Conferences related to Cyberspace

Back to Top

2020 IEEE International Symposium on Antennas and Propagation and North American Radio Science Meeting

The joint meeting is intended to provide an international forum for the exchange of information on state of the art research in the area of antennas and propagation, electromagnetic engineering and radio science


2020 IEEE Radio and Wireless Symposium (RWS)

RWW2020 will be an international conference covering all aspects of radio and wireless. RWW2020's multidisciplinary events will bring together innovations that are happening across the broad wireless spectrum. RWS2020, this conference application, acts as the main conference for the entire RWW of events that includes the following conferences: PAWR2020, SiRF2020, WiSNet2020, and TWiOS2020 (IEEE Topical Conference on RF/microwave Power Amplifiers, IEEE Topical Meeting on Silicon Monolithic Integrated Circuits in RF Systems, IEEE Topical Conference on Wireless Sensors and Sensor Networks, and IEEE Topical Workshop on the Internet of Space IoS, respectively). In addition to traditional podium presentations and poster sessions, tracks for IEEE Distinguished Lectures, Sunday half-day workshops, Monday panels, and a demo session are planned. A RWW2020 plenary talk are a parallel IoT Summit are planned. A student competition is also planned.

  • 2019 IEEE Radio and Wireless Symposium (RWS)

    This is a conference with a focus on wireless components, applications, and systems that impact both our current and future life style. The conference's main niche is to bring together technologists, circuit designers, system designers, and entrepreneurs at a single event. It was and is the place where these worlds meet, where new processes and systems can be benchmarked against the needs of circuit designers at the bleeding edge of RF systems, where today's design compromises can trigger tomorrow's advanced technologies. Where dreams can become a reality. RWS is the cornerstone conference for Radio Wireless Week.

  • 2018 IEEE Radio and Wireless Symposium (RWS)

    This is a set of five conferences with a focus on wireless components, applications, and systems that effect both now and our future life style. These conferences main niche is to bring together technologists, circuit designers, system designers, and entrepreneurs at a single event. It was and is the place where these worlds meet, where new processes and systems can be benchmarked against the needs of circuit designers at the bleeding edge of RF systems, where today’s design compromises can trigger tomorrow’s advanced technologies. Where dreams can become a reality.

  • 2017 IEEE Radio and Wireless Symposium (RWS)

    This is a set of five conferences with a focus on wireless components, applications, and systems that effect both now and our future life style. These conferences main niche is to bring together technologists, circuit designers, system designers, and entrepreneurs at a single event. It was and is the place where these worlds meet, where new processes and systems can be benchmarked against the needs of circuit designers at the bleeding edge of RF systems, where today’s design compromises can trigger tomorrow’s advanced technologies. Where dreams can become a reality.

  • 2016 IEEE Radio and Wireless Symposium (RWS)

    This is a set of five conferences with a focus on wireless components, applications, and systems that effect both now and our future life style. These conferences main niche is to bring together technologists, circuit designers, system designers, and entrepreneurs at a single event. It was and is the place where these worlds meet, where new processes and systems can be bench-marked against the needs of circuit designers at the bleeding edge of RF systems, where today

  • 2015 IEEE Radio and Wireless Symposium (RWS)

    This is a set of five conferences with a focus on wireless components, applications, and systems that effect both now and our future life style. These conferences main niche is to bring together technologists, circuit designers, system designers, and entrepreneurs at a single event. It was and is the place where these worlds meet, where new processes and systems can be benchmarked against the needs of circuit designers at the bleeding edge of RF systems, where today

  • 2014 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss hardware design and system performance of the state -of-the-art wireless systems. Includes an expanded program on the latest information on wireless communications and networking, and associated enabling technologies as new services and applications emerge.

  • 2013 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss hardware design and system performance of the state-of-the-art wireless systems. Includes an expanded program on the latest information on wireless communications and networking, and associated enabling technologies as new services and applications emerge.

  • 2012 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss hardware design and system performance of the state-of-the-art wireless systems. Includes an expanded program on the latest information on wireless communications and networking, and associated enabling technologies as new services and applications emerge.

  • 2011 IEEE Radio and Wireless Symposium (RWS)

    All aspects of components and systems related to radio and wireless networks.

  • 2010 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss various aspects of wireless communication systems and the state-of-the-art in both fields by exploring the connections between hardware design and system performance.

