IEEE Organizations related to Cyberterrorism

Back to Top


Conferences related to Cyberterrorism

Back to Top

2019 21st International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI

  • 2004 6th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2018 20th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI



Periodicals related to Cyberterrorism

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


IT Professional

This IEEE Computer Society periodical covers the many rapidly emerging issues facing information technology professionals, developers, and managers of enterprise information systems. IT Professional's coverage areas include: Web services, Internet security, data management; enterprise architectures and infrastructures; organizing and utilizing data; instituting cross-functional systems; using IT for competitive breakthroughs; integrating systems and capitalizing on IT advances; emerging technologies like electronic ...


Multimedia, IEEE

IEEE Multimedia Magazine covers a broad range of issues in multimedia systems and applications. Articles, product reviews, new product descriptions, book reviews, and announcements of conferences and workshops cover topics that include hardware and software for media compression, coding and processing; media representations and standards for storage, editing, interchange, transmission and presentation; hardware platforms supporting multimedia applications; operating systems suitable ...


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...



Most published Xplore authors for Cyberterrorism

Back to Top

Xplore Articles related to Cyberterrorism

Back to Top

An inquiry into international countermeasures against cyberterrorism

The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005., 2005

The dependence on information technology has created a new form of vulnerability for society can be highly disturbed by those who can manipulate information technology for illegal purposes. Cyberterrorism using information technologies to attack important infrastructures can soon become a real menace to the national security. Many developed countries have been considering these threats of cyberterrorism. The purpose of this ...


Help for cyberterrorism: Y2K's silver lining

IT Professional, 1999

We have seen numerous concerted efforts to deal with worldwide problems that potentially affected everyone, such as world wars and health hazards. We are now witnessing a different kind of global mobilization to conquer the Y2K problem. To remedy the Y2K problem, IT departments throughout the world have had to direct enormous resources to perform an in-depth analysis of their ...


Missing Solutions in the Fight against Cybercrime and Cyberterrorism—The New EU Research Agenda

2016 European Intelligence and Security Informatics Conference (EISIC), 2016

Cybercrime and cyberterrorism remain important problems of today's society. Insufficient resources for the fight against cybercrime and cyberterrorism require research activities in this field to be allocated where the gaps exist. This paper presents results of the COURAGE project process to identify missing research items in the area of cybercrime and cyberterrorism. In total, 12 main issues that need further ...


Terror goes online [cyberterrorism]

IEEE Spectrum, 2005

According to the book entitled "Terror on the Internet: The New Arena, the New Challenges" by Gabriel Weimann, the threat of cyberterrorism may be overstated. Weimann says the odds of a terrorist using the virtual world to attack key physical infrastructure are remote and critical networks are inaccessible from the Internet. Terrorists, however, are using the Internet to search for ...


Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios

2015 10th International Conference on Availability, Reliability and Security, 2015

The development of future cyber terrorism scenarios is a key component in building a more comprehensive understanding of cyber threats that are likely to emerge in the near-to mid-term future. While developing concepts of likely new, emerging digital technologies is an important part of this process, this article suggests that understanding the psychological and social forces involved in cyber terrorism ...



Educational Resources on Cyberterrorism

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Cyberterrorism"

IEEE-USA E-Books

  • An inquiry into international countermeasures against cyberterrorism

    The dependence on information technology has created a new form of vulnerability for society can be highly disturbed by those who can manipulate information technology for illegal purposes. Cyberterrorism using information technologies to attack important infrastructures can soon become a real menace to the national security. Many developed countries have been considering these threats of cyberterrorism. The purpose of this paper is to examine the way of prevention of cyberterrorism and to determine what kind of legislation is effective to cyberterrorism, in order to decide whether there is a need for international action against it

  • Help for cyberterrorism: Y2K's silver lining

    We have seen numerous concerted efforts to deal with worldwide problems that potentially affected everyone, such as world wars and health hazards. We are now witnessing a different kind of global mobilization to conquer the Y2K problem. To remedy the Y2K problem, IT departments throughout the world have had to direct enormous resources to perform an in-depth analysis of their computers. We have inventoried software, hardware, and applications; fixed code; replaced noncompliant components and embedded chips; and developed contingency plans. Contingency planning is a major endeavor to ensure continuity of operations even if Y2K bugs persist and cause a system failure. In all this planning is 1st January 2000 the ideal time for a terrorist to strike? So now, as we turn the corner on Y2K, I believe we need to focus on this other large problem: terrorism through cyberspace-cyberterrorism. I consider cyberterrorism to be the use of information technology to disrupt critical infrastructure. Y2K can pay dividends by helping us to protect that infrastructure.

  • Missing Solutions in the Fight against Cybercrime and Cyberterrorism—The New EU Research Agenda

    Cybercrime and cyberterrorism remain important problems of today's society. Insufficient resources for the fight against cybercrime and cyberterrorism require research activities in this field to be allocated where the gaps exist. This paper presents results of the COURAGE project process to identify missing research items in the area of cybercrime and cyberterrorism. In total, 12 main issues that need further research are identified and described in detail. The results that are part of the COURAGE research agenda are important for various stakeholders, such as researchers, industry, policy makers, and law enforcement agencies.

