Conferences related to Information Assurance

Back to Top

2020 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)

The Conference focuses on all aspects of instrumentation and measurement science andtechnology research development and applications. The list of program topics includes but isnot limited to: Measurement Science & Education, Measurement Systems, Measurement DataAcquisition, Measurements of Physical Quantities, and Measurement Applications.


2019 IEEE 46th Photovoltaic Specialists Conference (PVSC)

Photovoltaic materials, devices, systems and related science and technology


2019 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2019, the 26th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2019 IEEE International Systems Conference (SysCon)

addresses the discipline of systems engineering,including theory, technology, methodology, andapplications of complex systems, system-of-systems,and integrated systems of national and globalsignificance.

  • 2018 Annual IEEE International Systems Conference (SysCon)

    The Conference addresses the discipline of systemsengineering, including theory, technology, methodology,and applications of complex systems, system-of-systems,and integrated systems of national and globalsignificance. It focuses on Systems Engineering for Complex Systems; and the conference caters to both practitioners andacademics, providing a forum to exchange ideas andexperiences on technology, methodology, applications,study cases, and practical experiences.

  • 2017 Annual IEEE International Systems Conference (SysCon)

    The IEEE International Systems Conference facilitates interactions among communities of interest on system-level problems andapplications. System-level thinking is essential in the worldtoday, not only for technical systems, but also for societyat large. The Conference addresses the discipline of systemsengineering, including theory, technology, methodology,and applications of complex systems, system-of-systems,and integrated systems of national and globalsignificance.

  • 2016 Annual IEEE Systems Conference (SysCon)

    The theme of the IEEE International SystemsConference is Engineering of Complex Systems, to includeSystems-of-systems, Systems Engineering, Systems Integration,and Systems Thinking

  • 2015 Annual IEEE Systems Conference (SysCon)

    The theme of the IEEE International Systems Conference is Engineering of Complex Systems, to include Systems-of-systems, Systems Engineering, Systems Integration, and Systems Thinking.

  • 2014 8th Annual IEEE Systems Conference (SysCon)

    This conference seeks to create an interactive forum forthe advancement of the practice of systems engineeringacross the multiple disciplines and specialty areasassociated with the engineering of complex systems. Theconference will provide a venue for systems engineeringpractitioners, managers, researchers, and educators toexchange innovative concepts, ideas, applications, andlessons learned addressing: Applications-oriented topics on large-scale systemsand system-of-systems in topics noted below

  • 2013 7th Annual IEEE Systems Conference (SysCon)

    Conference addresses systems, complex systems, systems-of-systems, critical systems, and the systems engineering disciplines needed to implement such large-scale or complex systems in the international arena.

  • 2012 6th Annual IEEE Systems Conference (SysCon)

    The IEEE Systems Conference is Engineering Complex Integrated Systems and Systems-of-Systems Implications for Systems Engineering, Systems Integration, and Systems Thinking.

  • 2011 IEEE International Systems Conference (SysCon)

    IEEE International Systems Conference Scope is Engineering of Complex Systems, to include Systems-of-systems, Large-scale Systems Integration, and Systems Engineering and Systems Thinking.

  • 2010 4th Annual IEEE Systems Conference

    The theme of the IEEE Systems Conference is Engineering Complex Integrated Systems and Systems-of-systems Implications for Systems Engineering, Systems Integration, and Systems Thinking.

  • 2009 3rd Annual IEEE Systems Conference

    Engineering Comles Integtared Systems and Systems-of-Systems - Implications for Systems Engineering, Systems Integration, and Systems Thinking

  • 2008 2nd Annual IEEE Systems Conference

    The theme of the IEEE Systems Conference is Engineering Complex Integrated Systems and Systems-of-systems- Implications for Systems Engineering, Systems Integration, and Systems Thinking.

  • 2007 1st Annual IEEE Systems Conference

    The theme of the IEEE Systems Conference is Engineering Complex Integrated Systems and Systems-of-systems - Implications for Systems Engineering, Systems Integration, and Systems Thinking.


2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC)

To provide a forum for free discussions of new ideas, research, development and applications in order to stimulate and inspire pioneering work in the field of digital avionics and related areas.To acquire high quality technical papers for publication in a DASC Proceedings and other appropriate publications such as the AIAA Journal of Aircraft and IEEE Systems Magazine.To provide a meeting that will further the progress of AIAA and IEEE entities, including Societies, Technical Committees and local Sections and thereby better serve the interests of all AIAA and IEEE members and the community at large.To provide an atmosphere that strengthens the interpersonal rapport of a large number of engineers and scientists interested in specialized and closely related fields.To provide an exhibition of current hardware and software products, methods and tools.To provide instruction in advances in digital avionics and to encourage and reward student academic participation.


More Conferences

Periodicals related to Information Assurance

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Education, IEEE Transactions on

Educational methods, technology, and programs; history of technology; impact of evolving research on education.


