IEEE Organizations related to Cyber Warfare

Back to Top

No organizations are currently tagged "Cyber Warfare"



Conferences related to Cyber Warfare

Back to Top

2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)

The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.


2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS)

The IEEE International Midwest Symposium on Circuits and Systems is the oldest IEEE sponsored or co-sponsored conference in the area of analog and digital circuits and systems. Traditional lecture and interactive lecture/poster sessions cover virtually every area of electronic circuits and systems in all fields of interest to IEEE.


2019 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA)

CogSIMA conferences provide an annual venue for presenting multidisciplinary research on complex heterogeneous dynamic systems - of interacting humans, machines, and computer agents - whose collective behavior depends on complex situations. Common to these systems is capability to adequately sense, perceive, comprehend, and act depending on the current and plausible future situations, and adapt to expected changes in the surrounding environment and within the systems themselves. CogSIMA conferences are aimed at researches and practitioners from academia, industry and government, with wide variety of backgrounds including computer science, cognitive science, human factors, modeling and simulation, robotics and systems engineering, and information fusion.


NAECON 2019 - IEEE National Aerospace and Electronics Conference

NAECON is the oldest and premier IEEE Conference presentingresearch in all aspects of theory, design and applications of aerospace systems and sensors.


2018 10th International Conference on Cyber Conflict (CyCon)

Conflict and actors in cyberspaceCyber capabilitiesTechnical challenges, innovations and requirementsInternet of thingsInternational law and normsInternational cooperation

  • 2017 9th International Conference on Cyber Conflict (CyCon)

    International cooperation and international relations with regards to cyberspace; Technical challenges and requirements; Conflict in cyberspace; Regulations and standards; virtualisation

  • 2016 8th International Conference on Cyber Conflict (CyCon)

    In today’s increasingly complex cyberspace we see a variety of actors struggling to gain or maintain their position. The ubiquitous use of information and communication technologies has had a profound influence on how these actors pursue their goals and interests. The 8th International Conference on Cyber Conflict (CyCon 2016) will focus on ‘cyber power’ as one of the core elements of relations between different stakeholders and will discuss how the traditional concept of ‘power’ applies to cyberspace. Both ‘hard’ and ‘soft power’ are being employed to achieve strategic and political goals through technical, legal and economic means. But how can we assess such power? How can we ensure that such power remains in the right hands? How can we ensure or enforce ‘cyber power’ without risking conflict escalation? How can we respond to exercises of this power with the right tools and measures? Is there a way to maintain a balance of power in cyberspace?

  • 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace(CyCon)

    International cooperation and international relations with regards to cyberspace;Technical challenges and requirements;Conflict in cyberspace;Regulations and standards;Virtualisation

  • 2014 6th International Conference on Cyber Conflict (CyCon)

    The International Conference on Cyber Conflict is CCD COE's annual event that brings together strategic, technical and legal experts to discuss current key aspects of cyber conflicts . The theme of the conference is Active Cyber Defence.

  • 2013 5th International Conference on Cyber Conflict (CyCon)

    Technical, strategic and legal implications of using automaticmethods to manage cyber conflicts. Conceptual Framework of Cyber ConflictsConcepts for using automatic methods in cyber conflictActors in cyber conflictAutomation of Tactical, Operational and Strategic Procedures in Cyber ConflictsCase Studies, Experiments and SystemsCyber Conflict ModelsReasoning and Attribution in Cyber Conflict targeting and Cyber Attack Impact Assessment

  • 2012 4th International Conference on Cyber Conflict (CYCON)

    The 4th International Conference on Cyber Conflict 2012 (CYCON 2012) will provide a multi-disciplinary forum for scholars, researchers, analysts and practitioners to discuss issues related to cyber conflict and warfare. The conference aspires to advance scientific knowledge and understanding and to support the development of related policies, models and systems.

