IEEE Organizations related to Bring Your Own Device

Back to Top

No organizations are currently tagged "Bring Your Own Device"



Conferences related to Bring Your Own Device

Back to Top

2019 21st International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI

  • 2018 20th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)

The ICIN conference, established in 1989 and praised for the richness of its social networking, is also recognized for its continuous adaptation to emerging technical trends.2019 will be the year of first large-scale 5G trials world-wide, targeting early network introduction, preliminary experimentation of network intelligence and orchestration solutions, and moving towards commercial large scale introduction in the 2020 horizon.At ICIN 2019, the driving theme is “Network AI and Zero-Touch Communication Systems”: we focus on the challenges related to the integration of analytics and orchestration solutions, enablers and methods, into automatic and autonomic service delivery and network management and operations. The conference will foster presentation of novel approaches and technical solutions, as well as experimental validation and proof of concepts.

  • 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)

    ICIN 2018 will be held 20-22 February 2018 at Orange Gardens premises near Paris, France. The ICIN conference, established in 1989 and praised for the richness of its social networking, is also recognized for its continuous adaptation to emerging technical trends.2018 will be the year of coordinated 5G deployment across all EU Member states, targeting early network introduction, and moving towards commercial large scale introduction by the end of 2020 at the latest.As the main theme for ICIN 2018, “5G Network Architecture and Solutions: are we ready?” will explore the maturity and gaps remaining for end-to-end and large scale 5G technologies deployment. The conference will foster presentation of novel approaches and technical solutions, as well as experimental validation and proof of concepts. In addition to this edition theme, ICIN 2018 will keep a wide range of topics of interest within the fields of Cloud, Internet, and Networks.

  • 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN)

    Since 1989 the ICIN series of conferences has been bringing together leading telecom and internet experts from industry, universities and government worldwide. ICIN operates on a rigorous peer review process and has become the established industry forum for addressing intelligence in Information and Communications Technology (ICT). ICIN conferences are renowned for their debates on the impact of emerging technology, architecture and industry trends on intelligent communications services. ICIN has an enviable track record of identifying key technology and service trends – and analysing their impact on business models – before they become widely recognized.

  • 2015 18th International Conference on Intelligence in Next Generation Networks (ICIN)

    Since 1989 the ICIN conferences have been bringing together leading internet and telecom experts from industry, universities and government worldwide. Major service providers and manufacturers from the most active markets worldwide have consistently contributed and provided insight on the technical and strategic directions that the industry is taking. ICIN operates on a rigorous peer review process and has an enviable track record of identifying key technology and service trends

  • 2013 17th International Conference on Intelligence in Next Generation Networks (ICIN): Unlocking Value from the Networks

    The primary focus of ICIN 2013 is twofold, addressing both how to make networks smarter with a stream on the transformation of Telcos

  • 2012 16th International Conference on Intelligence in Next Generation Networks (ICIN): Realising the Power of the Network

    ICIN addresses challenges of design, deployment, delivery, and management of services and applications over different platforms and diverse networks from both technical and business perspectives. The primary focus of ICIN 2012 is voice, data or multimedia services for enterprises or consumers that make use of capabilities in the operator network.

  • 2011 15th International Conference on Intelligence in Next Generation Networks (ICIN): "From Bits to Data, from Pipes to Clouds"

    Software-driven, context-aware services delivered and composed in the cloud and on smart devices will continue to transform the user experience and the ICT industry landscape. ICIN 2011 will bring together technical and business innovators to share their insight and experience of the technology, service and business transformation ahead.

  • 2010 14th International Conference on Intelligence in Next Generation Networks (ICIN): "Weaving Applications Into the Network Fabric"

    ICIN is a forum covering telecoms and web services and service architectures from both technical and business perspectives. ICIN 2010 will focus on new applications formed by weaving together emerging network capabilities, computational power, network and customer data, and content in valuable new and different patterns.

  • 2009 13th International Conference on Intelligence in Next Generation Networks (ICIN): "Beyond the Bit Pipes"

    ICIN 2009 will highlight the future services, enablers and architectures that will drive the market for communications products and services in the emerging high speed IP environment. The focus of ICIN 2009 will be on new and emerging business models, technology and value chains based on communications networks and devices.