  • Terror goes online [cyberterrorism]

    According to the book entitled "Terror on the Internet: The New Arena, the New Challenges" by Gabriel Weimann, the threat of cyberterrorism may be overstated. Weimann says the odds of a terrorist using the virtual world to attack key physical infrastructure are remote and critical networks are inaccessible from the Internet. Terrorists, however, are using the Internet to search for information about transportation, infrastructure, maps, shipping activity, economic data and even counterterrorism measures. They also use the Internet for fundraising and recruitment as well as getting their message across without censorship unlike traditional media.

  • Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios

    The development of future cyber terrorism scenarios is a key component in building a more comprehensive understanding of cyber threats that are likely to emerge in the near-to mid-term future. While developing concepts of likely new, emerging digital technologies is an important part of this process, this article suggests that understanding the psychological and social forces involved in cyber terrorism is also a key component in the analysis and that the synergy of these two dimensions may produce more accurate and detailed future cyber threat scenarios than either analytical element alone.

  • Combating Dangerous Conduct in Cyberspace: A Focus on Cyberterrorism

    This chapter contains sections titled: Denial-of-Service Attacks, February 2000: The Internet “Under Siege”, Run-of-the-Mill Hacking or Cyberterrorism?, Protecting Against Cyberterrorism: An Initial Assessment of Regulatory Options, Traditional Regulation under National Law, Developing New Laws to Counter Cyberterrorism and Address, Additional Regulation under the International Cooperation Model, Changing Internet Architecture to Maximize Security

  • Silver bullets and cybersecurity

    Within 24 hours in November 2002, a British hacker was indicted by the US justice Department for breaking into military and NASA computer systems and the US Congress passed a bill that funded $903 million for computer security initiatives (Wired.com, 14 Nov. 2002). Meanwhile, nearly every multimedia conference since 11 September 2001 has discussed the need for increased computer security, both in the public and private sector. Is this burgeoning field all hype? It seems that although some hype exists, the fears are warranted. On one hand, terrorists and "hacktivists" have employed various means to attack or shut down government sites since the Web's inception. On the other hand, despite grave warnings by the US government and security companies, we have not really seen great dangers of cyberterrorism in the private sector. What we have seen, however, is an increase in general hackers attacking the public and private sector either to prove they can, to cause aggravation, or for financial gain. The paper discusses basis security concerns, event management software and intrusion detection.

  • Diversifying cybersecurity education: A non-technical approach to technical studies

    Cybersecurity education does not only confine to the technical studies embodying network security, malware analysis and reverse reengineering, application security, and operating systems security. The increasing numbers of Cyberterrorism and incidents of hacktivism suggest that Cybersecurity pertains to politics, religion, and culture. Drawing on globalization shaped by the economic, legal, political, religion, and social dimensions, extant literature discloses that infusing social science, cultural and political studies into Cybersecurity education could better prepare students for the job market by making students realize the complexity in the real world. This study presents the efforts of integrating cultural, social, and political dimensions into the Cybersecurity curriculum in a public, regional university in the Midwest of the United States. In particular, this study presents the approaches of introducing intelligence analysis coursework that requires students to understand the analysis of competing hypotheses for drawing conclusion related to the possible Cyberattack from a foreign nation, identify the cultural differences across nations for comprehending the hacking motivation of a different nation, and recognize individual's cognitive and cultural biases during the process of evaluating a cultural event.

  • Terrorism and its Transition to Cyberspace

    This poster discuss the results of research carried out from various angles on the links and relationships existing between cyberspace and contemporary terrorism. In order to understand why terrorism is spreading increasingly into the virtual world, the poster is structured around two questions: whether cyberspace is terrorism's new battleground, and whether it is possible to differentiate cyberterrorism from terrorism online.

  • Challenges of Cybercrimes to Implementation of Legal Framework

    With the progressing technology there is a new breed of crimes that is capable of crossing geographical boundaries. Regulatory authorities and legal reforms do not have much capacity to control these crimes. Pakistan as developing country, is determined to follow legal and regulatory frameworks to control cyber terrorism. With emergence of 4G technology, people of Pakistan are venturing into online business and social media entertainment or communication, with rising number of cybercrimes every day. The need to completely eliminate cybercrimes hazard is becoming more important. This study is conducted on the subjects which were either part of victimization by cybercrimes or could identify some of the steps to stop cyberterrorism. The reasons include lack of awareness about cybercrimes, unemployment, lack of education and less implementation of cyber laws. The effects of cybercrimes on the society include reducing the personal growth of people both moral and economical, wastage of time and misrepresentation to the country's image. It also includes financial damages to large business. This research also focuses the awareness regarding offences to control the cybercrimes in Pakistan in context with legal reforms and cyber laws. Cyber act is the law for prevention of electronic crime act 2016. There is strong need of increasing social campaigns and against cybercrimes. People should adopt strong security measures to prevent themselves from cyber thieves.



Standards related to Cyberterrorism

Back to Top

No standards are currently tagged "Cyberterrorism"