  • 2011 3rd International Conference on Cyber Conflict (ICCC)

    The International Conference on Cyber Conflict is the CCD COE's annual event that brings together strategic, technical and legal experts to discuss current key aspects of cyber conflicts (see http://www.ccdcoe.org/ICCC). In 2011 the conference will focus on combination of defensive and offensive aspects of Cyber Forces and will combine different views on cyber defence and operations in the current and envisaged threat environments. This shall not be limited to military perspective. Legal, strategic and tec


More Conferences

Periodicals related to Cyber Warfare

Back to Top

No periodicals are currently tagged "Cyber Warfare"


Most published Xplore authors for Cyber Warfare

Back to Top

Xplore Articles related to Cyber Warfare

Back to Top

Digital Success Brings Special Security Risks

IT Professional, 2018

The more digitally mature you are, the more vulnerable you are.


Net neutrality in the context of cyber warfare

2018 10th International Conference on Cyber Conflict (CyCon), 2018

Real or potential connections between infrastructure of different security levels, from relatively unprotected individual users up to interfaces with critical national infrastructure, have made cyberspace a highly contested and congested domain. But operating conditions within this domain strongly favour malicious actors over legitimate operators seeking to provide security and protect systems and information. Technical capabilities to establish dominance and cause ...


Cybersecurity: An Analysis of the Protection Mechanisms in a Cloud-centered Environment

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018

The numerous threats and data exfiltration that has taken place in our network require that significant effort is made to ensure the safety of organizational data and equipment. The diverse nature of emerging technologies and bring your own devices (BYOD), smartphones and so on makes it challenging to efficiently secure the traditional networks. However, the popularity resulting from low- cost ...


Social Media Warfare in Indonesia Political Campaign: A Survey

2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE), 2018

Social Media has a strategic role in political competition. By using social media, information delivery to the public becomes faster. As a medium of mass information dissemination with broader penetration in society, social media has adverse effects in its use, such as unhealthy competition, hate-speech spreader means, hoax propagation facilities, to the means of spreading of radical, ethnic, and religious ...


The USNA's Interdisciplinary Approach to Cybersecurity Education

Computer, 2019

Faced with unprecedented cybersecurity challenges, the U.S. Naval Academy (USNA) has recognized the need to increase its supply of newly minted officers who have a solid educational foundation in cybersecurity and cyber operations.



Educational Resources on Cyber Warfare

Back to Top

IEEE.tv Videos

Keynote Isaac Ben-Israel - ETAP Forum Tel Aviv 2016
Panelist Yuval Elovici - ETAP Forum Tel Aviv 2016
Fragility of Interconnected Cyber-Physical Systems - Marios M. Polycarpou - WCCI 2016
Cyber-Physical ICT for Smart Cities: Emerging Requirements in Control and Communications - Ryogo Kubo
Toward Cyber-Physical/Human Systems that are Responsive and Scalable - Jing Li - IEEE Sarnoff Symposium, 2019
Abstraction and Modeling of Cyber Security tutorial, Part 1
Opening Chat: Rod Beckstrom and Xiaodong Lee - ETAP Beijing 2016
Robotics History: Narratives and Networks Oral Histories: Pradeep Khosla
Keynote: Greg Austin - ETAP Beijing 2016
Cyber Security Awareness (CSA) in Africa: Basie von Solms - ETAP Forum Namibia, Africa 2017
Hausi Muller: Models At Runtime and Networked Control for Smart Cyber Physical Systems: WF IoT 2016
Abstraction and Modeling of Cyber Security tutorial, Part 2
Autonomous Systems: Managing Risk and Reward - IEEE AI & Ethics Summit 2016
Achieving a Secure and Resilient Cyber Ecosystem - Homeland Security's Tom Ruoff
Social Implications: Perils & Promises of AI - IEEE AI & Ethics Summit 2016
Cyber Security: Why It’s Everyone’s Business - Panel at IEEE WIE Forum USA East 2017
CommunicAsia 2017 - Cyber Security (Collaboration with IEEE ComSoc)
Parry Aftab of Cybersafety India at Internet Inclusion: Advancing Solutions, Delhi, 2016
Managing Risks of the Future IoT - Kayne McGladrey - VIC Summit 2019
Ivan Ruchkin: Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems: WF IoT 2016

IEEE-USA E-Books

  • Digital Success Brings Special Security Risks

    The more digitally mature you are, the more vulnerable you are.

