Conferences related to Mobile Security

Back to Top

2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Bi-Annual IEEE PES T&D conference. Largest T&D conference in North America.


2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2005 IEEE Symposium on Security and Privacy (SRSP)

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2022 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2023 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.


2020 IEEE Frontiers in Education Conference (FIE)

The Frontiers in Education (FIE) Conference is a major international conference focusing on educational innovations and research in engineering and computing education. FIE 2019 continues a long tradition of disseminating results in engineering and computing education. It is an ideal forum for sharing ideas, learning about developments and interacting with colleagues inthese fields.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


SoutheastCon 2020

SoutheastCon is the annual Region 3 conference that brings together engineering professionals, students, and volunteers for a weekend of technical presentations, meetings, student competitions, and volunteer education.

  • SOUTHEASTCON '96

  • SOUTHEASTCON '97

  • SOUTHEASTCON '98

  • SOUTHEASTCON '99

  • SOUTHEASTCON 2000

  • SOUTHEASTCON 2001

  • SOUTHEASTCON 2002

  • SOUTHEASTCON 2003

  • SOUTHEASTCON 2004

  • SOUTHEASTCON 2005

  • SOUTHEASTCON 2006

  • SOUTHEASTCON 2007

  • SOUTHEASTCON 2008

    SoutheastCon is the Southeastern USA Region of the IEEE's premier conference. It contains three main sections: a technical program, student competitions and regional meetings. SouthEastCon features technical papers, tutorials and exhibits.

  • SOUTHEASTCON 2009

    It is the annual IEEE Region 3 Technical, Professional, and Student Conference. As the premier conference for the IEEE Region 3, it brings together electrical, computer and other engineering and science professionals, faculty and students to share the latest information through technical sessions, tutorials and exhibits. The conference schedule includes: a technical program with seminars, tutorials, and workshops; exhibits; a student program with student competitions; and IEEE regional meetings.

  • SOUTHEASTCON 2010

    SoutheastCon 2010 is the Region 3 event which includes a student conference, a technical conference, and the Region 3 business meeting.

  • SOUTHEASTCON 2011

    IEEE SoutheastCon2011 is the annual IEEE Region 3 technical, professional, and student conference, invites conference refereed and non-refereed technical paper presentations and tutorials that advance the work and careers of conference attendees in the areas of interest for the conference.

  • SOUTHEASTCON 2012

    The annual IEEE SoutheastCon conferences promote all aspects of the theories and applications of the engineering disciplines. Sponsored by the IEEE Region 03, this event attracts researchers, professionals, and students from the Southeast region of the U.S and beyond. SoutheastCon 2012 will be held in Orlando, Florida.

  • IEEE SOUTHEASTCON 2013

    Region 3 Meeting, Technical papers, student competitions.

  • SOUTHEASTCON 2014

    Horizontal Technical Conference with all topics; students compete in multiple competions; Region 3 training meetings.

  • SoutheastCon 2015

    Horizontal Technical Conference with all topics; students compete in multiple competions; Region 3 training meetings.

  • SoutheastCon 2016

    Annual Region 3 Trifecta of Student competitions, Technical papers and volunteer training and administration.

  • SoutheastCon 2017

    Broad scope professional paper conference, region 3 annual meeting, region 3 annual student conference

  • SoutheastCon 2018

    SoutheastCon is a annual conference held in Region 3 and covers a Professional Track, Student Track and Regional Track.

  • SoutheastCon 2019

    The annual IEEE SoutheastCon conferences promote all aspects of theories and applications of engineering disciplines. Sponsored by the IEEE Region-3 and IEEE Huntsville Section, this event will attract researchers, professionals, and students from the Southeastern region of the U.S. SoutheastCon 2019 will feature tutorial sessions, workshops, Technical Programs, and student Hardware, Software, Ethics, Paper, Web competitions.

  • SoutheastCon 2021

    IEEE SoutheastCon is the annual IEEE Region 3 Student, Professional, and awards conference.



Periodicals related to Mobile Security

Back to Top

Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...



Most published Xplore authors for Mobile Security

Back to Top

Xplore Articles related to Mobile Security

Back to Top

Mobile security technology for smart devices

2015 International Conference on Information and Communication Technology Convergence (ICTC), 2015

While the number of smartphones increased, the security threats such as violating privacy and malicious code in smart environment increased. In general, the software security scheme is mainly used to protect mobile device from the security threat. However, this security scheme can be easily manipulated and changed. In this paper, we propose MTM hardware based mobile device security technology to ...


