT IS SECURITY?

    The central role of computer security for the working of the economy, the defense of the country, and the protection of the individual privacy is universally acknowledged today. Secure information systems must work reliably despite random errors, disturbances, and malicious attacks. This chapter examines a number of general ways of discussing security, including the common body of knowledge (CBK), by-function, and then systems engineering approaches. CBK is the critical body of knowledge that serves as a framework of security concepts, definitions, and principles that foster understanding of best practices among those engaged in activities related to information assurance/security. Confidentiality, integrity, and availability (CIA) are the core tenets of information security and are widespread over all the domains of the CBK. The chapter considers the many general security concepts and complexities associated with issues of safety, and information availability, and enterprise infrastructures. It also discusses some basic perspectives on information security.

  • About the Author

    No abstract.

  • Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety

    Some Internet of Things (IoT) subsystems will be far less robust than others. Systems that rely on these sensors require considerable knowledge about the sensors, their calibration, test conditions, manufacturers' recommended maintenance procedures. Despite the drive toward increased dataset variety, and while Big Data has had a correspondingly large impact on containerization and DevOps, the impact on information assurance (IA) has been incremental. This chapter surveys approaches to leverage Big Data techniques to enhance IoT provenance, which is itself only one of multiple measures needed to improve information assurance. A number of thus far loosely connected approaches are identified and addressed. Systematic use of concept of complex event processing (CEP) can improve on current information assurance practices, especially if its paradigms and design practices are more widely incorporated into IoT architectures. Big Data is changing the nature of work for Chief Security Officers (CSO), auditors, and forensic investigators.

  • Perceived Threat Modeling for Cyber???Physical Systems

    Physical security is a critical component used to safeguard employees and prevent unauthorized access to critical infrastructures. This chapter presents the analysis of each of the three constructs, cognitive demographics, situational characteristics, and probability of intrusion, based on the perceived threat model. To fully understand the need for better physical security software systems, the chapter presents reviews the physical security and the associated software limitations. Information assurance (IA) is typically addressed from a logical security perspective due to the large volume of digitally stored information. A physical security system (PSS) is designed to employ a complementary combination of six components: intrusion detection and assessment, entry and search control, barriers, communications, testing and maintenance, and support systems, which are used to deter, detect, and delay an attack. The content analysis of the cognitive demographic construct demonstrated that subjects had different dispositions toward decision???making.

  • SYSTEMS ENGINEERING

    Systems engineering focuses on defining customer needs and required functionality early in the development cycle and then refining and documenting requirements that represent those needs. This approach continues into design synthesis, development, system validation, deployment, and retirement while considering the complete problem. This chapter begins with an exploration of the concepts of systems engineering and then follows with consideration of process management from both the ISO 9000 series and capability maturity model integration (CMMI) perspectives. Next, it discusses the fact that all organizations have to accommodate outside forces, including regulations/legislation, technology evolution, customer demands and expectations, legal liability, competition, and finally terrorism and cybercrime. Each of these forces has a significant impact on the organization's business practices, and some actually dictate aspects of an organization's information security program. The chapter then considers organization environments for both commercial and non-commercial organizations and concludes with a description of the national critical infrastructure.

  • Index

    No abstract.

  • What is Security?

    This chapter contains sections titled: Introduction The Subject of Security A Twenty-First Century Tale Why are You Important to Computer Security? End of the Beginning Chapter Summary Further Reading and Resources Questions Exercises

  • SECURITY SYSTEMS DESIGN??-??DESIGNING NETWORK SECURITY

    This chapter first examines protocol layers 1,2, and 3 of the available security mechanisms and explores their deployment possibilities within networking protocols. Network Physical layer media types include: metallic or fiber-optic cables/wires used for interconnecting network elements; radio frequency signals transmitted through air used for wireless communications; or visible, or invisible, laser light signals transmitted through air or water. Within the Data Link layer, the encountered security devices are IEEE 802.1x, IEEE 802. 1ae and IEEE 802.11 WPA and 802.11i. The chapter then considers the security capabilities, uses, and deficiencies for each of these technologies. Next, it covers the advantages and limitations of providing security at the Network layer, via the IP security (IPsec) framework of protocols, for secure channel establishment. Finally, the filtering and inspection of packets are discussed as forms of network and host access control (authorization).

  • Security Systems Design - Designing Network Security

    This chapter contains sections titled: Introduction Security Design for Protocol Layer 1 Layer 2 - Data Link Security Mechanisms Security Design for Protocol Layer 3 IP Packet Authorization and Access Control Chapter Summary Further Reading and Resources Questions Exercises



Standards related to Information Assurance

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...