Security

View this topic in
Security is the degree of protection against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition. (Wikipedia.org)






Conferences related to Security

Back to Top

2020 22nd European Conference on Power Electronics and Applications (EPE'20 ECCE Europe)

Energy conversion and conditioning technologies, power electronics, adjustable speed drives and their applications, power electronics for smarter grid, energy efficiency,technologies for sustainable energy systems, converters and power supplies


2020 57th ACM/ESDA/IEEE Design Automation Conference (DAC)

The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2022 59th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2021 58th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2019 56th ACM/ESDA/IEEE Design Automation Conference (DAC)

    EDA (Electronics Design Automation) is becoming ever more important with the continuous scaling of semiconductor devices and the growing complexities of their use in circuits and systems. Demands for lower-power, higher-reliability and more agile electronic systems raise new challenges to both design and design automation of such systems. For the past five decades, the primary focus of research track at DAC has been to showcase leading-edge research and practice in tools and methodologies for the design of circuits and systems.

  • 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC Description for TMRF The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading

  • 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 session on design methodologies and EDA tool developments, keynotes, panels, plus User Track presentations. A diverse worldwide community representing more than 1,000 organization attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2012 49th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers

  • 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference is the world s leading technical conference and tradeshow on electronic design and design automation. DAC is where the IC Design and EDA ecosystem learns, networks, and does business.

  • 2010 47th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers.

  • 2009 46th ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC is the premier event for the electronic design community. DAC offers the industry s most prestigious technical conference in combination with the biggest exhibition, bringing together design, design automation and manufacturing market influencers.

  • 2008 45th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 250 of the leading electronics design suppliers.

  • 2007 44th ACM/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier Electronic Design Automation (EDA) and silicon solution event. DAC features over 50 technical sessions covering the latest in design methodologies and EDA tool developments and an Exhibition and Demo Suite area with over 250 of the leading EDA, silicon and IP Providers.

  • 2006 43rd ACM/IEEE Design Automation Conference (DAC)

  • 2005 42nd ACM/IEEE Design Automation Conference (DAC)

  • 2004 41st ACM/IEEE Design Automation Conference (DAC)

  • 2003 40th ACM/IEEE Design Automation Conference (DAC)

  • 2002 39th ACM/IEEE Design Automation Conference (DAC)

  • 2001 38th ACM/IEEE Design Automation Conference (DAC)

  • 2000 37th ACM/IEEE Design Automation Conference (DAC)

  • 1999 36th ACM/IEEE Design Automation Conference (DAC)

  • 1998 35th ACM/IEEE Design Automation Conference (DAC)

  • 1997 34th ACM/IEEE Design Automation Conference (DAC)

  • 1996 33rd ACM/IEEE Design Automation Conference (DAC)


2020 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM)

The scope of the 2020 IEEE/ASME AIM includes the following topics: Actuators, Automotive Systems, Bioengineering, Data Storage Systems, Electronic Packaging, Fault Diagnosis, Human-Machine Interfaces, Industry Applications, Information Technology, Intelligent Systems, Machine Vision, Manufacturing, Micro-Electro-Mechanical Systems, Micro/Nano Technology, Modeling and Design, System Identification and Adaptive Control, Motion Control, Vibration and Noise Control, Neural and Fuzzy Control, Opto-Electronic Systems, Optomechatronics, Prototyping, Real-Time and Hardware-in-the-Loop Simulation, Robotics, Sensors, System Integration, Transportation Systems, Smart Materials and Structures, Energy Harvesting and other frontier fields.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


More Conferences

Periodicals related to Security

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


More Periodicals

Most published Xplore authors for Security

Back to Top

Xplore Articles related to Security

Back to Top

Toward the SIEM architecture for cloud-based security services

2017 IEEE Conference on Communications and Network Security (CNS), 2017

Cloud Computing represents one of the most significant shifts in information technology and it enables to provide cloud-based security service such as Security-as-a-service (SECaaS). Improving of the cloud computing technologies, the traditional SIEM paradigm is able to shift to cloud-based security services. In this paper, we propose the SIEM architecture that can be deployed to the SECaaS platform which we ...