  • 2009 IEEE Radio and Wireless Symposium (RWS)

    This symposium highlights the state of the art of hardware and systems of radio and wireless

  • 2008 IEEE Radio and Wireless Symposium (RWS)

  • 2007 IEEE Radio and Wireless Symposium (RWS)

  • 2006 IEEE Radio and Wireless Symposium (RWS)

  • 2004 IEEE Radio and Wireless Conference - (RAWCON 2004)

  • 2003 IEEE Radio and Wireless Conference - (RAWCON 2003)

  • 2002 IEEE Radio and Wireless Conference - (RAWCON 2002)

  • 2001 IEEE Radio and Wireless Conference - (RAWCON 2001)

  • 2000 IEEE Radio and Wireless Conference - (RAWCON 2000)

  • 1999 IEEE Radio and Wireless Conference - (RAWCON '99)

  • 1998 IEEE Radio and Wireless Conference - (RAWCON '98)


2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)

Computer in Technical Systems, Intelligent Systems, Distributed Computing and VisualizationSystems, Communication Systems, Information Systems Security, Digital Economy, Computersin Education, Microelectronics, Electronic Technology, Education


2019 IEEE 17th World Symposium on Applied Machine Intelligence and Informatics (SAMI)

Computational Intelligence and Intelligent Technologies are very important tools in building intelligent systems with various degree of autonomous behaviour. These groups of tools support such features as ability to learn and adaptability of the intelligent systems in various types ofenvironments and situations. The current and future Information Society is expecting to be implemented with the framework of the Ambient Intelligence (AmI) approach into technologies and everyday life.

  • 2018 IEEE 16th World Symposium on Applied Machine Intelligence and Informatics (SAMI)

    Computational Intelligence and Intelligent Technologies are very important tools in building intelligent systems with various degree of autonomous behavior. These groups of tools support such features as ability to learn and adaptability of the intelligent systems in various types ofenvironments and situations. The current and future Information Society is expecting to be implemented with the framework of the Ambient Intelligence (AmI) approach into technologies and everyday life.

  • 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)

    Computational Intelligence and Intelligent Technologies are very important tools in building intelligent systems with various degree of autonomous behavior. These groups of tools support such features as ability to learn and adaptability of the intelligent systems in various types ofenvironments and situations. The current and future Information Society is expecting to beimplemented with the framework of the Ambient Intelligence (AmI) approach into technologiesand everyday life.

  • 2016 IEEE 14th International Symposium on Applied Machine Intelligence and Informatics (SAMI)

    Computational Intelligence and Intelligent Technologies are very important tools in building intelligent systems with various degree of autonomous behavior. These groups of tools support such features as ability to learn and adaptability of the intelligent systems in various types ofenvironments and situations. The current and future Information Society is expecting to be implemented with the framework of the Ambient Intelligence (AmI) approach into technologies and everyday life.

  • 2015 IEEE 13th International Symposium on Applied Machine Intelligence and Informatics (SAMI)

    Computational Intelligence and Intelligent Technologies are very important tools in buildingintelligent systems with various degree of autonomous behavior. These groups of tools supportsuch features as ability to learn and adaptability of the intelligent systems in various types ofenvironments and situations. The current and future Information Society is expecting to beimplemented with the framework of the Ambient Intelligence (AmI) approach into technologiesand everyday life.

  • 2014 IEEE 12th International Symposium on Applied Machine Intelligence and Informatics (SAMI)

    Computational Intelligence and Intelligent Technologies are very important tools in building intelligent systems with various degree of autonomous behavior. These groups of tools support such features as ability to learn and adaptability of the intelligent systems in various types of environments and situations. The current and future Information Society is expecting to be implemented with the framework of the Ambient Intelligence (AmI) approach into technologies and everyday life.

  • 2013 IEEE 11th International Symposium on Applied Machine Intelligence and Informatics (SAMI)

    Computational Intelligence and Intelligent Technologies are very important tools inbuilding intelligent systems with various degree of autonomous behavior. These groups of tools support suchfeatures as ability to learn and adaptability of the intelligent systems in various types of environments andsituations. The current and future Information Society is expecting to be implemented with the framework ofthe Ambient Intelligence (AmI) approach into technologies and everyday life.

  • 2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)

    Computational Intelligence and Intelligent Technologies are very important tools in building intelligent systems with various degree of autonomous behavior. These groups of tools support such features as ability to learn and adaptability of the intelligent systems in various types of environments and situations. The current and future Information Society is expecting to be implemented with the framework of the Ambient Intelligence (AmI) approach into technologies and everyday life.

  • 2011 IEEE 9th International Symposium on Applied Machine Intelligence and Informatics (SAMI)

    Computational Intelligence and Intelligent Technologies are very important tools in building intelligent systems with various degree of autonomous behavior. These groups of tools support such features as ability to learn and adaptability of the intelligent systems in various types of environments and situations. The current and future Information Society is expecting to be implemented with the framework of the Ambient Intelligence (AmI) approach into technologies and everyday life.