2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)

We solicit original, unpublished research papers on computing technologies and visual languages for modeling, programming, communicating, and reasoning, which are easier to learn, use or understand by humans than the current state-of-the-art. Papers should focus on efforts to design, formalize, implement, or evaluate those technologies and languages. This includes tools and visual languages intended for general audiences (e.g. professional or novice programmers, or the public) or domain-specific audiences (e.g. people working in business administration, production environments, healthcare, urban design or scientific domains).


2018 41st International Conference on Telecommunications and Signal Processing (TSP)

The TSP 2018 Conference is organized by seventeen universities from Czech Rep., Hungary, Turkey, Taiwan, Japan, Slovak Rep., Spain, Bulgaria, France, Slovenia, Croatia, Greece, and Poland, for academics, researchers, and developers and it serves as a premier annual international forum to promote the exchange of the latest advances in telecommunication technology and signal processing. The aim of the conference is to bring together both novice and experienced scientists, developers, and specialists, to meet new colleagues, collect new ideas, and establish new cooperation between research groups from universities, research centers, and private sectors from the whole Europe, America, Asia, Australia, and Africa. The international expansion motivates the organizers in their effort to providing a platform for exchanging information and experience to help to improve the level and extent of scientific cooperation between university students, academics, and employees of research centers.

  • 2017 40th International Conference on Telecommunications and Signal Processing (TSP)

    The TSP 2017 Conference is organized by fifteen universities from Czech Republic, Hungary, Turkey, Taiwan, Japan, Slovak Republic, Spain, Bulgaria, France, Slovenia, Croatia, and Poland, for academics, researchers, and developers and it serves as a premier annual international forum to promote the exchange of the latest advances in telecommunication technology and signal processing. The aim of the conference is to bring together both novice and experienced scientists, developers, and specialists, to meet new colleagues, collect new ideas, and establish new cooperation between research groups from universities, research centers, and private sectors from the whole Europe, America, Asia, Australia, and Africa. The international expansion motivates the organizers in their effort to providing a platform for exchanging information and experience to help to improve the level and extent of scientific cooperation between university students, academics, and employees of research centers.

  • 2016 39th International Conference on Telecommunications and Signal Processing (TSP)

    The 2016 39th International Conference on Telecommunications and Signal Processing (TSP) is organized for academics, researchers, and developers and it serves as a forum to promote the exchange of the latest advances in telecommunication technology and signal processing. The aim of the conference is to bring together both novice and experienced scientists, developers, and specialists, to meet new colleagues, collect new ideas, and establish new cooperation between research groups from universities, research centers, and private sectors from the whole Europe, America, Asia, Australia, and Africa. The international expansion motivates the organizers in their effort to providing a platform for exchanging information and experience to help to improve the level and extent of scientific cooperation between university students, academics, and employees of research centers.

  • 2015 38th International Conference on Telecommunications and Signal Processing (TSP)

    The 2015 38th International Conference on Telecommunications and Signal Processing (TSP) is organized for academics, researchers, and developers and it serves as a forum to promote the exchange of the latest advances in telecommunication technology and signal processing. The aim of the conference is to bring together both novice and experienced scientists, developers, and specialists, to meet new colleagues, collect new ideas, and establish new cooperation between research groups from universities, research centers, and private sectors from the whole Europe, America, Asia, Australia, and Africa. The international expansion motivates the organizers in their effort to providing a platform for exchanging information and experience to help to improve the level and extent of scientific cooperation between university students, academics, and employees of research centers.

  • 2013 36th International Conference on Telecommunications and Signal Processing (TSP)

    The TSP 2013 conference is organized for, but not limited to, young academics, researchers and developers from different branches of telecommunication technology and signal processing. The aim of the conference is to bring together both novice and experienced scientists and developers, to meet new colleagues, collect new ideas and establish new cooperation between research groups. The conference originally started as a Central European initiative but recently we have had participants from Universities and Research Centers from the whole Europe and also from Asia, America and Africa.

  • 2012 35th International Conference on Telecommunications and Signal Processing (TSP)

    The TSP 2012 conference is organized for young academics, researchers and developers from different branches of telecommunication technology and signal processing.