A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018

What makes a security visualization effective? How do we measure visualization effectiveness in the context of investigating, analyzing, understanding and reporting cyber security incidents? Identifying and understanding cyber- attacks are critical for decision making - not just at the technical level, but also the management and policy-making levels. Our research studied both questions and extends our Security Visualization Effectiveness Measurement ...


Security-aware Software Development Life Cycle (SaSDLC) - Processes and tools

2009 IFIP International Conference on Wireless and Optical Communications Networks, 2009

Today an application is secured using invitro perimeter security. This is the reason for security being considered as nonfunctional requirement in software development life cycle (SDLC). In next generation Internet (NGI), where all applications will be networked, security needs to be in-vivo; security must be functions within the application. Applications running on any device, be it on a mobile or ...


Home user security- from thick security-oriented home users to thin security- oriented home users

2013 Science and Information Conference, 2013

In the technological world in which we live, access to the Internet is no longer a luxury. Rather, it is a necessity and a lifeline to many. The Internet is used, amongst other things for obtaining information, for doing business and for social networking. However, along with increases in cyber activity come increases in cyber threats, attacks and incidents. Many ...


Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services

2018 IEEE Conference on Communications and Network Security (CNS), 2018

Large enterprises and organizations from both private and public sectors typically outsource a platform solution, as part of the Managed Security Services (MSSs), from 3rdparty providers (MSSPs) to monitor and analyze their data containing cyber security information. Sharing such data among these large entities is believed to improve their effectiveness and efficiency at tackling cybercrimes, via improved analytics and insights. ...


More Xplore Articles

Educational Resources on Security

Back to Top

IEEE.tv Videos

NIKSUN World Wide Security & Mobility Conference 2011-Rajagopalan
Eric Vyncke: Internet of Things and Security: Different than Network Security? - WF-IoT 2015
Rebooting Computing: Trust and Security in Future Computing Systems
NIKSUN World Wide Security & Mobility Conference 2011-D Raychaudhuri
NIKSUN World Wide Security & Mobility Conference 2011 - Michael Chertoff
NIKSUN World Wide Security & Mobility Conference 2011 - H Vincent Poor
Defense Machines: Towards Autonomous Network Security Systems - Aman Singh - ICRC 2018
NIKSUN World Wide Security & Mobility Conference 2011-B Lyons
Abstraction and Modeling of Cyber Security tutorial, Part 2
Joe Klein: IoT Security - Industry Forum Panel: WF IoT 2016
IoT Security Best Practices - Webinar by George Corser and Jared Bielby
Ricardo Neisse: Security Certification and Labeling in the Internet of Things: WF-IoT 2016
NIKSUN World Wide Security & Mobility Conference 2011 - Col. R Fellers
Achieving a Secure and Resilient Cyber Ecosystem - Homeland Security's Tom Ruoff
Glenn Fink on Priorities for IoT Security and Privacy From Here to 2020: End to End Trust and Security Workshop for the Internet of Things 2016
The Internet of Things, An Overview: Karen O'Donoghue Addresses Issues and Challenges of a More Connected World -- 2016 End to End Trust and Security Workshop for the Internet of Things
Bob Martin on Industrial Internet Reference Architecture: 2016 End to End Trust and Security Workshop for the Internet of Things
Don't Get Hooked: Safe Strategies on the Net
Antonio Skarmeta: Security and Privacy in the Internet of Things - WF-IoT 2015
Luca Bolognini: Internet of Things: Privacy and Security Challenges - WF-IoT 2015

IEEE-USA E-Books

  • Toward the SIEM architecture for cloud-based security services

    Cloud Computing represents one of the most significant shifts in information technology and it enables to provide cloud-based security service such as Security-as-a-service (SECaaS). Improving of the cloud computing technologies, the traditional SIEM paradigm is able to shift to cloud-based security services. In this paper, we propose the SIEM architecture that can be deployed to the SECaaS platform which we have been developing for analyzing and recognizing intelligent cyber-threat based on virtualization technologies.

