Conferences related to Internet Security

Back to Top

ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


2020 IEEE Frontiers in Education Conference (FIE)

The Frontiers in Education (FIE) Conference is a major international conference focusing on educational innovations and research in engineering and computing education. FIE 2019 continues a long tradition of disseminating results in engineering and computing education. It is an ideal forum for sharing ideas, learning about developments and interacting with colleagues inthese fields.


ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


2020 IEEE 18th International Conference on Industrial Informatics (INDIN)

INDIN focuses on recent developments, deployments, technology trends, and research results in Industrial Informatics-related fields from both industry and academia


IEEE INFOCOM 2020 - IEEE Conference on Computer Communications

IEEE INFOCOM solicits research papers describing significant and innovative researchcontributions to the field of computer and data communication networks. We invite submissionson a wide range of research topics, spanning both theoretical and systems research.



Periodicals related to Internet Security

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...



Most published Xplore authors for Internet Security

Back to Top

Xplore Articles related to Internet Security

Back to Top

Internet security games as a pedagogic tool for teaching network security

Proceedings Frontiers in Education 35th Annual Conference, 2005

This research investigates the suitability of online security games as a pedagogic tool, for teaching network security in an educational framework. Based on the advanced challenges they provide, we have selected security games offered by Next Generation Security. Our research is based on network security principles, a core module in MSc Network Security at Anglia Polytechnic University. We compare two ...


The end of end-to-end security? [Internet security]

IEEE Security & Privacy, 2006

In 1984, a year after the Arpanet switched from using the Network Control Protocol to using the TCP/IP protocol suite, Jerry Saltzer, David Reed, and Dave Clark expressed what became the core concept of the Internet in a short paper titled "End-to-End Arguments in System Design." This philosophy has been followed for more than two decades. This paper explains both ...


Design and implement of mobile internet security middleware

2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering, 2013

The security middleware for mobile internet is composed of embedded hardware and monitoring software, where the hardware includes the CPU with Linux kernel, Flash memory, Ethernet interface, wireless network card with AP function. While the main program of the software system launches the sub- process to catch packets uploaded or downloaded from the client terminal, and then the sub-process pass ...


Migration of Internet security protocols to the IPSEC framework

Proceedings. 36th Annual 2002 International Carnahan Conference on Security Technology, 2002

Nowadays it is clear that security protocols will implement a very important part of the communications accomplished through the future Internet. Efforts made by the IETF have produced the first Internet Protocol version that includes security services, this framework is called IPSEC and it is a flexible solution designed taking into account the heterogeneity of the Internet. In fact the ...


Internet security, and firewalls protection on the internet

Professional Program Proceedings. ELECTRO '96, 1996

Looks at various aspects of internet security, and firewalls protection on the internet. In particular the author looks at the business dilemma; security risks; internet security; inter-company security; intranet security; integrated security; firewall concepts; firewall limitations and functions; Digital's firewall family; layered security; encrypted tunneling; other security issues; and future trends.



Educational Resources on Internet Security

Back to Top

IEEE.tv Videos

Eric Vyncke: Internet of Things and Security: Different than Network Security? - WF-IoT 2015
Bob Martin on Industrial Internet Reference Architecture: 2016 End to End Trust and Security Workshop for the Internet of Things
Antonio Skarmeta: Security and Privacy in the Internet of Things - WF-IoT 2015
Luca Bolognini: Internet of Things: Privacy and Security Challenges - WF-IoT 2015
Defense Machines: Towards Autonomous Network Security Systems - Aman Singh - ICRC 2018
Don't Get Hooked: Safe Strategies on the Net
The Internet of Things, An Overview: Karen O'Donoghue Addresses Issues and Challenges of a More Connected World -- 2016 End to End Trust and Security Workshop for the Internet of Things
IoT Security Best Practices - Webinar by George Corser and Jared Bielby
Introductions: Experts in Technology and Policy (ETAP) Forum on Internet Governance, Cybersecurity and Privacy - February 2016
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 3
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 1
Ricardo Neisse: Security Certification and Labeling in the Internet of Things: WF-IoT 2016
Juan Carlos Zuniga on Wi-Fi Privacy at IEEE 802 & IETF: 2016 End to End Trust and Security Workshop for the Internet of Things
William J. Miller on Sensei-IoT: 2016 End to End Trust and Security Workshop for the Internet of Things
Joe Klein: IoT Security - Industry Forum Panel: WF IoT 2016
Closing Panel at 2016 End to End Trust and Security Workshop for the Internet of Things
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 2
Q&A: ARMOUR and Security Certification: WF-IoT 2016
Security and Privacy in a World of Connected Devices
IEEE Summit on Internet Governance 2014: Panel II - Security vs. Privacy