Electron Devices, IEEE Transactions on

Publishes original and significant contributions relating to the theory, design, performance and reliability of electron devices, including optoelectronics devices, nanoscale devices, solid-state devices, integrated electronic devices, energy sources, power devices, displays, sensors, electro-mechanical devices, quantum devices and electron tubes.


More Periodicals

Most published Xplore authors for Information Assurance

Back to Top

Xplore Articles related to Information Assurance

Back to Top

Panel Session - Learning Modules for Security, Privacy and Information Assurance In Undergraduate Engineering Education

Proceedings. Frontiers in Education. 36th Annual Conference, 2006

Computer trustworthiness continues to increase in importance as a pressing scientific, economic, and social problem. In today's environment, there is heightened awareness of the threat of well-funded professional cyber hackers and the potential for nation-state sponsored cyber warfare. An accelerating trend of the last decade has been the growing integration role of computing and communication in critical infrastructure systems that ...


Novel technique for steganography in fingerprints images: Design and implementation

2010 Sixth International Conference on Information Assurance and Security, 2010

This paper describes the design and implementation of a project concerning the hiding of messages in images specifically fingerprint images. Fingerprints differentiate one person from another, and one finger from another. Every human being has twenty different fingerprints, and they do not have any similarity throughout the history of mankind. The policy of this project is to keep the confidential ...


Increasing minority participation in information assurance

2005 6th International Conference on Information Technology Based Higher Education and Training, 2005

In fall semester 2005, the Computer & Information Sciences Department at Florida Agricultural & Mechanical University, a historical black college and university, introduced an information assurance certificate track. The introduction of new courses into any curriculum presents the traditional problems. This paper provides an overview of our experience in establishing an undergraduate information assurance certificate program. Specifically, details are given ...


State observer based adaptive information assurance evaluation model

2010 IEEE International Conference on Wireless Communications, Networking and Information Security, 2010

Information Assurance (IA) is drawing considerable attention of researchers in protecting key intelligent system and state network infrastructure from attacks and intrusion. IA is a complex system engineering, the operation of IA is a dynamic adjust processing. This paper applied the system control theory in the IA to set up a multi-input and multi-output control system with output feedback. In ...


Visualizing an information assurance risk taxonomy

2011 IEEE Conference on Visual Analytics Science and Technology (VAST), 2011

The researchers explore the intersections between Information Assurance and Risk using visual analysis of text mining operations. The methodological approach involves searching for and extracting for analysis those abstracts and keywords groupings that relate to risk within a defined subset of scientific research journals. This analysis is conducted through a triangulated study incorporating visualizations produced using both Starlight and In-Spire ...


More Xplore Articles

Educational Resources on Information Assurance

Back to Top

IEEE-USA E-Books

  • Panel Session - Learning Modules for Security, Privacy and Information Assurance In Undergraduate Engineering Education

    Computer trustworthiness continues to increase in importance as a pressing scientific, economic, and social problem. In today's environment, there is heightened awareness of the threat of well-funded professional cyber hackers and the potential for nation-state sponsored cyber warfare. An accelerating trend of the last decade has been the growing integration role of computing and communication in critical infrastructure systems that now have complex interdependencies rooted in information technologies. These overlapping and interacting trends force us to recognize that trustworthiness of our computer systems is not an IT issue any more; it has a direct and immediate impact on our critical infrastructure. Security is often a collective enterprise, with complicated interdependencies and composition issues among a variety of participants. This poses a challenge for traditional engineering education models and curricula. The panel will discuss experiences and strategies to establish curricular foundation elements providing CSET graduates with an understanding of the interaction between cyber security, critical infrastructure systems and public policy

  • Novel technique for steganography in fingerprints images: Design and implementation

    This paper describes the design and implementation of a project concerning the hiding of messages in images specifically fingerprint images. Fingerprints differentiate one person from another, and one finger from another. Every human being has twenty different fingerprints, and they do not have any similarity throughout the history of mankind. The policy of this project is to keep the confidential messages hidden inside the drawing of the fingerprints. Due to the variations in shapes of the fingerprint that is carrying the hidden message, it would appear as if there is nothing inside the message. So, anyone who would try to concentrate and analyze the fingerprint, it will appear to him as if it belongs to a different person, and not the picture that has changed in looks and colors. This project will provide a system to serve both sender and receiver of the secret message. The sender will write the content of the message, and the system will hide it inside the new fingerprint, and then return it to the sender. So, that he could send it to the receiver in any way he deems necessary. When the receiver loads the fingerprint in the system, and asks for reading the message, the system would analyze the fingerprint, and display the content of the message to the receiver.

  • Increasing minority participation in information assurance

    In fall semester 2005, the Computer & Information Sciences Department at Florida Agricultural & Mechanical University, a historical black college and university, introduced an information assurance certificate track. The introduction of new courses into any curriculum presents the traditional problems. This paper provides an overview of our experience in establishing an undergraduate information assurance certificate program. Specifically, details are given about the new information assurance courses and the different instructional methodologies used. Additionally, a summary of student feedback, lesson learned by faculty, and possible future directions are given.