  • A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach

    What makes a security visualization effective? How do we measure visualization effectiveness in the context of investigating, analyzing, understanding and reporting cyber security incidents? Identifying and understanding cyber- attacks are critical for decision making - not just at the technical level, but also the management and policy-making levels. Our research studied both questions and extends our Security Visualization Effectiveness Measurement (SvEm) framework by providing a full-scale effectiveness approach for both theoretical and user-centric visualization techniques. Our framework facilitates effectiveness through interactive three-dimensional visualization to enhance both single and multi-user collaboration. We investigated effectiveness metrics including (1) visual clarity, (2) visibility, (3) distortion rates and (4) user response (viewing) times. The SvEm framework key components are: (1) mobile display dimension and resolution factor, (2) security incident entities, (3) user cognition activators and alerts, (4) threat scoring system, (5) working memory load and (6) color usage management. To evaluate our full-scale security visualization effectiveness framework, we developed VisualProgger - a real-time security visualization application (web and mobile) visualizing data provenance changes in SvEm use cases. Finally, the SvEm visualizations aims to gain the users' attention span by ensuring a consistency in the viewer's cognitive load, while increasing the viewer's working memory load. In return, users have high potential to gain security insights in security visualization. Our evaluation shows that viewers perform better with prior knowledge (working memory load) of security events and that circular visualization designs attract and maintain the viewer's attention span. These discoveries revealed research directions for future work relating to measurement of security visualization effectiveness.

  • Security-aware Software Development Life Cycle (SaSDLC) - Processes and tools

    Today an application is secured using invitro perimeter security. This is the reason for security being considered as nonfunctional requirement in software development life cycle (SDLC). In next generation Internet (NGI), where all applications will be networked, security needs to be in-vivo; security must be functions within the application. Applications running on any device, be it on a mobile or on a fixed platform - need to be security-aware using security aware software development life cycle (SaSDLC), which is the focus of this paper. We also present a tool called Suraksha that comprises of security designers' workbench and Security Testers' Workbench that helps a developer to build security-aware applications.

  • Home user security- from thick security-oriented home users to thin security- oriented home users

    In the technological world in which we live, access to the Internet is no longer a luxury. Rather, it is a necessity and a lifeline to many. The Internet is used, amongst other things for obtaining information, for doing business and for social networking. However, along with increases in cyber activity come increases in cyber threats, attacks and incidents. Many home users are not technology savvy and, therefore, do not understand these cyber threats or how to protect themselves (and their information) while connected to the Internet. It is therefore vital that home users be assisted to ensure that they are “cyber secure”. The paper proposes how a regulatory body, for example, an Internet Service Provider (ISP), can be involved to take over the majority of cyber security responsibilities for the home (end) user. This will transform a user from being a thick security-oriented user to being a thin security-oriented end user.

  • Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services

    Large enterprises and organizations from both private and public sectors typically outsource a platform solution, as part of the Managed Security Services (MSSs), from 3rdparty providers (MSSPs) to monitor and analyze their data containing cyber security information. Sharing such data among these large entities is believed to improve their effectiveness and efficiency at tackling cybercrimes, via improved analytics and insights. However, MSS platform customers currently are not able or not willing to share data among themselves because of multiple reasons, including privacy and confidentiality concerns, even when they are using the same MSS platform. Therefore any proposed mechanism or technique to address such a challenge need to ensure that sharing is achieved in a secure and controlled way. In this paper, we propose a new architecture and use case driven designs to enable confidential, flexible and collaborative data sharing among such organizations using the same MSS platform. MSS platform is a complex environment where different stakeholders, including authorized MSSP personnel and customers' own users, have access to the same platform but with different types of rights and tasks. Hence we make every effort to improve the usability of the platform supporting sharing while keeping the existing rights and tasks intact. As an innovative and pioneering attempt to address the challenge of data sharing in the MSS platform, we hope to encourage further work to follow so that confidential and collaborative sharing eventually happens among MSS platform customers.