IEEE-USA E-Books

  • Internet security games as a pedagogic tool for teaching network security

    This research investigates the suitability of online security games as a pedagogic tool, for teaching network security in an educational framework. Based on the advanced challenges they provide, we have selected security games offered by Next Generation Security. Our research is based on network security principles, a core module in MSc Network Security at Anglia Polytechnic University. We compare two cohorts; both were given lectures and laboratory sessions. Only for the second group laboratory sessions were conducted by means of security games. We consider the game usage and views expressed by lecturers and students, to assess whether this method can be usefully incorporated in teaching specific sections of information security. Online and offline course feedback and interviews are used to assess the student experience. Quantitative and qualitative data gathered from this empirical study is analysed to derive conclusions. Advantages, discontents and educational concerns of this method are discussed. Deviation from current learning paradigms is addressed, in relation to the use of pure Internet based tools

  • The end of end-to-end security? [Internet security]

    In 1984, a year after the Arpanet switched from using the Network Control Protocol to using the TCP/IP protocol suite, Jerry Saltzer, David Reed, and Dave Clark expressed what became the core concept of the Internet in a short paper titled "End-to-End Arguments in System Design." This philosophy has been followed for more than two decades. This paper explains both the dynamic generative effect of the Internet and its security issues

  • Design and implement of mobile internet security middleware

    The security middleware for mobile internet is composed of embedded hardware and monitoring software, where the hardware includes the CPU with Linux kernel, Flash memory, Ethernet interface, wireless network card with AP function. While the main program of the software system launches the sub- process to catch packets uploaded or downloaded from the client terminal, and then the sub-process pass the captured packets to main program. After analyzing the data, the adverse information of the packets is stored to the backend server. The security middleware is with AP function, supports the terminal of wireless interface to access the internet for communication. The users can define the data monitoring keyword which can come from network layer, transition layer or application layer. By monitoring the packets' transition process in the data link layer, we store the packets containing sensitive and discord information and send to the remote database server for the record. The equipment has low cost, small volume and light weight, convenient carrying and installation, especially suitable for public transportation subway and small office. The security middleware monitor does not affect the speed of internet access, and the energy consumption is low, more energy saving and environmental protection.

  • Migration of Internet security protocols to the IPSEC framework

    Nowadays it is clear that security protocols will implement a very important part of the communications accomplished through the future Internet. Efforts made by the IETF have produced the first Internet Protocol version that includes security services, this framework is called IPSEC and it is a flexible solution designed taking into account the heterogeneity of the Internet. In fact the IPSEC mechanisms supply confidentiality, integrity and authentication of IP packets (implemented by the Authentication Header -AHand the Encapsulated Security Payload -ESP). But this new framework also provides another security service that is not widely known, this is the ISAKMP protocol (Internet Security Association and Key Management Protocol) that allows negotiating security parameters over the Internet. Those security parameters include the cipher algorithm to use the cipher key, the hash function, etc. These parameters are grouped in a Security Association that will be referenced in the first step of the security protocol. The ISAKMP is used by AH and ESP to establish the security associations needed to accomplish the protocols. However ISAKMP advantages can be exploited by any other security protocol, and in this way it will be possible to avoid the duplicity of single purpose negotiations of security parameters. Current security protocols negotiate parameters by exchanging messages. SSL is an example where the first part of its message is used to negotiate the security parameters. We describe a methodology for the migration of aged security protocols to an ISAKMP negotiation. We identify the phases for the migration from the definition of a domain of interpretation to specify the parameters that must be included into the security associations.

  • Internet security, and firewalls protection on the internet

    Looks at various aspects of internet security, and firewalls protection on the internet. In particular the author looks at the business dilemma; security risks; internet security; inter-company security; intranet security; integrated security; firewall concepts; firewall limitations and functions; Digital's firewall family; layered security; encrypted tunneling; other security issues; and future trends.