  • Net neutrality in the context of cyber warfare

    Real or potential connections between infrastructure of different security levels, from relatively unprotected individual users up to interfaces with critical national infrastructure, have made cyberspace a highly contested and congested domain. But operating conditions within this domain strongly favour malicious actors over legitimate operators seeking to provide security and protect systems and information. Technical capabilities to establish dominance and cause damage in this domain are widely distributed, but legal and ethical constraints prevent legitimate actors from using them to their full potential. Within this context, net neutrality presents a limiting factor on the capability of legitimate actors to respond to harmful activity in cyberspace whose common aim is to install and uphold a technical imbalance. Under the principle of net neutrality, each data packet must be transmitted with equal priority, irrespective of its source, destination, content or purpose. This is disadvantageous to cyber defence. Comparisons to jungle or arctic warfare, where operating conditions are neutral and degrade the performance of each combatant side equally, are invalid, as malicious operators are capable of technically manipulating data traffic to their favour. While both malicious and legitimate actors may have comparable capabilities, legitimate actors are bound to legal and political restrictions, making them immobile in several cyber warfare scenarios. Transferring the principles of net neutrality to real life scenarios corresponds to depriving military, police and emergency operators from any privilege that allows them to respond to an incident - in effect, depriving them of their blue lights and emergency powers even in severe incidents targeting critical infrastructure that may threaten civilian lives. This paper investigates the potential opportunities and challenges of an adjustment to the principle of net neutrality to facilitate defensive action by legitimate actors; how this adjustment could contribute to regaining control in congested cyber domains in the case of national or international cyber incidents; and the risks associated. The different ways of dealing with net neutrality in cyber defence situations in the EU, UK and Russia are compared. Particular focus is put on the organisations and capabilities needed to establish technical sovereignty in multi-domain networks, including consideration of the acceptability of outsourcing the task of upholding cyber sovereignty to external institutions.

  • Cybersecurity: An Analysis of the Protection Mechanisms in a Cloud-centered Environment

    The numerous threats and data exfiltration that has taken place in our network require that significant effort is made to ensure the safety of organizational data and equipment. The diverse nature of emerging technologies and bring your own devices (BYOD), smartphones and so on makes it challenging to efficiently secure the traditional networks. However, the popularity resulting from low- cost service offerings in cloud computing and the dispersed nature, the use of virtual machines in cloud networks makes it attractive and perhaps safer than the regular networks. There is a certain level of the layer of abstraction with cloud computing, such as community cloud, distributed or hidden identity and the lack of control makes it appear impenetrable. The key to cybersecurity is for the protection of information in computer systems to protect and guide the architectural structures that are used to support the system or database. The protection of information in computer systems requires that protection mechanisms should guide the architectural structures that are used to support the system or database.

  • Social Media Warfare in Indonesia Political Campaign: A Survey

    Social Media has a strategic role in political competition. By using social media, information delivery to the public becomes faster. As a medium of mass information dissemination with broader penetration in society, social media has adverse effects in its use, such as unhealthy competition, hate-speech spreader means, hoax propagation facilities, to the means of spreading of radical, ethnic, and religious issues. In the world of Politics, Social media is used as a weapon (Cyber warfare) as a material to attack opponents with spreading of radical, ethnic, and religious issues issues. The Government of Indonesia has made various efforts in combating cyber warfare, through the Electronic Information and Transaction Act, purchasing ICT devices to detect and action against the spread of negative issues on social media in Indonesia. However, some Indonesians still consider the Government's lack of role in tackling social media war in Indonesia. This is due to the lack of literacy gained by the people of Indonesia. This paper we explain the efforts of the Government of Indonesia in the prevention of social media warfare, focusing on information technology aspects used by the Indonesian government in tackling hoax and propaganda content spreader on social media. We offer a discussion on the adoption of social media propaganda countermeasures that have been done by developed countries in filtering social media into a means of trusted information.

  • The USNA's Interdisciplinary Approach to Cybersecurity Education

    Faced with unprecedented cybersecurity challenges, the U.S. Naval Academy (USNA) has recognized the need to increase its supply of newly minted officers who have a solid educational foundation in cybersecurity and cyber operations.



Standards related to Cyber Warfare

Back to Top

No standards are currently tagged "Cyber Warfare"


Jobs related to Cyber Warfare

Back to Top