  • Network management security

    A review is given of network management security issues and the authors explain how ISO's SC21/WG4 is currently addressing these. Aspects covered include: what network management security is, why it needs to be considered and what issues need to be resolved to achieve this. Within this overall structure, specific details covered include: management as a means of attack on managed system security; management of security services; current trends that increase the need for network management security; implementation difficulties arising from technical characteristics and operational requirements; and ISO standards view.<<ETX>>

  • Challenges faced today by computer security practitioners

    Summary form only given. It is noted that computer security practitioners still experience difficulty in: educating management and users at all levels; securing cooperation from other security professionals and auditors; making proper use of available security technology; accurately assessing the threats, vulnerabilities, and adequacy of safeguards; and persuading management of the importance of this. It is concluded that getting management's approval is the most critical element in computer security, since it is management that must make budget decisions that finance better computer security. Once management has a greater appreciation for computer security, the other factors should fall into place.<<ETX>>

  • Dynamically validate network security based on adaptive control theory

    Network suffers from various types of security threats which are dynamic, and traditional static methods are difficult to effectively validate network security. A network security validation model based on adaptive control theory (NSVMAC) is proposed to validate network security in dynamic network environment. The Markov decision process is adopted to model the adaptive control of NSVMAC model, which is solved based on reinforcement learning method, and the adaptive optimization algorithm based on Q-Learning is proposed. The adaptability of NSVMAC model is analyzed in experiments, and confirms the effectiveness of the proposed method.

  • Migration of Internet security protocols to the IPSEC framework

    Nowadays it is clear that security protocols will implement a very important part of the communications accomplished through the future Internet. Efforts made by the IETF have produced the first Internet Protocol version that includes security services, this framework is called IPSEC and it is a flexible solution designed taking into account the heterogeneity of the Internet. In fact the IPSEC mechanisms supply confidentiality, integrity and authentication of IP packets (implemented by the Authentication Header -AHand the Encapsulated Security Payload -ESP). But this new framework also provides another security service that is not widely known, this is the ISAKMP protocol (Internet Security Association and Key Management Protocol) that allows negotiating security parameters over the Internet. Those security parameters include the cipher algorithm to use the cipher key, the hash function, etc. These parameters are grouped in a Security Association that will be referenced in the first step of the security protocol. The ISAKMP is used by AH and ESP to establish the security associations needed to accomplish the protocols. However ISAKMP advantages can be exploited by any other security protocol, and in this way it will be possible to avoid the duplicity of single purpose negotiations of security parameters. Current security protocols negotiate parameters by exchanging messages. SSL is an example where the first part of its message is used to negotiate the security parameters. We describe a methodology for the migration of aged security protocols to an ISAKMP negotiation. We identify the phases for the migration from the definition of a domain of interpretation to specify the parameters that must be included into the security associations.

  • Why you shouldn't study security [security education]

    A colleague recently mentioned that his son was looking for a PhD program and was considering security as a topic. The immediate reaction from the security researchers present was something to this effect: "No, don't. There are so many other, more interesting things in the world." This might sound like a group of disappointed people, but as far as I know, we all thoroughly enjoy working in the field and by no means regret it as a career choice



Standards related to Security

Back to Top

American National Standard for the Performance of Checkpoint Cabinet X-Ray Imaging Security Systems

This document establishes standards for the technical performance of cabinet x-ray imaging systems used for screening at security checkpoints and other inspection venues. Included are all x-ray systems designed primarily for the inspection of baggage at airline, railroad, and bus terminals, and in similar facilities. An xray tube used within a shielded part of a building, or x-ray equipment that ...


IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


More Standards