  • State observer based adaptive information assurance evaluation model

    Information Assurance (IA) is drawing considerable attention of researchers in protecting key intelligent system and state network infrastructure from attacks and intrusion. IA is a complex system engineering, the operation of IA is a dynamic adjust processing. This paper applied the system control theory in the IA to set up a multi-input and multi-output control system with output feedback. In the proposed model, the security of systems is quantified based on the security qualities of and interrelations between sub-systems. Simulation results show that this proposed model can meet the requirements of system security, and the model works well in the information assurance evaluation.

  • Visualizing an information assurance risk taxonomy

    The researchers explore the intersections between Information Assurance and Risk using visual analysis of text mining operations. The methodological approach involves searching for and extracting for analysis those abstracts and keywords groupings that relate to risk within a defined subset of scientific research journals. This analysis is conducted through a triangulated study incorporating visualizations produced using both Starlight and In-Spire visual analysis software. The results are definitional, showing current attitudes within the Information Assurance research community towards risk management strategies, while simultaneously demonstrating the value of visual analysis processes when engaging in sense making of a large body of knowledge.

  • A Low Cost, Portable Platform for Information Assurance and Security Education

    This paper presents a new inexpensive portable learning platform for information assurance and security (IAS) education. Unique features such as affordable settings, portability, and isolated network are discussed. This project is developed based on open sourced or free software to minimize the implementation cost. A dedicated repository that hosts our findings and deliverables is freely available online. This portable learning platform makes it possible to offer hands-on lab intensive curriculum online and to enhance research productivity on IAS.

  • Information Assurance in modern ATE

    For modern Automatic Test Equipment (ATE) one of the most daunting tasks is now Information Assurance (IA). What was once at most a secondary item consisting mainly of installing an Anti-Virus suite is now becoming one of the most important aspects of ATE. Given the current climate of IA it has become important to ensure ATE is kept safe from any breaches of security or loss of information. Even though most ATE are not on the Internet (or even on a network for many) they are still vulnerable to some of the same attack vectors plaguing common computers and other electronic devices. This paper will discuss some of the processes and procedures which must be used to ensure that modern ATE can continue to be used to test and detect faults in the systems they are designed to test. The common items that must be considered for ATE are as follows: The ATE system must have some form of Anti-Virus (as should all computers). The ATE system should have a minimum software footprint only providing the software needed to perform the task. The ATE system should be verified to have all the Operating System (OS) settings configured pursuant to the task it is intended to perform. The ATE OS settings should include password and password expiration settings to prevent access by anyone not expected to be on the system. The ATE system software should be written and constructed such that it in itself is not readily open to attack. The ATE system should be designed in a manner such that none of the instruments in the system can easily be attacked. The ATE system should insure any paths to the outside world (such as Ethernet or USB devices) are limited to only those required to perform the task it was designed for. These and many other common configuration concerns will be discussed in the paper.

  • Conflicts Among the Pillars of Information Assurance

    Interactions between the five pillars of information assurance-availability, integrity, authentication, confidentiality, and nonrepudiation-can be problematic. Measures taken to further the goal of one pillar are often blind to the needs of another pillar. The author explores such interactions using graphical forms to better represent conflicts. For example, availability might introduce conflicts with confidentiality, integrity and authentication, but confidentiality and integrity are largely complementary. This article is part of a special issue on security.

  • Building a University-wide Automated Information Assurance Awareness Exercise

    Students in an academic environment regularly install malware such as viruses and spyware on their personal computers and then connect to institutional automation resources. Malware reduces personal productivity and places a strain on university automation resources such as network bandwidth, email servers and enterprise storage servers. Technical products to malware detection and removal provide only a partial solution. Student education on information awareness can provide another vector to help deter malware installation. To test the effect of the information assurance education already in place at the United States Military Academy, we designed, built and ran an information awareness exercise system across the entire student body. The exercise was designed to target those counter-productive behaviors most prevalent in the student body. This paper discusses how we implemented the system and the results of the exercise

  • Experiences and lessons learned in the design and implementation of an Information Assurance curriculum

    In 2004, Dakota State University proposed a model for information assurance and computer security program development. That model provided a framework for developing undergraduate and graduate programs at DSU. This paper provides insight into experiences and lessons learned to further implement that model. The paper details modifications to both the undergraduate and graduate information assurance programs as a result of specific issues and challenges. Further, the paper highlights the introduction of a new terminal degree that includes an information assurance specialization. As a national center of excellence in information assurance education, we are confident that this paper will be helpful to universities around the world in either developing new or improving existing IA programs.



Standards related to Information Assurance

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


Systems and software engineering -- Software life cycle processes

This International Standard establishes a common framework for software life cycle processes, with welldefined terminology, that can be referenced by the software industry. It contains processes, activities, and tasks that are to be applied during the acquisition of a software product or service and during the supply, development, operation, maintenance and disposal of software products. Software includes the software portion ...