Offline Mobile Security

2018 International Conference on Smart City and Emerging Technology (ICSCET), 2018

Currently smartphone and other mobile devices have become incredibly significant in every facet of our life. They are practically offering same abilities as desktop workstations and are also powerful in terms of CPU, storage space and installing several applications. Therefore, security is deliberated as a vital factor in wireless communication technologies. Furthermore, based on growing range of mobile applications within ...


Learning Mobile Security with Labware

IEEE Security & Privacy, 2014

As smart mobile devices become increasingly popular, so do the incentives for attackers. Mobile devices' prevalence and mobile threats' rapid growth have resulted in a shortage of mobile-security personnel. We need educational activities to promote mobile-security education and meet the emerging industry and education needs. However, mobile security is a relatively weak area in most schools' computing curriculum. To remedy ...


Trusted military services based on the secure domain of the mobile security solution

2015 International Conference on Information and Communication Technology Convergence (ICTC), 2015

The number of smartphone users has increased rapidly. The interests of many people have grown how to prevent the leakage of security data of their enterprises. There are the technologies for using smartphone devices safely by separating the personal area and the business area. The technologies to assure security when using smartphone devices with open-platform in tight security environment such ...


Mobile security labware with smart devices for cybersecurity education

IEEE 2nd Integrated STEM Education Conference, 2012

Smart mobile devices such as smartphones and tablets have become an integral part of our society. However, it also becomes a prime target for attackers with malicious intents. There have been a number of efforts on developing innovative courseware to promote cybersecurity education and to improve student learning; however, hands-on labs are not well developed for smart mobile devices and ...



Educational Resources on Mobile Security

Back to Top

IEEE-USA E-Books

  • Mobile security technology for smart devices

    While the number of smartphones increased, the security threats such as violating privacy and malicious code in smart environment increased. In general, the software security scheme is mainly used to protect mobile device from the security threat. However, this security scheme can be easily manipulated and changed. In this paper, we propose MTM hardware based mobile device security technology to prevent data leakage and unauthorized access.

  • Offline Mobile Security

    Currently smartphone and other mobile devices have become incredibly significant in every facet of our life. They are practically offering same abilities as desktop workstations and are also powerful in terms of CPU, storage space and installing several applications. Therefore, security is deliberated as a vital factor in wireless communication technologies. Furthermore, based on growing range of mobile applications within variety of platforms, security is regarded as one of the most valuable and substantial debate in terms of issues, trustees, consistencies and accurateness. The worst security threat is that when your device has been lost or stolen. This paper aims to introduce an offline android application wherein the mobile phones which get lost by mistake or stolen by thief, then the application will help to get the device back by performing various operations on remote mobile devices. The approach will be to send offline messages from the genuine user with help of android devices to the one which is stolen. This developed application will be installed on any android device. The user of the app will set the verification code on his device. This code is the key which the user need to type along with the contact name in order to get recognized. The app always runs in background waiting for the incoming message.

  • Learning Mobile Security with Labware

    As smart mobile devices become increasingly popular, so do the incentives for attackers. Mobile devices' prevalence and mobile threats' rapid growth have resulted in a shortage of mobile-security personnel. We need educational activities to promote mobile-security education and meet the emerging industry and education needs. However, mobile security is a relatively weak area in most schools' computing curriculum. To remedy this, educators are exploring an approach to mobile-security education that exploits the benefits of mobile devices and best practices in information security education. The approach aims to promote students' interests and increase their self-efficacy. To improve student learning, the educators developed a collection of labware using Android devices and tested it in classroom settings.

  • Trusted military services based on the secure domain of the mobile security solution

    The number of smartphone users has increased rapidly. The interests of many people have grown how to prevent the leakage of security data of their enterprises. There are the technologies for using smartphone devices safely by separating the personal area and the business area. The technologies to assure security when using smartphone devices with open-platform in tight security environment such as financial service, medical service, military service, and so on are needed. The Mobile Security Solution presented in this paper provides users with secure services in the open platform based smart mobile devices by building the Secure Domain that is isolated from the normal domain by applying virtualization technologies. In this paper, we describe the structure and the operation procedures of Mobile Security Solutions and the possible services of the military using the Mobile Security Solution. We also describe the enhanced security aspects in each service of them when applying Mobile Security Solutions to the military in this paper.