  • 2010 IEEE 8th International Symposium on Applied Machine Intelligence and Informatics (SAMI)

    Computational Intelligence and Intelligent Technologies are very important tools in building intelligent systems with various degree of autonomous behavior. These groups of tools support such features as ability to learn and adaptability of the intelligent systems in various types of environments and situations. The current and future Information Society is expecting to be implemented with the framework of the Ambient Intelligence (AmI) approach into technologies and everyday life.

  • 2009 7th International Symposium on Applied Machine Intelligence and Informatics (SAMI 2009)

    Computational Intelligence and Intelligent Technologies are very important tools in building intelligent systems with various degree of autonomous behavior. These groups of tools support such features as ability to learn and adaptability of the intelligent systems in various types of environments and situations. The current and future Information Society is expecting to be implemented with the framework of the Ambient Intelligence (AmI) approach into technologies and everyday life. These accomplishments pro

  • 2008 6th International Symposium on Applied Machine Intelligence and Informatics (SAMI 2008)

    Topics include but not limited to * Intelligent Robotics * Intelligent Mechatronics * Computational Intelligence * Artificial Intelligence * CAD/CAM/CAE Systems * Intelligent Manufacturing Systems * Man-Machine Systems * Systems Engineering


2019 Winter Simulation Conference (WSC)

WSC is the premier international forum for disseminating recent advances in the field of system simulation. In addition to a technical program of unsurpassed scope and quality, WSC provides the central meeting for practitioners, researchers, and vendors.


More Conferences

Periodicals related to Cyberspace

Back to Top

Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computational Biology and Bioinformatics, IEEE/ACM Transactions on

Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


More Periodicals

Most published Xplore authors for Cyberspace

Back to Top

Xplore Articles related to Cyberspace

Back to Top

Research of cyberspace architecture

International Conference on Cyberspace Technology (CCT 2013), 2013

With the developments of cyberspace, more and more technologies can be used in cyberspace, designing a new architecture for cyberspace is extremely urgent. The research of cyberspace will be important significance. In this paper, we will research the architecture of cyberspace, and construct a new architecture based on wisdom. Then the security services supplied by cyberspace is given based on ...


Wisdom security model against internal attackers for cyberspace

International Conference on Cyberspace Technology (CCT 2013), 2013

This paper investigates a wisdom security model against internal attackers for cyberspace. The objective is to find the defensive measures are optimized with respect to threats launched by malicious attackers, and allow the defenders to choose their optimal control strategies contingent upon the state of game. Our model provides a new method to effectively decrease the number of attackers in ...


Cyberspace based wisdom

International Conference on Cyberspace Technology (CCT 2013), 2013

With the development of network technology, this kind of “virtual world” becomes practical. In this paper, we propose a novel architecture for Cyber- space with wisdom, and describe the wisdom of Cyber-space.


E-commerce law in cyberspace: Issues, challenges and suggestion

International Conference on Cyberspace Technology (CCT 2013), 2013

This paper focuses legislative status of intellectual property and e-commerce's electronic payment, taxes, electronic signatures and electronic authentication in the cyber-space. It detailedly analyzes them and puts forward solutions.


Space Information Security and Cyberspace Defense Technology

2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, 2013

Cyberspace countermeasure brings huge threat for space system, which relies on information network heavily. Usually, the position of most space information network nodes is fixed, and the messages transfer in standard format. As a result, space information network is vulnerable to cyberspace attack based on offensive information access. In this paper, space information network characteristic and cyberspace security requirement are ...


More Xplore Articles

Educational Resources on Cyberspace

Back to Top

IEEE-USA E-Books

  • Research of cyberspace architecture

    With the developments of cyberspace, more and more technologies can be used in cyberspace, designing a new architecture for cyberspace is extremely urgent. The research of cyberspace will be important significance. In this paper, we will research the architecture of cyberspace, and construct a new architecture based on wisdom. Then the security services supplied by cyberspace is given based on the wisdom architecture.

  • Wisdom security model against internal attackers for cyberspace

    This paper investigates a wisdom security model against internal attackers for cyberspace. The objective is to find the defensive measures are optimized with respect to threats launched by malicious attackers, and allow the defenders to choose their optimal control strategies contingent upon the state of game. Our model provides a new method to effectively decrease the number of attackers in cyberspace under the optimal control strategies of the defenders.

  • Cyberspace based wisdom

    With the development of network technology, this kind of “virtual world” becomes practical. In this paper, we propose a novel architecture for Cyber- space with wisdom, and describe the wisdom of Cyber-space.