  • Ensemble Clustering for Internet Security Applications

    Due to their damage to Internet security, malware and phishing website detection has been the Internet security topics that are of great interests. Compared with malware attacks, phishing website fraud is a relatively new Internet crime. However, they share some common properties: 1) both malware samples and phishing websites are created at a rate of thousands per day driven by economic benefits; and 2) phishing websites represented by the term frequencies of the webpage content share similar characteristics with malware samples represented by the instruction frequencies of the program. Over the past few years, many clustering techniques have been employed for automatic malware and phishing website detection. In these techniques, the detection process is generally divided into two steps: 1) feature extraction, where representative features are extracted to capture the characteristics of the file samples or the websites; and 2) categorization, where intelligent techniques are used to automatically group the file samples or websites into different classes based on computational analysis of the feature representations. However, few have been applied in real industry products. In this paper, we develop an automatic categorization system to automatically group phishing websites or malware samples using a cluster ensemble by aggregating the clustering solutions that are generated by different base clustering algorithms. We propose a principled cluster ensemble framework to combine individual clustering solutions that are based on the consensus partition, which can not only be applied for malware categorization, but also for phishing website clustering. In addition, the domain knowledge in the form of sample-level/website-level constraints can be naturally incorporated into the ensemble framework. The case studies on large and real daily phishing websites and malware collection from the Kingsoft Internet Security Laboratory demonstrate the effectiveness and efficiency of our proposed method.

  • How Internet Security Breaches Harm Market Value

    Internet security in stock market was the topic in this paper. Decision-tree induction is effective for examining the factors influencing abnormal stock market returns after a public security breach announcement. Extending a previous study, the authors identify new relationships between abnormal returns and firm and attack characteristics and subject them to statistical testing.

  • A Comprehensive Approach to Designing Internet Security Taxonomy

    With the dramatic increase of the use of the Internet and its applications that require a high level of security services, such as e-commerce transactions and online banking, it is quiet useful to formulate a systematic approach to analyze the security services, and countermeasures which are directly associated with each security attack. Taxonomy is one of the keys to understanding the security threats that the Internet is facing today and the countermeasure approaches that should be devised in order to keep the Internet as secure as possible. In this paper, we propose a novel Internet security taxonomy. This taxonomy is based on a mapping of today's Internet security services against the corresponding security attacks and countermeasures. An assessment of the performance of the proposed taxonomy is also discussed

  • Future trends in Internet security

    The Internet is, by far, one of the most significant achievements in recent history. When it was designed and started as Arpanet in the 1970s, the Internet was never intended to be secure or open for commercial use. In the 1980s, the Internet was structured to accommodate 43 billion potential network addresses. It afforded roughly one address for every person on earth. Yet today, with more than 50 million users on-line, the address space is getting short. The solution, yet to be implemented and deployed, is the Internet Protocol v6 (IPv6), or IP next generation IPng. IPv6 will offer better security and performance and will allow a wide range (up to 3/spl times/10/sup 38/) of nodes. Nodes will include almost any device anyone can imagine; even sensors, doors, and cars will have IP addresses so they can be controlled from afar. The Internet seems to be the infrastructure for the global village but without security, not only e-commerce is in danger, but also human lives could be at stake. The paper discusses future trends in Internet security and government regulations.

  • International Curricula Networks for Recognition of Life Long Learning Programs: A Case Study of a Bit Sized e-Learning Module in Internet Security

    The ELLEIEC ERASMUS thematic network runs from October 2008, and it will finish in to September 2011. This project deals with several aspects linked to LifeLong Learning (LLL) in Electrical and Information Engineering in Europe. One of the actions of the project is to set some ICN (International Curricula Networks) in some disciplines (specialties in EIE) and levels (Bachelor or Master) aiming at defining the necessary learning outcomes for some curricula. The definition of these learning outcomes defined and agreed at the European level by the ICNs, can be used for AEL (Accreditation of Experience Learning) by European workers who want to validate some diploma, corresponding to their actual knowledge and skills. AEL could be partial, so it is crucial to have the possibility, for workers who need it, to validate some modules, prepared either in a classical class or remotely. The modules (or pieces of modules) which are available remotely to students, and agreed by the partners of the ICN, are called IM (International Modules). In this paper we also describe a case study based in a piece of module, denoted as bit sized module, about Internet security. This bit sized module is a part of a bigger one in the Professional Bachelor's Degree in Computer Networks and Telecommunications taught at the University Joseph Fourier in Grenoble since September 2007.



Standards related to Internet Security

Back to Top

No standards are currently tagged "Internet Security"