  • Mobile security labware with smart devices for cybersecurity education

    Smart mobile devices such as smartphones and tablets have become an integral part of our society. However, it also becomes a prime target for attackers with malicious intents. There have been a number of efforts on developing innovative courseware to promote cybersecurity education and to improve student learning; however, hands-on labs are not well developed for smart mobile devices and for mobile security topics. In this paper, we propose to design and develop a mobile security labware with smart mobile devices to promote the cybersecurity education. The integration of mobile computing technologies and smart devices into cybersecurity education will connect the education to leading-edge information technologies, motivate and engage students in security learning, fill in the gap with IT industry need, and help faculties build expertise on mobile computing. In addition, the hands-on experience with mobile app development will promote student learning and supply them with a better understanding of security knowledge not only in classical security domains but also in the emerging mobile security areas.

  • Toward assessing the impact of mobile security issues in pedagogical delivery: A mobile learning case study

    The hackers' incentive to attack mobile devices is growing along with people's increasing reliance on mobile technology usage. Mobile applications, text messaging and wireless networks open devices up to attack. Despite security risks mobile technologies have been reported to be instrumental in reshaping tertiary education in developing countries. While mobile security threats are a concern and mobile technologies' potential to boost productivity in Higher education increases, little has been done to assess the impact of mobile security risks against utilization of hand-held technologies for learning. This paper argues that mobile security risks have a significant impact on mobile learning adoption. Drawing on the Unified Theory of Acceptance and Use of Technology (UTAUT) factors that promote Mobile Instant Messaging (MIM) for learning adoption will be examined by exploring the pedagogical application of WhatsApp mobile software. Stratified random sampling was employed to select 20 interviewees. Findings of this study suggest that mobile security threats negatively affect intentions to use WhatsApp strategy for learning, hence extending the UTAUT.

  • A comparison of TCP and SSL for mobile security

    In recent years, the use of mobile device is growing fast. The prevalence of mobile devices and the rapid growth of mobile threats have resulted in a shortage of personnel trained to handle mobile security As mobile platforms grow increasingly in popularity, so do the incentives for attackers. Mobile security, which is emerging security of network and message, is seen as a most important field in the future of mobile development. This paper presents the comparison between Transmission Control Protocol (TCP) connection and TCP with Secure Sockets Layer (SSL) in Android device, aiming at finding more security communicated method when surfing the Internet. In experiments, TCPDump is used for capture the traffic packages during the communication between client and server. Based on our experiments, we make a conclusion that TCP with SSL is more secure, compared with TCP connection which provides reliable, ordered, error-check delivery of a stream between server and client. Due to encrypt and decrypt data, transmission speed is more slow than normal. In the future, we will explore how to increase transmission speed.

  • Authentic learning of mobile security with case studies

    This work-in-progress paper presents an approach to authentic learning of mobile security through real-world-scenario case studies. Five sets of case studies are being developed to cover the state-of-the-art of mobile security knowledge and practices. Some of the developed case studies are being implemented in related courses and the preliminary feedback is positive.

  • Cognitive Mobile Security: Invited Conference Keynote

    Mobile devices carry a number of vulnerabilities that, when exploited, can result in proprietary-data leakage, data alteration, fraudulent transactions and, in extreme cases, physical damage to the user and surroundings. Such attacks can be instigated by both outsiders and insiders, and can leverage vulnerabilities embedded in the hardware and software components of the device, as well as risky behavioral actions undertaken by the legitimate user of the device. Existing mobile security management solutions offer a wide range of configuration, tracking, and management features via device and container management, policy-based configuration, single sign-on, application whitelisting and/or blacklisting, as well as reputation and anti-malware services. A primary feature that none of the existing solutions has is \emph {context-aware anomaly detection}. We propose a novel cognitive solution for mobile security based on context awareness. Our solution focuses on mobile management tools that understand long-term context-aware behavior anomalies on multiple devices.

  • Security architecture for smart devices

    In this paper, we described security threats on smart devices and proposed the security architecture for smart devices. The proposed security architecture for smart devices is the separated and hardware-based security solution which is strong more than only software-based solutions. In recent, smart devices have been widely used and are becoming an important and serious issue of security. For protecting from security threats, various security solutions have been studied and provided, but they still have security vulnerabilities and limitations for smart devices. Therefore, for the more efficient security solutions for smart devices, we described the analysis of current mobile security solutions and recommended the security architecture for building secure execution environment on smart devices.



Standards related to Mobile Security

Back to Top

No standards are currently tagged "Mobile Security"