  • E-commerce law in cyberspace: Issues, challenges and suggestion

    This paper focuses legislative status of intellectual property and e-commerce's electronic payment, taxes, electronic signatures and electronic authentication in the cyber-space. It detailedly analyzes them and puts forward solutions.

  • Space Information Security and Cyberspace Defense Technology

    Cyberspace countermeasure brings huge threat for space system, which relies on information network heavily. Usually, the position of most space information network nodes is fixed, and the messages transfer in standard format. As a result, space information network is vulnerable to cyberspace attack based on offensive information access. In this paper, space information network characteristic and cyberspace security requirement are analyzed. A new situation awareness and information defense strategy is proposed by combining multi-domain approaches, and the key model, method and technology are studied. The research results can provide reference for space information network security research and cyberspace defense technology research.

  • Study of cryptography-based cyberspace data security

    The definition of cyberspace, characteristics of cyberspace data and the security risks are analyzed firstly. The cyberspace data security assurance architecture is then elaborated. On the basis of that, cryptography-based cyberspace data security reference model is designed. According to this model, the basic procedure and key technology of cyberspace data protecting are researched through data generation, data transmission, data storage, data usage and data destruction of the full lifecycle. In this paper, we study the cyberspace data security from a perspective of technological framework, looking forward to make a useful attempt at solving this problem.

  • Hierarchical, Multi-perspectives Model for Cyberspace Situation Awareness

    Cyberspace situation awareness (CSA) is the base of cyberspace operations (CO). A right decision of CO is based on the correct awareness of the cyberspace situation. The paper analyzes two classical models, and then takes account of the characteristics of cyberspace operations, finally proposes a hierarchical, multi-perspectives model. The model employs three perspectives and four layers. The model is more suitable for the CO or even cyber war. And the idea of describing the cyberspace situation from multi-aspects is useful for all kinds of problems.

  • Privacy Governance in Cyberspace

    Cyberspace is the processing, manipulation, and exploitation of information; the facilitation and augmentation of communication among people; and the interaction of people, information, and devices. The main characteristic of cyberspace is the interconnection of computers, information, devices, and people. Many actors are involved in cyberspace's construction and operation -- namely, telcos; application, service, and content providers; users; and governments. The issue of privacy protection is a global challenge that requires a global response. The regulation of privacy in cyberspace depends on regulatory, technical, and social factors. Multistakeholder mechanisms can be a promising way to deal with privacy policies in the global cyberspace.

  • Effectiveness Evaluation on Cyberspace Security Defense System

    Cyberspace is a complicated system of computer, network and other information environments. To evaluate its security defense ability, the offensive and defensive features in cyberspace were discussed in this paper, firstly. Then index system and evaluation model were proposed. Based on analytic hierarchy process method, cyberspace security defense system was decomposed from its ability aspect. Fuzzy theory and information entropy weight coefficient method were applied to solve the complexity and uncertainty of the defense effectiveness. The study indicates that this evaluation model can objectively and effectively evaluate the cyberspace defense effectiveness, and lay the foundation for the promotion of cyberspace security defense ability.

  • The topography of cyberspace and its consequences for operations

    For all the focus on cyberspace as a source of security threats and a domain of military operations, there has been little progress on establishing a consistent approach to describing what constitutes cyberspace. Dozens of definitions of the term "cyberspace" have been developed, but consensus on its essential attributes has yet to be achieved. Similarly, a number of different models have been offered to describe cyberspace in terms of layers, such as the physical, logical and cyber persona layers used in US Joint Publication 3-12, Cyberspace Operations. This paper argues that cyberspace as a label for a domain should not be confused with the individual networks - some interconnected ("open") and some relatively isolated ("closed") - involved in military operations. As illustrated by the STEADFAST COBALT exercise, military operations often involve a complex set of networks. The paper then uses the example of the Internet to illustrate the need to take a topographical approach - one that identifies the features of the objects or entities and their structural relationships - to enable effective military operations. This more detailed topographical view of the Internet is used to illustrate how cyberspace considerations relate to existing operational doctrine such as concepts from the operational environment (Joint Operational Area and Area of Interest). Some considerations fit well within this framework. Others require some adaptation, such as shifting some responsibilities to a centralized and persistent function such as the Cyberspace Operations Centre (CyOC) being established by NATO. Others fall outside military control and are better addressed through civil-military cooperation. This example also illustrates how precision in describing the composition of cyberspace is essential if military operations in and through cyberspace are to develop into a mature discipline with a solid base of concepts, terminology, techniques, tactics and procedures.



Standards related to Cyberspace

Back to Top

No standards are currently tagged "Cyberspace"


Jobs related to Cyberspace

Back to Top