  • 2011 34th International Conference on Telecommunications and Signal Processing (TSP)

    The TSP 2011 conference is organized for, but not limited to, young academics, researchers and developers from different branches of telecommunication technology and signal processing. The aim of the conference is to bring together both novice and experienced scientists and developers, to meet new colleagues, collect new ideas and establish new cooperation between research groups. The conference originally started as a Central European initiative but recently we have had participants from Universities and Research Centers from the whole Europe and also from Asia, America and Africa.


2018 International Conference and Exposition on Electrical And Power Engineering (EPE)

EPE 2018 is aimed to provide a forum for different groups of qualified scientists, engineers, researchers and practitioners from academia, industry, research labs, national and international organizations in the fields of electrical and power engineering.


More Conferences

Periodicals related to Bring Your Own Device

Back to Top

No periodicals are currently tagged "Bring Your Own Device"


Most published Xplore authors for Bring Your Own Device

Back to Top

Xplore Articles related to Bring Your Own Device

Back to Top

Enhancing BYOD Security Through SDN

SoutheastCon 2018, 2018

While there are many organizational benefits associated with Bring-Your-Own- Device (BYOD) adoption, security risks remain the main challenge. This paper explores the diverse methods and solutions that organizations can use to alleviate these risks. The solutions may include a variety of management tools and network technologies such as EMM, SDN, and NFV to solve these BYOD challenges.


Easy accessible virtual computer room for BYOD environment

2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2018

In April of 2016, Tokyo University of Agriculture and Technology (TUAT) transitioned from an educational computer system to BYOD style by the part of the information strategy. In the BYOD environment, the variety of the user terminal makes the teaching cost of lecturer much higher than traditional system. Therefore, we implemented brand new concept virtual desktop system for computer lecture, ...


Pseudo code of two-factor authentication for BYOD

2017 International Conference on Electrical and Information Technologies (ICEIT), 2017

Many solutions have been proposed to avoid stress and data leakage caused by BYOD (Bring Your Own Device) trend, including Mobile Device Management and authentication methods. In this paper, we will deal with the second solution more precisely the keystroke dynamics. The behavioral biometric of keystroke dynamics authenticates users by analyzing their ways of typing and generate for each system ...


The Bring Your Own Device Trend in an Oil and Gas Sector

2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), 2018

In trying to improve worker efficiencies and organizational productivity, organizations leverage on tools that promote the consumerization of Information Technology. Among these, is the growing trend of implementing Bring Your Own Device (BYOD) which allows employees to use their own devices for work related activities. Strategies and policies are put in place to guide the usage of such implementations and ...


Cyber security for younger demographics: A graphic based authentication and authorisation framework

2016 IEEE Region 10 Conference (TENCON), 2016

Contemporary computing environments are increasingly moving towards BYOD (Bring Your Own Device) configurations, particularly in primary and high school settings. While `preferred' configurations are suggested usually there is a diverse array of devices connecting to an organizations infrastructure, along with a diverse range of `first time' users, thus causing significant security issues. Additionally, the users in these environments are generally ...


More Xplore Articles

Educational Resources on Bring Your Own Device

Back to Top

IEEE-USA E-Books

  • Enhancing BYOD Security Through SDN

    While there are many organizational benefits associated with Bring-Your-Own- Device (BYOD) adoption, security risks remain the main challenge. This paper explores the diverse methods and solutions that organizations can use to alleviate these risks. The solutions may include a variety of management tools and network technologies such as EMM, SDN, and NFV to solve these BYOD challenges.

  • Easy accessible virtual computer room for BYOD environment

    In April of 2016, Tokyo University of Agriculture and Technology (TUAT) transitioned from an educational computer system to BYOD style by the part of the information strategy. In the BYOD environment, the variety of the user terminal makes the teaching cost of lecturer much higher than traditional system. Therefore, we implemented brand new concept virtual desktop system for computer lecture, TUAT Virtual Computer Classroom, which is based in virtual desktop technology and users can access the tools with any HTML5-compliant web browser, removing the differences for various operating systems. In this demonstration, we present the detail of the design and structure of our architecture and actual implementation.

  • Pseudo code of two-factor authentication for BYOD

    Many solutions have been proposed to avoid stress and data leakage caused by BYOD (Bring Your Own Device) trend, including Mobile Device Management and authentication methods. In this paper, we will deal with the second solution more precisely the keystroke dynamics. The behavioral biometric of keystroke dynamics authenticates users by analyzing their ways of typing and generate for each system user a unique biometric reference. The method is simple to implement and inexpensive, it requires only a personal computer keyboard. At the end of the paper, we will propose an algorithm in three phases to implement keystroke dynamics. The main goal of this paper isn't to explain how the dynamic keystroke works but rather to improve the algorithm of implementation of this technique.

  • The Bring Your Own Device Trend in an Oil and Gas Sector

    In trying to improve worker efficiencies and organizational productivity, organizations leverage on tools that promote the consumerization of Information Technology. Among these, is the growing trend of implementing Bring Your Own Device (BYOD) which allows employees to use their own devices for work related activities. Strategies and policies are put in place to guide the usage of such implementations and protect the organization from associated risks. User's may however not find such policies user friendly and may be inclined to resist the BYOD implementation. The project studies and seeks to understand how the implementation of such BYOD policies by an Organization brings about concerning factors otherwise viewed as perceived threats that may bring about a resistance to user's adoption of the technology. It further goes to determine to what extent such concerns influence employee's decisions to either embrace a BYOD program or reject the BYOD program.

  • Cyber security for younger demographics: A graphic based authentication and authorisation framework

    Contemporary computing environments are increasingly moving towards BYOD (Bring Your Own Device) configurations, particularly in primary and high school settings. While `preferred' configurations are suggested usually there is a diverse array of devices connecting to an organizations infrastructure, along with a diverse range of `first time' users, thus causing significant security issues. Additionally, the users in these environments are generally uneducated in the field of cyber security, resulting in weak passwords and poor data protection practices. This paper presents a novel authentication and authorization framework to address this problem. Specifically, by providing graphical based user friendly authentication and authorization schemes tailored to the younger demographic.

  • Risk assessment of BYOD: Bring your own device

    More and more companies are introducing Bring Your Own Device (BYOD), in which employees utilize their own smart phones and tablets for business. However, using private terminals for business presents risks, such as leakage of business information or an employee's personal information. This paper discusses a risk assessment of BYOD in an enterprise. Specifically, it analyzes and evaluates with the method of risk management, such as Risk Breakdown Structure (RBS) and risk matrix. This will contribute to the safe and secure spread and promotion of BYOD in an enterprise.

  • Engaging Students in Learning with Apps and Critical Games Analysis

    In the course of Games and Learning we used a flipped learning approach, inviting undergraduates to check what they learned from the readings made at home, by solving a quiz online, at the beginning of the class. At the end of each session, they synthesize on a Google form what they have learned. In the second part of the semester, in groups, they had to analyze a video game and a serious game. In this second group work, they had to observe the players to play, and they had to describe their reactions. At the end of the semester, the students filled in an opinion questionnaire about the dynamics of the class and the work done. The reactions of the students were very positive to the approach used and to the fact that the works contributed to the development of the critical ability to analyze digital games.

  • What Executives Should Know About Technology Trends

    This installment of Life in the C-Suite presents a sampling of comments from executives collected by Villanova University over the past few years as part of ongoing research on technology trends, digital transformation, and technology adoption.

  • BYOD? OMG!

    Bring Your Own Device--allowing employees to bring personally owned technology to their workplaces might improve productivity, but it also creates risks for employers. The Web extra at http://youtube/t2UpGr1AmiQ is an audio recording of Brian M. Gaff reading his Computing and the Law column, in which he discusses how bring your own device (BYOD) allows employees to bring personally owned technology to their workplaces and use it in connection with their jobs. Although this might improve productivity, it also creates risks for employers.

  • Governing information security within the context of “bring your own device in SMMEs”

    Information is a critical important asset; and it will always influence the way an organization conducts its business processes. Like any important business asset in an organization, there must be the assurance that the business information and related technologies are both protected and secure. Like any era in the advancement of technology, there is a new phenomenon that has grown in status: “Bring Your Own Device (BYOD)”. BYOD combines the official organizational devices required to function at work, together with the personal mobile device. There are many benefits to implementing BYOD; but because many risks are associated; and since BYOD is a new phenomenon, it can be difficult for organizations to manage in a secure manner. Therefore, this paper will provide a basic guideline to Executive Management on how they can govern and manage the BYOD phenomenon in SMMEs in a responsible way.



Standards related to Bring Your Own Device

Back to Top

No standards are currently tagged "Bring Your Own Device"


Jobs related to Bring Your Own Device

Back to Top